WGU Into to Cryptography

0.0(0)
studied byStudied by 0 people
0.0(0)
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/59

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 2:03 AM on 2/3/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

60 Terms

1
New cards

Private key of the root CA

A business wants to use keys issued by a trusted third party to demonstrate to potential customers that it is a legitimate organization.Which key is used to sign the certificate issued to the business?

2
New cards

Public key of the company

A business wants to use keys issued by a trusted third party to demonstrate it is a legitimate organization to potential customers.Which key should the business send to potential customers to prove its identity?

3
New cards

Public Key Cryptography Standard (PKCS) #12

What should an administrator use to import and export all items written using X.509 that are part of a chain of trust?

4
New cards

Thumbprint

Which field displays the hash, or digest, of the certificate in an X.509 certificate?

5
New cards

Employee A's private key

Employee B sends Employee A an encrypted message.What does Employee A use to decrypt the message from Employee B?

6
New cards

AES

What is an example of a symmetric algorithm?

7
New cards

Cryptographic algorithm and Cryptographic key

Which two components involved in performing encryption are known to the party that will perform decryption before symmetric encryption is applied?Choose 2 answers.

8
New cards

Employee B's public key

Employee A created a secret key and wants to send it to Employee B without any coworkers being able to decrypt the message.Which key needs to encrypt the message?

9
New cards

ECB

Which mode encrypts each group with the same key, leaving each group independent of the others?

10
New cards

Electronic Code Book (ECB)

Which mode of block encryption results in the same outcome for matching blocks of a plaintext message?

11
New cards

Uses an initialization vector (IV) to encrypt the first block, then uses the result of the encryption to encrypt the next block

How does CBC mode encryption function?

12
New cards

ECB

Which encryption mode always produces the same result for the same plaintext?

13
New cards

Skipjack

Which information protection method has an 80-bit key and operates on 64-bit data blocks?

14
New cards

12

How many transformation rounds does AES use with a 192-bit key?

15
New cards

10

How many transformation rounds does AES use with a 128-bit key?

16
New cards

AES

Which encryption algorithm did the National Institute of Standards and Technology (NIST) designate as a specification for the encryption of electronic information?

17
New cards

The entire hash is different.

What happens to the hash of a file if it is rehashed after the first character of the file is changed?

18
New cards

128

What is the length (in bits) of an MD5 hash output?

19
New cards

14

How many characters are used in an LM hash password?

20
New cards

NTLM

A Windows credential is identified as follows: user:FDA95FBABC199D22LLD3B435B51876KK:199DDFD4EF0E9CD9KMNC6FE771IL124B8:::What is used to store this password?

21
New cards

Precompiled list of hash values

What is a rainbow table?

22
New cards

Stream

Which type of cipher is ChaCha?

23
New cards

40 bits

What is the key size for RC4 with WEP?

24
New cards

DES

Which symmetric encryption technique uses a 56-bit key size and a 64-bit block size?

25
New cards

WPA

Which wireless security standard uses a 128-bit RC4 stream cipher for encrypted communications?

26
New cards

Symmetric

A security analyst decrypted a data set with the same key that originally encrypted the data set.Which cryptographic operation did the analyst use?

27
New cards

Symmetric block

What should be used when large amounts of data need to be encrypted and decrypted for secure storage based on groupings of 128, 192, or 256 bits?

28
New cards

It uses the same key to encrypt and decrypt large amounts of media.

Why is symmetric stream used to encrypt video when speed is a major concern?

29
New cards

It encrypts a small amount of information, which is decrypted with the corresponding private key.

Why should an asymmetric public key be used to encrypt a symmetric key that is being sent to one person?

30
New cards

Man-in-the-middle

Which type of attacks are Diffie-Hellman methods vulnerable to?

31
New cards

Output feedback (OFB) loop

Which mechanism mitigates a copy-and-paste attack when using AES?

32
New cards

ECDH

Which mechanism can be used to ensure perfect forward secrecy during key exchange when using symmetric encryption?

33
New cards

Forward secrecy

Which encryption component ensures that the compromise of a long-term key prevents the compromise of any previous session keys?

34
New cards

Distributed peer-to-peer network

How is information about Bitcoin transactions stored?

35
New cards

Adding blocks to a blockchain is computationally expensive.

What is one of the primary characteristics of a blockchain in the context of Bitcoin?

36
New cards

256

What is the length (in bits) of the private key used to sign transactions and associated with an individual wallet in the context of Bitcoin?

37
New cards

Only has factors of itself and 1

What defines a prime number?

38
New cards

5

What is 29 mod 12?

39
New cards

Initialization vector

What can XOR use as a pseudorandom number to create unique ciphertext?

40
New cards

Uses the results of the IV to encrypt the next block

How does cipher block chaining (CBC) create randomness in a second block after encrypting the first block with an initialization vector (IV)?

41
New cards

Issued

Which certificate management process involves key recovery?

42
New cards

Signing it with its private key

Which task does a root CA perform before publishing its own certificate?

43
New cards

SHA-1

Which algorithm is used to generate the thumbprint of a certificate?

44
New cards

Encrypt by using symmetric keys and distribute by using asymmetric keys

Large volumes of plaintext need to be encrypted, and the encryption keys need to be securely distributed.Which approach should be used for encryption and distribution?

45
New cards

A public key is used for encryption, and a private key is used for decryption.

What is the role of a key in asymmetric encryption and decryption?

46
New cards

Digital signature

A security analyst is validating the integrity and authenticity of a data transaction.Which PKI component is being used?

47
New cards

Certificate authority (CA)

Which PKI component generates digital certificates?

48
New cards

40

What is the maximum length (in bits) of encryption keys used by the WEP protocol?

49
New cards

Support for an authentication server

What is a difference between WPA-Enterprise and WPA-Personal?

50
New cards

RC4

Which cipher is used with WEP?

51
New cards

Hashes the initialization vector and secret key

How does TKIP improve WPA over WEP?

52
New cards

At the headquarters and the offsite location

An administrator has configured a virtual private network (VPN) connection utilizing IPsec tunnel mode with Encapsulating Security Payload (ESP) between the corporate office and a remote office.Where can the packets be inspected by intrusion detection systems (IDSs) and virus scanners?

53
New cards

UDP 500

Which default port must be open for the IPsec key exchange to be successful?

54
New cards

51

Which protocol indicates the virtual private network (VPN) is using Authentication Header (AH)?

55
New cards

Bifid

Which cipher uses a grid to map letters into numeric values?

56
New cards

Playfair

Which cipher uses a five-by-five matrix with nonrepeating characters?

57
New cards

Analyzing ciphertext to identify text variation and comparing the text to standard English characters

What does a frequency analysis attack to break encryption involve?

58
New cards

Kasiski examination

Which technique should a security analyst use to determine the key length in a Vigenère cipher?

59
New cards

Brute-force

Which attack tries every combination of letters, numbers, and special characters?

60
New cards

Takes a list of the most common words and tries each entry

How does a dictionary attack break a cipher?

Explore top flashcards