Secure hash standard - Study guides, Class notes & Summaries
Looking for the best study guides, study notes and summaries about Secure hash standard? On this page you'll find 361 study documents about Secure hash standard.
Page 3 out of 361 results
Sort by
-
WGU C839 OBJECTIVE ASSESSMENT 2 LATEST VERSIONS (VERSION A & B) 2024-2025 /WGU C839 INTRODUCTION TO CRYPTOGRAPHY OA ACTUAL EXAM
- Exam (elaborations) • 10 pages • 2024
-
- $10.49
- + learn more
WGU C839 OBJECTIVE ASSESSMENT 2 
LATEST VERSIONS (VERSION A & B) 
 /WGU C839 INTRODUCTION 
TO CRYPTOGRAPHY OA ACTUAL 
EXAM 
Which encryption standard uses the same key to encrypt and decrypt messages? - 
answerSymmetric 
Which algorithm is designated as a Type 2 product by the National Security Agency (NSA)? - 
answerSkipjack 
What is the most commonly used format for certificates? - answerX.509 v3 
What is referenced to determine if a certificate has been revoked? - answerCertificate 
revocatio...
-
WGU Course C839 - Intro to Cryptography Questions Correctly Answered 2023 GRADED A
- Exam (elaborations) • 31 pages • 2023
-
- $18.49
- + learn more
WGU Course C839 - Intro 
to Cryptography 
Questions Correctly 
Answered 2023 GRADED 
A 
What type of encryption uses different keys to encrypt and decrypt the message? 
A Symmetric 
B Private key 
C Secure 
D Asymmetric - Answer D 
The most widely used asymmetric encryption algorithm is what? 
A RSA 
B Vigenere 
C DES 
D Caesar Cipher - Answer A 
Original, unencrypted information is referred to as ____. 
A text 
B plaintext 
C cleantext 
D ciphertext - Answer B 
Which of the following is NOT...
-
Ethical Hacking Exam with Correct Solutions 2024
- Exam (elaborations) • 22 pages • 2024
- Available in package deal
-
- $12.49
- + learn more
Ethical Hacking Exam with Correct 
Solutions 2024 
In a wireless environment, where do we (the attacker) need to be positioned to perform a MITM attack? 
- Answer -Within wireless range of the wireless network 
What are the On-Path execution Steps in order? - Answer -1. Attacker places their system between 
computers that communicate with each other 
2. Ideally, victim should not be aware their traffic is being intercepted 
3. The attacker collects and potentially modifies data 
4. The attacker ...
-
WGU Course C839 - Intro to Cryptography Exam Questions with Correct Answers
- Exam (elaborations) • 34 pages • 2023
-
- $12.99
- + learn more
What type of encryption uses different keys to encrypt and decrypt the message? 
 
A Symmetric 
B Private key 
C Secure 
D Asymmetric Correct Answer D 
 
The most widely used asymmetric encryption algorithm is what? 
 
A RSA 
B Vigenere 
C DES 
D Caesar Cipher Correct Answer A 
 
Original, unencrypted information is referred to as ____. 
 
A text 
B plaintext 
C cleantext 
D ciphertext Correct Answer B 
 
Which of the following is NOT an asymmetric system? 
 
A PGP 
B RSA 
C SSL 
D DES Correct A...
-
WGU C839 Introduction to Cryptography Exam Questions and Answers
- Exam (elaborations) • 13 pages • 2024
-
- $12.49
- + learn more
WGU C839 Introduction to Cryptography 
Exam Questions and Answers 
Which encryption standard uses the same key to encrypt and decrypt messages? - 
Answer-Symmetric 
Which algorithm is designated as a Type 2 product by the National Security Agency 
(NSA)? -Answer-Skipjack 
What is the most commonly used format for certificates? -Answer-X.509 v3 
What is referenced to determine if a certificate has been revoked? -Answer-Certificate 
revocation list (CRL) 
What needs to be installed on end users' ...
And that's how you make extra money
-
Cryptography Final Exam (2023)- Complete Questions & Answers. (RATED A)
- Exam (elaborations) • 20 pages • 2023
- Available in package deal
-
- $12.49
- + learn more
Which encryption standard uses the same key to encrypt and decrypt messages? 
 
- Symmetric 
- Asymmetric 
- Rivest-Shamir-Adleman (RSA) 
- Digital Signature Algorithm (DSA) - ANSWER - Symmetric 
 
*Which algorithm is designated as Type 2 product by the National Security Agency (NSA)? 
 
- Pegasus 
- Secure Hash Algorithm 
- Skipjack 
- Data Encryption Standard (DES) - ANSWER - Skipjack 
 
What is the most commonly used format for certificates? 
 
- SHA-2 
- X.509 v1 
- X.509 v3 
- SHA-2 - ANSWE...
-
CREST CPSA 4, CPSA 5
- Exam (elaborations) • 20 pages • 2024
-
- $13.49
- + learn more
CREST CPSA 4, CPSA 5 
100 - answerContinue 
101 - answerSwitching Protocols 
102 - answerProcessing 
Internet Protocol Security (IPsec) - answera secure network protocol suite that 
authenticates and encrypts the packets of data sent over an Internet Protocol network 
Internet Protocol Security (IPsec) - answerused in virtual private networks (VPNs) 
number of possible TCP ports - answer65535 
number of possible UDP ports - answer65535 
RFC1918 24-bit block - answer10.0.0.0/8 
RFC1918 20-bit blo...
-
C839 Introduction to Cryptography| WGU C839| 130 QUESTIONS| WITH COMPLETE SOLUTIONS
- Exam (elaborations) • 34 pages • 2024
-
- $17.99
- + learn more
C839 Introduction to Cryptography| WGU C839| 
130 QUESTIONS| WITH COMPLETE SOLUTIONS 
A typical use is digital signatures. 
One way. You cannot "un-hash" something. 
Collision resistant. 
SAM file - ANS-File in the Windows System directory where 
hashed passwords are stored. 
salt - ANS-random bits that are used as one of the inputs to the 
hash. 
MD5 - ANS-128 bit hash, specified by RFC 1321 
not collision resistant. 
Flaw found in 1996 
MD6 - ANS-Uses a Merkle Tree-like structure to allo...
-
WGU Course C839: Intro to Cryptography Questions and Answers 2023/2024 | Latest Update Graded A+
- Exam (elaborations) • 35 pages • 2023
- Available in package deal
-
- $26.49
- + learn more
WGU Course C839: Intro to Cryptography Questions and Answers 2023/2024 | Latest Update Graded A+. This algorithm was published by the German engineering firm Seimans in 1993. It is 
a software based stream cipher using Lagged Fibonacci generator along with a 
concept borrowed from the shrinking generator ciphers. 
A RC4 
B Blowfish 
C FISH 
D Twofish - Answer C 
Which of the following is NOT required for a hash? 
A Minimum key length of 256 bits 
B Variable-length input, fixed-length output 
C N...
-
CSIA 300 Final Prep
- Exam (elaborations) • 37 pages • 2024
-
- $10.99
- + learn more
CSIA 300 Final Prep 
 
Which of the following phases of a system development life-cycle is most concerned with 
authenticating users and processes to ensure appropriate access control decisions? - 
Operation and maintenance 
 
What is the effective key size of DES? - 56 bit 
 
What are two types of ciphers? - Transposition and substitution 
 
When block chaining cryptography is used, what type of code is calculated and appended to the 
data to ensure authenticity? - Message authentication code 
...
Did you know that on average a seller on Stuvia earns $82 per month selling study resources? Hmm, hint, hint. Discover all about earning on Stuvia