WGU Cryptography

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/164

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

165 Terms

1
New cards

128

The hash value in bits for MD5 is ____.

A. 128

B. 160

C. 256

2
New cards

variable; fixed

Hashing involves taking a _____ length input and producing a _____ length output (message digest).

A. fixed; fixed

B. variable; fixed

C. fixed; variable

3
New cards

160

The hash value in bits for SHA-1 is ____.

A. 128

B. 160

C. 256

4
New cards

128

The hash value in bits for MD4 is ____.

A. 128

B. 160

C. 256

5
New cards

Transport

IPSec ______ mode involves "end-to-end" encryption; i.e. data remains encrypted from the time it leaves a sender's device to the time it arrives at the receiver's device.

A. Tunnel

B. Transport

C. Trusted

6
New cards

Tunnel

IPSec ______ mode involves encryption from gateway to gateway, i.e. just through the public network space.

A. Tunnel

B. Transport

C. Trusted

7
New cards

Tunnel

Remember, with tunnel mode, encryption does not happen until just before it leaves the local network. Traffic likely remains unencrypted between the end user device and the local network boundary.

A security analyst on a local network using monitoring tools is likely to only be able to read contents of traffic encrypted using IPSec ______ mode.

A. Tunnel

B. Transport

C. Trusted

8
New cards

Chaskey

_____ is a lightweight cryptography method for signing messages (MAC). It boasts a relatively undemanding hardware implementation (only ~3,333 gates required at 1MHz clock rate) making it suitable for IoT implementation.

9
New cards

128

Chaskey has a key size of _____ bits.

A. 256

B. 128

C. 80

10
New cards

salt

A weakness of one-way hashing is that the same piece of plaintext will result in the same ciphertext unless _____ is applied.

A. Salt

B. Ash

C. Ether

11
New cards

40

The minimum recommended key size to use with RC4 is _____ bits.

A. 40

B. 20

C. 64

12
New cards

2048

RC4 is a symmetric stream cipher with a variable key size up to a max of _____ bits.

A. 256

B. 2048

C. 1024

13
New cards

Data Encryption Standard (DES)

_____ has a block size of 64 bits, key size of 56 bits, and 16 rounds of substitution & transposition.

A. DES

B. AES

C. RC4

14
New cards

rainbow table

A(n) _____ is a collection of precomputed hash values of actual plaintext passwords used for password cracking.

A. initialization vector

B. key pair

C. rainbow table

15
New cards

.cer

_____ is a common x.509 certificate file type that is used with both PEM and DER formats.

A. .crt

B. .cer

C. .der

16
New cards

Triple Data Encryption Standard (3DES)

_____ has a block size of 64 bits, key size of 112 bits, and 48 rounds of substitution & transposition.

A. DES

B. RSA

C. 3DES

17
New cards

128, 192, 256

Key sizes used with the Advanced Encryption Standard (AES) include _____. _____, or _____.

A. 10, 12, 14

B. 128, 192, 256

C. 32, 64, 80

18
New cards

128

The Advanced Encryption Standard (AES) operates using _____ bit blocks.

A. 128

B. 192

C. 256

19
New cards

80

Skipjack is a symmetric block cipher that uses a ______ bit key.

A. 64

B. 80

C. 112

20
New cards

128-bit key size; 64-bit IV

Enocoro operates with a key size of ______ bits and an initialization vector (IV) of _____ bits.

A. 80; 80

B. 128; 64

C. 80; 64

21
New cards

64

Skipjack has a block size of _____bits.

A. 64

B. 80

C. 128

22
New cards

Light-weight hashing algorithms

PHOTON, SPONGENT, Lesamnta-LW, and Quark are examples of light-weight _____.

A. hashing algorithms

B. public-key algorithms

C. symmetric block ciphers

23
New cards

IDEA

_____ has a block size of 64 bits, key size of 128 bits, and >17 rounds of substitution & transposition.

A. RSA

B. DSA

C. IDEA

24
New cards

RSA

_______ is a partially homomorphic crypto system that leverages prime number characteristics, operates with a 1024-4096 bit variable key size, and 1 round.

A. RSA

B. Diffie-Hellman

C. Chaskey

25
New cards

Symmetric Block

Blowfish and Twofish are both _____ ciphers with common key sizes of 128, 192, or 256 bits.

A. symmetric block

B. symmetric stream

C. asymmetric

26
New cards

RC5

_____ is a symmetric block cipher that uses block sizes of 32, 64, or 128 bits and boasts a variable key size up to 2048 bits.

A. RC2

B. RC4

C. RC5

27
New cards

64 or 112

Quark produces a hash value of _____bits.

A. 128

B. 64 or 112

C. 80 or 128

28
New cards

64

The block size used with XTEA is _____ bits.

A. 56

B. 64

C. 80

29
New cards

128

The key size used with XTEA is _____ bits.

A. 128

B. 256

C. 2048

30
New cards

Symmetric block cipher

Camelia is a _____.

A. Hash Algorithm

B. Symmetric block cipher

C. Symmetric key exchange algorithm

31
New cards

Symmetric Block Cipher

RC6 can best be described as a _____.

A. Lightweight Hash Algorithm

B. Symmetric Stream Cipher

C. Symmetric Block Cipher

32
New cards

40

RC2 has a block size of 64 bits and variable key size up to 128 bits. What is the minimum recommended key size to use when employing RC2?

A. 1

B. 40

C. 64

33
New cards

80; 80

The light-weight symmetric steam cipher Mickey v2 operates with a key size of ______ bits and an initialization vector (IV) variable up to _____ bits.

A. 80; 80

B. 64; 128

C. 128; 64

34
New cards

Symmetric stream cipher

RC4 is a(n) _____.

A. Symmetric block cipher

B. Symmetric stream cipher

C. Asymmetric algorithm

35
New cards

certificate signing request (CSR)

An entity seeking to obtain a digital certificate must generate and submit a _____ request to a certificate authority to request the certificate.

A. certificate binding

B. certificate signing

C. certificate initialization

36
New cards

Symmetric stream cipher

ChaCha is a(n) _____.

A. Symmetric block cipher

B. Symmetric stream cipher

C. Asymmetric algorithm

37
New cards

Asymmetric algorithms

RSA and DSA are both_____.

A. Hash algorithms

B. Symmetric stream ciphers

C. Asymmetric algorithms

38
New cards

Diffie-Hellman

_____ provides a method for key exchange using a one-way function.

A. A hash algorithm

B. Quark

C. Diffie-Hellman

39
New cards

Chaskey

_____ is a Lightweight cryptography method for signing messages (MAC).

A. Chaskey

B. Diffie-Hellman

C. Vigenere

40
New cards

40

WEP uses _____-bit RC4.

A. 40

B. 128

C. 256

41
New cards

asymmetric key pair

An entity seeking to obtain a digital certificate must first generate a _____ for themselves.

A. secret key

B. asymmetric key pair

C. registration authority

42
New cards

128

WPA uses _____-bit RC4.

A. 40

B. 128

C. 256

43
New cards

AES

Wi-Fi Protected Access 2 (WPA2) uses 128-bit _____.

A. RC4

B. AES

C. ECC

44
New cards

Mono-alphabetic

_____ substitution is where a single mapping from our alphabet to a cipher alphabet is created.

A. Mono-alphabetic

B. Polyalphabetic

C. Pseudo-random

45
New cards

Sign the certificate with the CA's own private key

What step will a certificate authority (CA) take after generating a digital certificate for a requester, but before issuing the certificate to that requester?

A. Sign the certificate with the CA's own private key

B. Sign the certificate with the CA's own public key

C. Sign the certificate with the requester's private key

46
New cards

Polyalphabetic

_______ refers to the mapping of our alphabet to a number of cipher alphabets.

A. Mono-alphabetic

B. Polyalphabetic

C. Pseudo-random

47
New cards

One-time pad

_____ is considered to be unbreakable since it only uses its cipher code once.

48
New cards

ASCII

_____ encoding involves 8-bit values and supports up to 256 characters.

49
New cards

collision

A _____ occurs when two different input values produce the same hash signature.

A. collision

B. rainbow

C. tunnel

50
New cards

UTF-16

_____ is an encoding method with 16-bit values and supports up to 65,536 characters.

51
New cards

80; 80

The light-weight symmetric stream cipher Trivium operates with a key size of ______ bits and an initialization vector (IV) of _____ bits.

A. 80; 80

B. 64; 128

C. 128; 64

52
New cards

hardware security module (HSM)

A _____ is a tamper-evident and intrusion-resistant physical device that safeguards and manages cryptographic keys and provides cryptographic processing.

A. TPM

B. HSM

C. DES

53
New cards

trusted platform module (TPM)

A _____ is a dedicated processor that handles hardware-level encryption; allows the use of full disk encryption on a hard drive in a manner that minimizes the impact on system performance.

A. TPM

B. HSM

C. PRNG

54
New cards

HMAC

_____ is a message authentication code (MAC) that can be used to verify the integrity and authentication of the message. It involves hashing the message with a secret key, and thus differs from standard hashing, which is purely a one-way function.

A. HMAC

B. Rainbow table

C. Key escrow

55
New cards

Symmetric

_____ ciphers make use of a single secret key for both encryption and decryption.

56
New cards

01011

Solve by applying the binary XOR function.

1 1 0 1 1

1 0 0 0 0

A. 11011

B. 10000

C. 01011

57
New cards

10000

Solve by applying the binary AND function.

11011

10000

A. 11011

B. 10000

C. 01011

58
New cards

11011

Solve by applying the binary OR function.

11011

10000

A. 11011

B. 10000

C. 01011

59
New cards

1

15 mod 7 = _____

A. 5

B. 2.14

C. 1

60
New cards

5

12 mod 7 = _____

A. 5

B. 1.7

C. 1

61
New cards

Block, Stream

The two types of symmetric ciphers are _____ and _____

A. Block, Stream

B. CTR, DES

C. Active, Passive

62
New cards

Public key

When encrypting data using asymmetric cryptography, which key should be shared or distributed to facilitate decryption?

A. Secret key

B. Private key

C. Public key

63
New cards

Block cipher modes

_____ are used to manage how blocks of data are processed in symmetric encryption.

A. Stream ciphers

B. Block cipher modes

C. Padding

64
New cards

CFB, OFB, CTR

Which symmetric block cipher modes enable the block cipher to operate like a stream cipher?

A. ECB, DES, ECC

B. CFB, OFB, CTR

C. DSA, RSA, RC6

65
New cards

S-boxes

Symmetric block ciphers make use of _____ to perform substitution as part the encryption process.

A. p-boxes

B. s-boxes

C. IVs

66
New cards

64

PRESENT is a light-weight symmetric block cipher with a key size of 80 or 128 bits, 32 rounds, and ______ bit block size.

A. 32

B. 64

C. 128

67
New cards

Asymmetric

______ cryptography makes use of a key pair (one public, one private) to perform encryption and decryption. If a given key in a key pair is used for encryption, only the opposite key in that key pair can perform the reverse decryption.

A. Symmetric

B. Asymmetric

C. Hash

68
New cards

Secret key

When encrypting data using symmetric cryptography, which key may need to be exchanged to facilitate decryption?

A. Secret key

B. Private key

C. Public key

69
New cards

2048

RC5 is a conventional symmetric block cipher that is suitable for light-weight implementations. It has a variable key size with a max of _____bits.

A. 128

B. 256

C. 2048

70
New cards

128 bit blocks; 128, 192, or 256 bit keys

What is the block and key size in bits used by the light-weight symmetric block cipher CLEFIA?

A. 64 bit blocks; 64 bit keys

B. 64 or 80 bit blocks; 128 bit keys

C. 128 bit blocks; 128, 192, or 256 bit keys

71
New cards

Sue's private key

If Shawn employs public key cryptography to send Sue a digitally signed message, which key will Sue use to decrypt the message?

A. Sue's private key

B. Shawn's private key

C. Sue's public key

72
New cards

Cramer-Shoup

_____ is a public key encryption method that is an extension of El Gamal but adds a one-way hashing method which protects against an adaptive chosen ciphertext attack.

A. Cramer-Shoup

B. Ephemeral

C. Key Clustering

73
New cards

Homomorphic

With _____ encryption, we can perform mathematical operations on ciphered values i.e., before decryption.

A. Polyalphabetic

B. Homomorphic

C. Quantum

74
New cards

TOTP

_____ allows for a new unique passcode to be created for each instance, based on an initial seed and for a given time period.

A. One Time Passwords (OTP)

B. Hashed One Time Passwords (HOTP)

C. Timed One Time Password (TOTP)

75
New cards

PEM

Which encoding scheme for x.509 certificates supports Base64 and ASCII formats?

A. DER

B. PEM

C. MAC

76
New cards

Shawn's private key

If Shawn plans to employ asymmetric cryptography to send Sue a digitally signed message, which key will Shawn use to sign the message?

A. Sue's private key

B. Shawn's private key

C. Sue's public key

77
New cards

Shawn's public key

If Shawn employs public key cryptography to send Sue a digitally signed message, which key will Sue use to verify the message?

A. Sue's private key

B. Shawn's public key

C. Sue's public key

78
New cards

symmetric stream

Rabbit, Mickey v2, Trivium, Grain, and Enocoro are examples of light-weight _____ ciphers.

A. Symmetric block

B. Symmetric stream

C. Public-key

79
New cards

Sue's public key

If Shawn plans to employ public key cryptography to send Sue a digitally signed message, which key will Shawn use to encrypt the message?

A. Sue's private key

B. Sue's public key

C. Shawn's public key

80
New cards

DER

Which encoding scheme for x.509 certificates supports binary formats?

A. DER

B. PEM

C. MAC

81
New cards

Hashing

_____ describes one-way or irreversible encryption used for protecting the integrity of data and in authentication applications.

A. Symmetric encryption

B. Hashing

C. Key escrow

82
New cards

conventional

NIST categorizes servers, desktops, tablets and smart phones as devices within the device spectrum for _____cryptography.

A. non-cryptographic

B. light-weight

C. conventional

83
New cards

light-weight

NIST categorizes embedded systems, RFID, and sensor networks as devices within the device spectrum for _____cryptography.

A. non-cryptographic

B. light-weight

C. conventional

84
New cards

HOTP

_____ allows a new unique passcode to be created each instance, based on a counter value and an initial seed.

A. One Time Passwords (OTP)

B. Hashed One Time Passwords (HOTP)

C. Timed One Time Password (TOTP)

85
New cards

Quantum

_____ computers have fast multiplication circuits, and thus can be used to perform multiplications and search a range of prime numbers at a speed which would break most existing RSA implementations.

A.RFID

B. Quantum

C. Light-weight

86
New cards

SIMON

_____ is a light-weight symmetric block cipher with variable block sizes, key sizes, and rounds, that is optimized for

hardware implementations.

A. SIMON

B. SPECK

C. PRESENT

87
New cards

SPECK

_____ is a light-weight symmetric block cipher with variable block sizes, key sizes, and rounds, that is optimized for

software implementations.

A. SIMON

B. SPECK

C. PRESENT

88
New cards

AES

PRESENT is a symmetric block cipher that was one of the first to be considered as a(n) _____ replacement for light-weight implementations.

A. AES

B. BIFID

C. CBC

89
New cards

128 bit keys; 64 bit IV

Rabbit operates with a key size of ______ bits and an initialization vector (IV) of _____ bits.

A. 80; 80

B. 64; 128

C. 128; 64

90
New cards

Skipjack

______ is a secret key encryption algorithm, designed by the NSA, and was used with the Clipper chip.

A. Blowfish

B. Twofish

C. Skipjack

91
New cards

24

The IV used with WEP is ____ bits.

A. 24

B. 48

C 12

92
New cards

48

The IV used with WPA is _____ bits.

A. 24

B. 48

C 12

93
New cards

PSK; enterprise

Two variations of WPA are ____ and ____.

A. MIC; MOC

B. PSK; enterprise

C. transport; tunnel

94
New cards

3GPP

A5/3 is for _____ , and is based on the MISTY1 cipher.

A. key transport

B. GSM

C. 3GPP

95
New cards

GSM

A5/1 is designed to be used for the _____ network.

A. key transport

B. GSM

C. 3GPP

96
New cards

ChaCha20

Google proposed _____ as an alternative to AES to be used with TLS connections.

A. ChaCha20

B. DES

C. WPA

97
New cards

Elli

_____ is a light-weight public key solution that uses Elliptic Curves along with a Diffie-Hellman related handshake between the RFID tag and the RFID reader in RFID implementations.

A. ECC

B. AES

C. Elli

98
New cards

non-cryptographic

Buzhash, Cityhash, Spookyhash, and Bernstein are examples of _______ hash solutions.

A. light-weight

B. quantum

C. non-cryptographic

99
New cards

OTP

_____ allow for a new unique passcode to be created for each instance based on an initial seed.

A. One Time Passwords (OTP)

B. Hashed One Time Passwords (HOTP)

C. Timed One Time Password (TOTP)

100
New cards

UDP port 500

The IPSec handshake takes place on UDP port _____ for key exchange.

A. 500

B. 50

C. 51