100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU C839 EXAM INTRODUCTION TO CRYPTOGRAPHY EXAM | ALL QUESTIONS AND CORRECT ANSWERS | VERIFIED ANSWERS | LATEST VERSION (STUDY THIS ONE) $27.99   Add to cart

Exam (elaborations)

WGU C839 EXAM INTRODUCTION TO CRYPTOGRAPHY EXAM | ALL QUESTIONS AND CORRECT ANSWERS | VERIFIED ANSWERS | LATEST VERSION (STUDY THIS ONE)

 7 views  0 purchase
  • Course
  • WGU C839 INTRODUCTION TO CRYPTOGRAPHY
  • Institution
  • WGU C839 INTRODUCTION TO CRYPTOGRAPHY

WGU C839 EXAM INTRODUCTION TO CRYPTOGRAPHY EXAM | ALL QUESTIONS AND CORRECT ANSWERS | VERIFIED ANSWERS | LATEST VERSION (STUDY THIS ONE)

Preview 4 out of 83  pages

  • September 12, 2024
  • 83
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • WGU C839 INTRODUCTION TO CRYPTOGRAPHY
  • WGU C839 INTRODUCTION TO CRYPTOGRAPHY
avatar-seller
nevilletadayo
WGU C839 EXAM INTRODUCTION TO
CRYPTOGRAPHY EXAM | ALL QUESTIONS
AND CORRECT ANSWERS | VERIFIED
ANSWERS | LATEST VERSION (STUDY THIS
ONE)
Which key method is used to create the tunnel in SSL/TLS connections?

A Session key method
B Symmetric key method
C Hashing method
D Asymmetric key method ------CORRECT ANSWER---------------B



Who sends the digital certificate and the selected cipher suites to use
during RSA key exchange in HTTPS connections?

A Neither the server nor the client
B The client
C The server and the client
D The server ------CORRECT ANSWER---------------D



the process by which VPN packets reach their intended destination, which
is typically a private network ------CORRECT ANSWER---------------tunneling



a secure, encrypted connection over a publicly shared network ------
CORRECT ANSWER---------------virtual private network (VPN)

,using subscriber computers to route data packets over the internet, instead
of using publicly available routers. ------CORRECT ANSWER---------------
onion routing



Which backdoor cryptography method involves having a copy of the
encryption key that law enforcement agents could use if they require
access to the data?

A Key escrow
B Encryption by default
C RSA cracking
D NOBUS backdoor ------CORRECT ANSWER---------------A



Which encryption cracking method involves an intruder sending a legitimate
message into the network at some future time?

A Time attack
B Cut-and-paste
C Chosen-ciphertext
D Replay system ------CORRECT ANSWER---------------D



Used to authenticate to the server. Contains the identity of the client, the
session key, the timestamp, and the checksum. It is encrypted with the
server's key. ------CORRECT ANSWER---------------Ticket



____________ uses the stream cipher RC4 (128 bit or 256 bit). For a 24-bit
IV, there is a 50% probability the same IV will repeat after 5000 packets ----
--CORRECT ANSWER---------------WEP (Wired Equivalent Privacy)

,_____ was developed by Netscape and has since been supplanted by TLS.
It was the preferred method used with secure websites (i.e. https). ------
CORRECT ANSWER---------------SSL



_________________ is a protocol for encrypting transmissions. A client
and server negotiate a connection by using a handshaking procedure, in
which the client and server agree on various parameters used to establish
the connection's security. ------CORRECT ANSWER---------------Transport
Layer Security (TLS)



Microsoft provides a system for encrypting partitions or entire hard drives
using a Trusted Platform Module (TPM). By default, it uses the AES
encryption algorithm with a 128-bit key. ------CORRECT ANSWER------------
---Bitlocker



_________________ is the art and science of writing hidden messages in
such a way that no one, apart from the sender and intended recipient,
suspects the existence of the message. It is a form of security through
obscurity. By altering the least significant bit, one can hide additional data
without altering the original file in any noticeable way. ------CORRECT
ANSWER---------------Steganography



Payload - The data to be covertly communicated, the message you wish to
hide

Carrier - The signal, stream, or data file into which the payload is hidden

Channel - The type of medium used. This may be still photos, video, or
sound files ------CORRECT ANSWER---------------Steganography Terms

, The most common steganography method is _____________________. ---
---CORRECT ANSWER---------------Least Significant Bits (LSB)



This method of Audio Steganography (Steganophony) adds an extra sound
to an echo inside an audio file, that extra sound conceals information. ------
CORRECT ANSWER---------------Echo hiding



The NSA classifies Suite A cryptographies as published, while Suite B as
not published. NSA Suite A cryptography contains classified algorithms that
will not be released. These algorithms are used to encrypt especially
sensitive information. Suite B are publically described algorithms.

A True
B False ------CORRECT ANSWER---------------A



This is the most basic tool for breaking most classical ciphers. In natural
languages, certain letters of the alphabet appear more frequently than
others. By examining those frequencies, you can derive some information
about the key that was used. This method is very effective against classic
ciphers like Caesar, Vigenère, etc. It is far less effective against modern
methods. ------CORRECT ANSWER---------------Frequency Analysis



In a ____________________, the attacker obtains the ciphertexts
corresponding to a set of plaintexts. This can allow the attacker to attempt
to derive the key used and thus decrypt other messages encrypted with
that key. ------CORRECT ANSWER---------------Chosen plaintext attack



A ____________________ is less effective, but much more likely for the
attacker since the attacker only has access to a collection of ciphertexts.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller nevilletadayo. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $27.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77254 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$27.99
  • (0)
  Add to cart