OA Exams

  • California, TX 70240
  • Info@gmail.com
  • Office Hours: 8:00 AM – 7:45 PM
  • web.groovymark@gmail.com
  • November 28, 2024

Question 01

Which cryptographic method is based on the difficulty of factoring large prime numbers?

a) AES
b) RSA
c) ECC
d) Blowfish

Correct Answer: b) RSA

Explanation: RSA encryption is based on the mathematical challenge of factoring large prime numbers, which makes it secure but computationally intensive.

Question 02

Which cipher uses a 5×5 matrix to encrypt and decrypt messages?

a) Playfair
b) Caesar
c) Vigenère
d) Rail Fence

Correct Answer: a) Playfair

Explanation: The Playfair cipher uses a 5x5 grid of letters for encryption and decryption, where plaintext letters are replaced based on their position in the matrix.

Question 03

What is a primary characteristic of a stream cipher?

a) It encrypts data in fixed-size blocks
b) It encrypts data one bit or byte at a time
c) It always requires padding
d) It can only be used for asymmetric encryption

Correct Answer: b) It encrypts data one bit or byte at a time

Explanation: Stream ciphers encrypt data one bit or byte at a time, making them faster and suitable for real-time data transmission.

Question 04

Which of the following block cipher modes is the most vulnerable to attacks due to the lack of initialization vectors?

a) ECB
b) CBC
c) OFB
d) CTR

Correct Answer: a) ECB

Explanation: ECB mode does not use initialization vectors, which means identical plaintext blocks will produce identical ciphertext blocks, making it vulnerable to pattern analysis.

Question 05

Which encryption method is used in WPA2 to secure Wi-Fi networks?

a) DES
b) AES
c) RSA
d) Blowfish

Correct Answer: b) AES

Explanation: AES encryption is used in WPA2 to secure Wi-Fi networks because it provides strong encryption and is resistant to known vulnerabilities.

Question 06

Which of the following describes a brute-force attack?

a) An attacker tries to guess the encryption key by testing all possible combinations
b) An attacker uses frequency analysis to deduce the encryption key
c) An attacker manipulates the encryption algorithm to bypass security
d) An attacker obtains the plaintext and ciphertext to reverse-engineer the key

Correct Answer: a) An attacker tries to guess the encryption key by testing all possible combinations

Explanation: In a brute-force attack, the attacker systematically tests every possible key combination until the correct key is found.

Question 07

Which cryptographic technique allows mathematical operations to be performed on encrypted data without decrypting it first?

a) Symmetric encryption
b) Homomorphic encryption
c) Elliptic Curve Cryptography
d) Hashing

Correct Answer: b) Homomorphic encryption

Explanation: Homomorphic encryption allows for computations to be performed on encrypted data, making it useful in scenarios where data privacy must be maintained during processing.

Question 08

Which of the following hash algorithms produces a 160-bit output?

a) MD5
b) SHA-1
c) SHA-256
d) AES

Correct Answer: b) SHA-1

Explanation: SHA-1 produces a 160-bit hash output, although it is now considered weak due to vulnerability to collision attacks.

Question 09

What is the primary advantage of Elliptic Curve Cryptography (ECC) over RSA?

a) It is easier to implement
b) It uses smaller keys for the same level of security
c) It is more secure than RSA
d) It does not require a public key infrastructure

Correct Answer: b) It uses smaller keys for the same level of security

Explanation: ECC offers the same security as RSA but with much smaller key sizes, making it more efficient in terms of computational overhead and storage requirements.

Question 10

Which cipher is known for shifting each letter in the plaintext by a fixed number of positions in the alphabet?

a) Playfair
b) Caesar
c) Vigenère
d) Rail Fence

Correct Answer: b) Caesar

Explanation: The Caesar cipher is a simple substitution cipher that shifts each letter by a fixed number of positions, typically by three.

Question 11

Which of the following is an example of a block cipher?

a) AES
b) RC4
c) ChaCha20
d) One-time pad

Correct Answer: a) AES

Explanation: AES is a block cipher, meaning it encrypts data in fixed-size blocks, as opposed to stream ciphers like RC4 that encrypt data one bit or byte at a time.

Question 12

Which of the following encryption modes is best suited for high-performance parallel processing of encrypted blocks?

a) ECB
b) CBC
c) CTR
d) CFB

Correct Answer: c) CTR

Explanation: CTR mode allows for parallel processing because each block is encrypted independently, improving performance in high-speed systems.

Question 13

Which of the following is a public key encryption algorithm?

a) AES
b) DES
c) RSA
d) RC5

Correct Answer: c) RSA

Explanation: RSA is a public key encryption algorithm, while AES, DES, and RC5 are symmetric key algorithms.

Question 14

Which of the following encryption techniques uses the same key for both encryption and decryption?

a) RSA
b) AES
c) ECC
d) Diffie-Hellman

Correct Answer: b) AES

Explanation: AES is a symmetric encryption algorithm, meaning the same key is used for both encryption and decryption.

Question 15

What is the main vulnerability of using ECB mode for block encryption?

a) It requires an initialization vector for each block
b) Identical plaintext blocks produce identical ciphertext blocks
c) It does not support parallel processing
d) It can only encrypt small amounts of data

Correct Answer: b) Identical plaintext blocks produce identical ciphertext blocks

Explanation: ECB mode is vulnerable because identical plaintext blocks always result in identical ciphertext blocks, making it susceptible to pattern analysis.

Question 16

What is the primary function of a Certificate Authority (CA) in public key infrastructure?

a) To issue and manage digital certificates
b) To store public and private keys
c) To generate symmetric encryption keys
d) To perform hashing operations

Correct Answer: a) To issue and manage digital certificates

Explanation: A Certificate Authority is responsible for issuing, validating, and managing digital certificates used to verify the identity of entities in a public key infrastructure.

Question 17

Which type of cryptographic attack involves capturing and reusing a valid transmission at a later time?

a) Replay attack
b) Man-in-the-middle attack
c) Chosen ciphertext attack
d) Brute-force attack

Correct Answer: a) Replay attack

Explanation: In a replay attack, an attacker captures a valid data transmission and replays it at a later time to gain unauthorized access.

Question 18

Which of the following describes the use of a one-time pad in encryption?

a) The same key is used for multiple messages
b) A different key is used for each message, and it is only used once
c) It involves a simple substitution cipher
d) It uses a fixed block size for encryption

Correct Answer: b) A different key is used for each message, and it is only used once

Explanation: A one-time pad uses a key that is randomly generated and used only once, making it theoretically unbreakable if the key is truly random and kept secret.

Question 19

Which type of encryption algorithm is based on the difficulty of solving discrete logarithms?

a) RSA
b) AES
c) ECC
d) Diffie-Hellman

Correct Answer: d) Diffie-Hellman

Explanation: Diffie-Hellman is a key exchange algorithm based on the difficulty of solving discrete logarithms, providing a way to securely exchange cryptographic keys over an insecure channel.

Question 20

Which hashing method produces a 256-bit output?

a) MD5
b) SHA-1
c) SHA-256
d) AES

Correct Answer: c) SHA-256

Explanation: SHA-256 is a cryptographic hash function that produces a 256-bit hash value, offering stronger security compared to MD5 and SHA-1.

Complete the Captcha to view next question set.

Prev Post
WGU D334 Practice Exam Questions – Set 4 – Part 1
Next Post
WGU D322 Practice Exam Questions – Set 4 – Part 2