Package deal
WGU C839 Bundled Exams with Complete Solution | Verified | Everything you Need!!
WGU C839 Bundled Exams with Complete Solution | Verified | Everything you Need!!
[Show more]WGU C839 Bundled Exams with Complete Solution | Verified | Everything you Need!!
[Show more]These are usually the encryption of a message digest with the senders private key. 
In order to verify them, the recipient uses the senders public key. 
They are considered good if they provide the following. 
Authentication 
Integrity 
Non-repudiation - -Digital Signature 
It is a digital document ...
Preview 2 out of 11 pages
Add to cartThese are usually the encryption of a message digest with the senders private key. 
In order to verify them, the recipient uses the senders public key. 
They are considered good if they provide the following. 
Authentication 
Integrity 
Non-repudiation - -Digital Signature 
It is a digital document ...
What type of encryption uses different keys to encrypt and decrypt the message? 
A Symmetric 
B Private key 
C Secure 
D Asymmetric - -D 
The most widely used asymmetric encryption algorithm is what? 
A RSA 
B Vigenere 
C DES 
D Caesar Cipher - -A 
Original, unencrypted information is referred to as...
Preview 4 out of 45 pages
Add to cartWhat type of encryption uses different keys to encrypt and decrypt the message? 
A Symmetric 
B Private key 
C Secure 
D Asymmetric - -D 
The most widely used asymmetric encryption algorithm is what? 
A RSA 
B Vigenere 
C DES 
D Caesar Cipher - -A 
Original, unencrypted information is referred to as...
What type of encryption uses different keys to encrypt and decrypt the message? 
A Symmetric 
B Private key 
C Secure 
D Asymmetric - -D 
The most widely used asymmetric encryption algorithm is what? 
A RSA 
B Vigenere 
C DES 
D Caesar Cipher - -A 
Original, unencrypted information is referred to as...
Preview 4 out of 45 pages
Add to cartWhat type of encryption uses different keys to encrypt and decrypt the message? 
A Symmetric 
B Private key 
C Secure 
D Asymmetric - -D 
The most widely used asymmetric encryption algorithm is what? 
A RSA 
B Vigenere 
C DES 
D Caesar Cipher - -A 
Original, unencrypted information is referred to as...
Symmetric - -Which encryption standard uses the same key to encrypt and decrypt messages? 
Skipjack - -Which algorithm is designated as a Type 2 product by the National Security Agency (NSA)? 
X.509 v3 - -What is the most commonly used format for certificates? 
Certificate revocation list (CRL) - -W...
Preview 2 out of 13 pages
Add to cartSymmetric - -Which encryption standard uses the same key to encrypt and decrypt messages? 
Skipjack - -Which algorithm is designated as a Type 2 product by the National Security Agency (NSA)? 
X.509 v3 - -What is the most commonly used format for certificates? 
Certificate revocation list (CRL) - -W...
1. A business wants to use keys issued by a trusted third party to demonstrate to potential customers 
that it is a legitimate organization. 
Which key is used to sign the certificate issued to the business? 
Private key of the root CA 
Public key of the root CA 
Private key of the company 
Public k...
Preview 3 out of 17 pages
Add to cart1. A business wants to use keys issued by a trusted third party to demonstrate to potential customers 
that it is a legitimate organization. 
Which key is used to sign the certificate issued to the business? 
Private key of the root CA 
Public key of the root CA 
Private key of the company 
Public k...
Which encryption standard uses the same key to encrypt and decrypt messages? - -Symmetric Key 
Encryption 
Which algorithm is designated as a Type 2 product by the National Security Agency (NSA)? - - 
SKIPJACK 
What is the most commonly used format for certificates? - -X.509 v3 *Version 3* 
What is ...
Preview 2 out of 8 pages
Add to cartWhich encryption standard uses the same key to encrypt and decrypt messages? - -Symmetric Key 
Encryption 
Which algorithm is designated as a Type 2 product by the National Security Agency (NSA)? - - 
SKIPJACK 
What is the most commonly used format for certificates? - -X.509 v3 *Version 3* 
What is ...
What produces the same ciphertext from identical plaintext? - -Electronic Codebook (ECB) 
Vulnerability of DES - -Key length is too short 
________ includes a provision for the decryption key in escrow. - -Skipijack 
__________ combines hashing, data compression, symmetric key, and PKI functions. - ...
Preview 2 out of 5 pages
Add to cartWhat produces the same ciphertext from identical plaintext? - -Electronic Codebook (ECB) 
Vulnerability of DES - -Key length is too short 
________ includes a provision for the decryption key in escrow. - -Skipijack 
__________ combines hashing, data compression, symmetric key, and PKI functions. - ...
The same key is used to encrypt messages as well as decrypt messages. These algorithms are always 
faster but have an issue with exchanging keys. - -Symmetric Cryptography 
Modern cryptography began when Claude Shannon publish "Communication Theory of Secrecy Systems" 
in 1949. He focused on this co...
Preview 2 out of 11 pages
Add to cartThe same key is used to encrypt messages as well as decrypt messages. These algorithms are always 
faster but have an issue with exchanging keys. - -Symmetric Cryptography 
Modern cryptography began when Claude Shannon publish "Communication Theory of Secrecy Systems" 
in 1949. He focused on this co...
The same key is used to encrypt messages as well as decrypt messages. These algorithms are always 
faster but have an issue with exchanging keys. - -Symmetric Cryptography 
Modern cryptography began when Claude Shannon publish "Communication Theory of Secrecy Systems" 
in 1949. He focused on this ...
Preview 2 out of 11 pages
Add to cartThe same key is used to encrypt messages as well as decrypt messages. These algorithms are always 
faster but have an issue with exchanging keys. - -Symmetric Cryptography 
Modern cryptography began when Claude Shannon publish "Communication Theory of Secrecy Systems" 
in 1949. He focused on this ...
Consists of public and private keys 
The public key is made public by publishing to a directory or installed on a computer. 
The private key is kept secret 
Does not involve exchanging a secret key or key exchange 
The public key is used to encrypt messages only the recipients private key can decryp...
Preview 2 out of 6 pages
Add to cartConsists of public and private keys 
The public key is made public by publishing to a directory or installed on a computer. 
The private key is kept secret 
Does not involve exchanging a secret key or key exchange 
The public key is used to encrypt messages only the recipients private key can decryp...
Finding any method to decrypt the message that is more efficient that simple brute force attempts. - 
-Breaking Ciphers 
Simply trying every possible key to decrypt a message - -Brute Force 
Using other techniques to attempt to derive the key, can be used to test the efficacy of a cryptographic 
alg...
Preview 1 out of 3 pages
Add to cartFinding any method to decrypt the message that is more efficient that simple brute force attempts. - 
-Breaking Ciphers 
Simply trying every possible key to decrypt a message - -Brute Force 
Using other techniques to attempt to derive the key, can be used to test the efficacy of a cryptographic 
alg...
Most primitive of cryptographic algorithms, substitutes one character of cipher text for each character of 
plain text. Includes 
Caesar Cipher 
Atbash Cipher 
Affine Cipher 
Rot13 Cipher - -Mono-Alphabet Substitution 
First used by Julius Caesar 
Every letter is shifted a fixed number of spaces to ...
Preview 1 out of 4 pages
Add to cartMost primitive of cryptographic algorithms, substitutes one character of cipher text for each character of 
plain text. Includes 
Caesar Cipher 
Atbash Cipher 
Affine Cipher 
Rot13 Cipher - -Mono-Alphabet Substitution 
First used by Julius Caesar 
Every letter is shifted a fixed number of spaces to ...
These are usually the encryption of a message digest with the senders private key. 
In order to verify them, the recipient uses the senders public key. 
They are considered good if they provide the following. 
Authentication 
Integrity 
Non-repudiation - -Digital Signature 
It is a digital document ...
Preview 2 out of 11 pages
Add to cartThese are usually the encryption of a message digest with the senders private key. 
In order to verify them, the recipient uses the senders public key. 
They are considered good if they provide the following. 
Authentication 
Integrity 
Non-repudiation - -Digital Signature 
It is a digital document ...
AES is ___ 
a. Asymmetric 
b. Symmetric - -B 
Serpent is ___ 
a. Asymmetric 
b. Symmetric - -B 
Two Fish is ___ 
a. Asymmetric 
b. Symmetric - -B 
RC5 & RC6 is ___ 
a. Asymmetric 
b. Symmetric - -B 
IDEA is ___ 
a. Asymmetric 
b. Symmetric - -B 
TEA is ___ 
a. Asymmetric 
b. Symmetric - -B
Preview 4 out of 41 pages
Add to cartAES is ___ 
a. Asymmetric 
b. Symmetric - -B 
Serpent is ___ 
a. Asymmetric 
b. Symmetric - -B 
Two Fish is ___ 
a. Asymmetric 
b. Symmetric - -B 
RC5 & RC6 is ___ 
a. Asymmetric 
b. Symmetric - -B 
IDEA is ___ 
a. Asymmetric 
b. Symmetric - -B 
TEA is ___ 
a. Asymmetric 
b. Symmetric - -B
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller Preach. Stuvia facilitates payment to the seller.
No, you only buy these notes for £32.28. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
83100 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy revision notes and other study material for 14 years now