Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

Introduction-to-Cryptography Exam Dumps - WGU Courses and Certificates Questions and Answers

Question # 4

(What is an alternative to using a Certificate Revocation List (CRL) with certificates?)

Options:

A.

Privacy Enhanced Mail (PEM)

B.

Online Certificate Status Protocol (OCSP)

C.

Root Certificate Authority (CA)

D.

Policy Certificate Authority (CA)

Buy Now
Question # 5

(What is the length of the Initialization Vector (IV) in WEP?)

Options:

A.

24 bits

B.

40 bits

C.

48 bits

D.

56 bits

Buy Now
Question # 6

(A security analyst uses a polyalphabetic substitution cipher with a keyword of YELLOW to encrypt a message. Which cipher should be used to encrypt the message?)

Options:

A.

Pigpen

B.

Caesar

C.

Vigenère

D.

Playfair

Buy Now
Question # 7

(Which component is used to verify the integrity of a message?)

Options:

A.

TKIP

B.

HMAC

C.

AES

D.

IV

Buy Now
Question # 8

(Which type of exploit involves looking for different inputs that generate the same hash?)

Options:

A.

Birthday attack

B.

Linear cryptanalysis

C.

Algebraic attack

D.

Differential cryptanalysis

Buy Now
Question # 9

(A Linux user password is identified as follows:

$2a$08$AbCh0RCM8p8FGaYvRLI0H.Kng54gcnWCOQYIhas708UEZRQQjGBh4

Which hash algorithm should be used to salt this password?)

Options:

A.

NTLM

B.

SHA-512

C.

MD5

D.

bcrypt

Buy Now
Question # 10

(What is the value of 23 mod 6?)

Options:

A.

03

B.

04

C.

05

D.

06

Buy Now
Question # 11

(A security engineer is implementing device authentication as a form of two-factor authentication in a Public Key Infrastructure (PKI) environment. What should be used as a second form of authentication?)

Options:

A.

Symmetric encryption

B.

Digital certificate

C.

Asymmetric encryption

D.

Digital signature

Buy Now
Question # 12

(Which cryptographic operation has the fastest decryption process?)

Options:

A.

Padding

B.

Symmetric

C.

Hashing

D.

Asymmetric

Buy Now
Question # 13

(Which mode of encryption uses an Initialization Vector (IV) to encrypt the first block and then uses the result to encrypt the next block?)

Options:

A.

Electronic Codebook (ECB)

B.

Cipher Block Chaining (CBC)

C.

Output Feedback (OFB)

D.

Cipher Feedback (CFB)

Buy Now
Exam Name: WGU Introduction to Cryptography HNO1
Last Update: May 21, 2026
Questions: 93
Introduction-to-Cryptography pdf

Introduction-to-Cryptography PDF

$25.5  $84.99
Introduction-to-Cryptography Engine

Introduction-to-Cryptography Testing Engine

$28.5  $94.99
Introduction-to-Cryptography PDF + Engine

Introduction-to-Cryptography PDF + Testing Engine

$40.5  $134.99