WGU C839 Cryptography OA 350 Questions
21 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is NOT required for a hash?

  • Non-reversible
  • Minimum key length of 256 bits (correct)
  • Variable-length input, fixed-length output
  • Few collisions
  • What does a 'collision' refer to in cryptography?

  • Transposition
  • Substitution
  • Collision (correct)
  • Convergence
  • What is the purpose of a 'salt' in cryptography?

  • Key whitening
  • Key rotation
  • Random bits intermixed with a symmetric cipher to increase randomness and make it more secure
  • Random bits intermixed with a hash to increase randomness and reduce collisions (correct)
  • Which hash is described in RFC 1321?

    <p>MD5</p> Signup and view all the answers

    What is the average earning of a seller per month by selling study notes on Docmerit?

    <p>$250</p> Signup and view all the answers

    What is NOT mentioned as an upload on Docmerit?

    <p>Videos</p> Signup and view all the answers

    What is the size block used by FORK256?

    <p>512</p> Signup and view all the answers

    In 1977, researchers at MIT described which asymmetric algorithm?

    <p>RSA</p> Signup and view all the answers

    What is the formula (M^e)(%n) related to?

    <p>Decrypting with RSA</p> Signup and view all the answers

    Which of the following equations is related to EC?

    <p>$y^2 = x^3 + Ax + B$</p> Signup and view all the answers

    What is defined by U.S. Patent 5,231,668 and FIPS 186?

    <p>Digital Signature Algorithm (DSA)</p> Signup and view all the answers

    What is X.509?

    <p>The standard for digital certificates</p> Signup and view all the answers

    What is contained in a CRL?

    <p>Revoked certificates</p> Signup and view all the answers

    What does the Online Certificate Status Protocol (OCSP) provide?

    <p>Revoked certificates</p> Signup and view all the answers

    In terms of cryptanalysis, what does it mean to break a cipher?

    <p>finding any method to decrypt the message that is more efficient than brute force</p> Signup and view all the answers

    An authentication method that periodically re-authenticates the client by establishing a hash that is then resent from the client is called ______.

    <p>CHAP</p> Signup and view all the answers

    What is a TGS?

    <p>The server that grants Kerberos tickets</p> Signup and view all the answers

    What is Kerchoff's principle?

    <p>Only the key needs to be secret, not the actual algorithm.</p> Signup and view all the answers

    Which of the following is a fundamental principle of cryptography that holds that the algorithm can be publically disclosed without damaging security?

    <p>Kerkchoff's principle</p> Signup and view all the answers

    A process that puts a message into the least significant bits of a binary file is called what?

    <p>Steganography</p> Signup and view all the answers

    If you wished to see a list of revoked certificates from a CA, where would you look?

    <p>CRL</p> Signup and view all the answers

    More Like This

    WGU D426 V2 Flashcards
    18 questions
    WGU C192 Lesson 5 Flashcards
    22 questions
    WGU Course C840 - Digital Forensics Quiz
    100 questions
    WGU 101 Competency-Based Education Quiz
    12 questions
    Use Quizgecko on...
    Browser
    Browser