100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU C839- TEST 2024 QUESTIONS AND ANSWERS $14.49   Add to cart

Exam (elaborations)

WGU C839- TEST 2024 QUESTIONS AND ANSWERS

 8 views  0 purchase
  • Course
  • WGU C839-
  • Institution
  • WGU C839-

WGU C839- TEST 2024 QUESTIONS AND ANSWERS

Preview 2 out of 14  pages

  • September 1, 2024
  • 14
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • WGU C839-
  • WGU C839-
avatar-seller
Teacher101
WGU C839- TEST


Which term from the list below represents the total number of possible values of
keys in a cryptographic algorithm or other security measure? - ANSWERS-- Key
space



What term from the list below best describes a number whose factors are 1 and
itself? - ANSWERS-- Prime



From the list below, what term describes a mechanism used to create number
streams with random properties? Examples include Lagged Fibonacci and
Mersenne Twister. - ANSWERS-- Pseudo-random number generator



Ticket - ANSWERS-Used to authenticate. Contains the identity of the client, the
session key, timestamp, and checksum



Ticket Granting Server (TGS) - ANSWERS-Distributes service tickets to clients with
a valid TGT, guaranteeing the authenticity of the identity for obtaining the
requested resource on the application servers.



Key Distribution Center (KDC) - ANSWERS-Server that provides the initial ticket

, Authentication Server (AS) - ANSWERS-Server that authorizes the principal and
connects them to the ticket granting server



WEP - ANSWERS-Uses RC4, employs a 40-bit key with a 24-bit IV



WPA - ANSWERS-Replaces RC4 with TKIP



WPA-2 - ANSWERS-802.11i, uses AES with CCMP



WPA-2 Enterprise - ANSWERS-WPA-802.1x, requires RADUIS, employs EAP for
authentication



What term below best describes an attack in which the attacker obtains
ciphertext corresponding to a set of plaintexts to use in an attempt to derive the
key used? - ANSWERS-- Chosen Plaintext



What are the four general steps involved with AES? - ANSWERS-- Rounds

- Initial Round

- Final Round

- Key Expansion



To be suitable for cryptography, what German Federal Office for Information
Security (BSI) criteria level (s) should a PRNG meet? - ANSWERS-- K3

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Teacher101. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $14.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

82956 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$14.49
  • (0)
  Add to cart