WGU C839 Cryptography OA 350 Questions

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is NOT required for a hash?

  • Non-reversible
  • Minimum key length of 256 bits (correct)
  • Variable-length input, fixed-length output
  • Few collisions

What does a 'collision' refer to in cryptography?

  • Transposition
  • Substitution
  • Collision (correct)
  • Convergence

What is the purpose of a 'salt' in cryptography?

  • Key whitening
  • Key rotation
  • Random bits intermixed with a symmetric cipher to increase randomness and make it more secure
  • Random bits intermixed with a hash to increase randomness and reduce collisions (correct)

Which hash is described in RFC 1321?

<p>MD5 (D)</p> Signup and view all the answers

What is the average earning of a seller per month by selling study notes on Docmerit?

<p>$250 (A)</p> Signup and view all the answers

What is NOT mentioned as an upload on Docmerit?

<p>Videos (C)</p> Signup and view all the answers

What is the size block used by FORK256?

<p>512 (C)</p> Signup and view all the answers

In 1977, researchers at MIT described which asymmetric algorithm?

<p>RSA (B)</p> Signup and view all the answers

What is the formula (M^e)(%n) related to?

<p>Decrypting with RSA (A)</p> Signup and view all the answers

Which of the following equations is related to EC?

<p>$y^2 = x^3 + Ax + B$ (D)</p> Signup and view all the answers

What is defined by U.S. Patent 5,231,668 and FIPS 186?

<p>Digital Signature Algorithm (DSA) (B)</p> Signup and view all the answers

What is X.509?

<p>The standard for digital certificates (B)</p> Signup and view all the answers

What is contained in a CRL?

<p>Revoked certificates (A)</p> Signup and view all the answers

What does the Online Certificate Status Protocol (OCSP) provide?

<p>Revoked certificates (B)</p> Signup and view all the answers

In terms of cryptanalysis, what does it mean to break a cipher?

<p>finding any method to decrypt the message that is more efficient than brute force (D)</p> Signup and view all the answers

An authentication method that periodically re-authenticates the client by establishing a hash that is then resent from the client is called ______.

<p>CHAP (B)</p> Signup and view all the answers

What is a TGS?

<p>The server that grants Kerberos tickets (D)</p> Signup and view all the answers

What is Kerchoff's principle?

<p>Only the key needs to be secret, not the actual algorithm. (D)</p> Signup and view all the answers

Which of the following is a fundamental principle of cryptography that holds that the algorithm can be publically disclosed without damaging security?

<p>Kerkchoff's principle (B)</p> Signup and view all the answers

A process that puts a message into the least significant bits of a binary file is called what?

<p>Steganography (A)</p> Signup and view all the answers

If you wished to see a list of revoked certificates from a CA, where would you look?

<p>CRL (C)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

WGU C192 Lesson 5 Flashcards
22 questions
WGU Course C840 - Digital Forensics Quiz
100 questions
WGU 101 Competency-Based Education Quiz
12 questions
WGU MBA C213 Accounting Flashcards
28 questions
Use Quizgecko on...
Browser
Browser