Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the WGU Courses and Certificates Introduction-to-Cryptography Questions and answers with Dumpstech

Exam Introduction-to-Cryptography Premium Access

View all detail and faqs for the Introduction-to-Cryptography exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

(Which component is used to verify the integrity of a message?)

Options:

A.

TKIP

B.

HMAC

C.

AES

D.

IV

Questions # 2:

(Which authentication method allows a customer to authenticate to a web service?)

Options:

A.

One-way server authentication

B.

End-to-end authentication

C.

Mutual authentication

D.

One-way client authentication

Questions # 3:

(Which mode of encryption uses an Initialization Vector (IV) to encrypt the first block and then uses the result to encrypt the next block?)

Options:

A.

Electronic Codebook (ECB)

B.

Cipher Block Chaining (CBC)

C.

Output Feedback (OFB)

D.

Cipher Feedback (CFB)

Questions # 4:

(An administrator has configured a Virtual Private Network (VPN) connection utilizing IPsec transport mode with Encapsulating Security Payload (ESP) between a server in the corporate office and a client computer in the remote office. In which situation can the packet content be inspected?)

Options:

A.

On devices at headquarters and offsite before being sent and after being received

B.

In the headquarters’ and offsite location’s networks after the data has been sent

C.

Only in the offsite location’s network while data is in transit

D.

Only in the headquarters’ network while data is in transit

Questions # 5:

(What are the primary characteristics of Bitcoin proof of work?)

Options:

A.

Difficult to produce and difficult to verify

B.

Difficult to produce and easy to verify

C.

Easy to produce and easy to verify

D.

Easy to produce and difficult to verify

Questions # 6:

(Which mechanism implemented in WPA-Enterprise guards against bit-flipping exploits?)

Options:

A.

Advanced Encryption Standard (AES)

B.

Pre-shared key (PSK)

C.

Message Integrity Check (MIC)

D.

Global encryption key

Questions # 7:

(Which default port must be allowed by firewalls for the key exchange of the IPsec handshaking process to be successful?)

Options:

A.

TCP 443

B.

UDP 443

C.

TCP 500

D.

UDP 500

Questions # 8:

(How often are transactions added to a blockchain?)

Options:

A.

Approximately every 10 minutes

B.

Approximately every 30 minutes

C.

Approximately every 1 hour

D.

Approximately every 24 hours

Questions # 9:

(Which type of network were VPN connections originally designed to tunnel through?)

Options:

A.

Encrypted

B.

Protected

C.

Public

D.

Private

Questions # 10:

(Which encryption process sends a list of cipher suites that are supported for encrypted communications?)

Options:

A.

Forward secrecy

B.

ServerHello

C.

ClientHello

D.

Integrity check

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions