WGU
Introduction-to-Cryptography
Q1:
(A security analyst is using 3DES for data encryption. Which 3DES key size is valid?)
○
A
128-bit○
B
2,048-bit○
C
56-bit○
D
112-bit
WGU
Introduction-to-Cryptography
Q2:
(What describes how Counter (CTR) mode encryption functions?)
○
A
Converts the block cipher into a stream cipher, then uses a counter value and a nonce to encrypt the data○
B
Uses a self-synchronizing stream cipher where the IV is encrypted and XORed with the data stream one bit at a time○
C
Encrypts each block with the same key, where each block is independent of the others○
D
Uses an IV to encrypt the first block, then uses the result of the encryption to encrypt the next block
WGU
Introduction-to-Cryptography
Q3:
(What is an example of a block cipher mode of operation?)
○
A
Secure Hash Algorithm 256 (SHA-256)○
B
Digital Signature Algorithm (DSA)○
C
Rivest--Shamir--Adleman (RSA)○
D
Electronic Codebook (ECB)
WGU
Introduction-to-Cryptography
Q4:
(An administrator has configured a Virtual Private Network (VPN) connection utilizing IPsec transport mode with Encapsulating Security Payload (ESP) between a server in the corporate office and a client computer in the remote office. In which situation can the packet content be inspected?)
○
A
On devices at headquarters and offsite before being sent and after being received○
B
In the headquarters' and offsite location's networks after the data has been sent○
C
Only in the offsite location's network while data is in transit○
D
Only in the headquarters' network while data is in transit
WGU
Introduction-to-Cryptography
Q5:
(A company wants to use certificates issued by a root CA to demonstrate to customers that it is a legitimate company being hosted by a cloud provider. Who needs to trust the root CA public key?)
○
A
The seller and the buyer○
B
The cloud provider and the seller○
C
The Federal Trade Commission and the cloud provider○
D
The buyer and the Federal Trade Commission