Computer Science > QUESTIONS & ANSWERS > WGU C839 Questions and Answers 100% Pass (All)
WGU C839 Questions and Answers 100% Pass Symmetric ✔✔Which encryption standard uses the same key to encrypt and decrypt messages? Skipjack ✔✔Which algorithm is designated as a Type 2 produc ... t by the National Security Agency (NSA)? X.509 v3 ✔✔What is the most commonly used format for certificates? Certificate revocation list (CRL) ✔✔What is referenced to determine if a certificate has been revoked? Sender's public key ✔✔What needs to be installed on end users' computers to allow them to trust applications that have been digitally signed by the developer? Public Certificate ✔✔Which type of certificate must be certified by an authority to verify it with other participants? It requires a unique nonce. ✔✔What is an attribute of the Rivest Cipher 4 (RC4) algorithm? Counter (CTR) ✔✔Which mode generates the key stream with a nonce and incrementing value? Counter (CTR) ✔✔Which mode is a stream algorithm that concatenates an incrementing value with a nonce? CEO's public key ✔✔Which key would an administrator use to encrypt data so only the CEO can decrypt it? Digest ✔✔What is the result of a hash function? Symmetric encryption ✔✔What is used to efficiently encrypt large files? hvxfirgb ✔✔An administrator needs to encrypt the following word with the Atbash cipher: security What is the correct ciphertext? Message Digest Algorithm 5 (MD5) ✔✔Which cryptographic algorithm has a 128-bit hash size? Collision resistance ✔✔Which characteristic makes a hashing function suitable for use in signature schemes? Partial-message collision ✔✔Which attribute of a hashing function makes a birthday attack possible? SHA-1 ✔✔Which hash algorithm produces a 160-bit output value? Previous generated ciphertext ✔✔What does cipher block chaining (CBC) use with the key to encrypt subsequent blocks of plaintext? Electronic codebook (ECB) ✔✔Which mode produces the same ciphertext from two identical plaintext blocks? Electronic codebook (ECB) ✔✔Which encryption mode is least secure? P = E (K,C) ✔✔What is the mathematical formula used for symmetric decryption? Rivest-Shamir-Adleman ✔✔Which algor [Show More]
Last updated: 3 years ago
Preview 1 out of 13 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
WGU C839 BUNDLED EXAMS QUESTIONS AND ANSWERS WITH VERIFIED SOLUTIONS
By Nutmegs 3 years ago
$15
10
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Sep 27, 2022
Number of pages
13
Written in
All
This document has been written for:
Uploaded
Sep 27, 2022
Downloads
0
Views
151
Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·