OA Exams

  • web.groovymark@gmail.com
  • November 28, 2024

Question 41

Which of the following describes a chosen-plaintext attack?

a) The attacker encrypts chosen plaintext and compares it with the ciphertext
b) The attacker chooses specific ciphertext to decrypt and analyze
c) The attacker intercepts communications and attempts to decrypt them
d) The attacker uses brute-force attempts to guess the encryption key

Correct Answer: a) The attacker encrypts chosen plaintext and compares it with the ciphertext

Explanation: In a chosen-plaintext attack, the attacker chooses plaintext to encrypt and then compares it to the resulting ciphertext to gather information about the encryption algorithm.

Question 42

Which encryption algorithm is commonly used for securing email communications using digital signatures?

a) AES
b) RSA
c) Blowfish
d) ChaCha20

Correct Answer: b) RSA

Explanation: RSA is commonly used to secure email communications with digital signatures, providing both authentication and message integrity.

Question 43

What is the main advantage of stream ciphers over block ciphers?

a) Stream ciphers are more secure than block ciphers
b) Stream ciphers are faster and better suited for real-time data transmission
c) Stream ciphers use smaller keys than block ciphers
d) Stream ciphers can encrypt larger blocks of data at once

Correct Answer: b) Stream ciphers are faster and better suited for real-time data transmission

Explanation: Stream ciphers encrypt data one bit or byte at a time, making them faster and better suited for real-time applications like audio and video streaming.

Question 44

Which of the following describes a rainbow table attack?

a) An attack that uses frequency analysis to determine the key
b) An attack that precomputes possible hash values to crack passwords
c) An attack that intercepts encrypted data to decrypt it
d) An attack that reuses previously captured data to gain access

Correct Answer: b) An attack that precomputes possible hash values to crack passwords

Explanation: A rainbow table attack uses a precomputed table of hash values and their corresponding plaintexts to quickly crack hashed passwords.

Question 45

Which of the following encryption algorithms is a symmetric block cipher?

a) AES
b) RSA
c) ECC
d) DSA

Correct Answer: a) AES

Explanation: AES is a symmetric block cipher that encrypts data in fixed-size blocks using the same key for both encryption and decryption.

Question 46

 What is the primary characteristic of a block cipher?

a) It encrypts data one bit at a time
b) It encrypts data in fixed-size blocks
c) It uses only public keys for encryption
d) It is always slower than stream ciphers

Correct Answer: b) It encrypts data in fixed-size blocks

Explanation: A block cipher encrypts data in fixed-size blocks, typically 64 or 128 bits, as opposed to stream ciphers that encrypt data one bit or byte at a time.

Question 47

Which type of attack aims to discover patterns between ciphertext and plaintext pairs?

a) Differential cryptanalysis
b) Chosen ciphertext attack
c) Timing attack
d) Replay attack

Correct Answer: a) Differential cryptanalysis

Explanation: Differential cryptanalysis involves analyzing differences between plaintext and ciphertext pairs to discover patterns that can be used to break the encryption.

Question 48

What is the key length of the AES-256 encryption algorithm?

a) 128 bits
b) 192 bits
c) 256 bits
d) 512 bits

Correct Answer: c) 256 bits

Explanation: AES-256 uses a key length of 256 bits, providing a high level of security for encrypted communications and data storage.

Question 49

Which of the following best describes a certificate revocation list (CRL)?

a) A list of certificates that have been revoked by the issuing Certificate Authority
b) A list of public keys for verifying digital signatures
c) A method for validating a digital certificate’s authenticity
d) A protocol for encrypting certificates during transmission

Correct Answer: a) A list of certificates that have been revoked by the issuing Certificate Authority

Explanation: A CRL is a list of certificates that have been revoked before their expiration date, allowing users and systems to check whether a certificate is still valid

Question 50

Which of the following describes a timing attack?

a) An attack that measures the time taken to perform cryptographic operations
b) An attack that intercepts encrypted communications to decrypt them
c) An attack that reuses previously captured data to gain access
d) An attack that precomputes possible hash values to crack passwords

Correct Answer: a) An attack that measures the time taken to perform cryptographic operations

Explanation: A timing attack exploits the time taken to perform cryptographic operations, potentially allowing attackers to deduce the encryption key or plaintext.

Complete the Captcha to view next question set.

Prev Post
WGU D322 Practice Exam Questions – Set 5 – Part 3
Next Post
WGU D077 Practice Exam Questions – Set 2 – Part 1