OA Exams

  • web.groovymark@gmail.com
  • November 29, 2024

Question 21

Which type of cipher involves shifting the letters of the plaintext by a fixed number of positions?

a) Playfair cipher
b) Caesar cipher
c) Vigenère cipher
d) Transposition cipher

Correct Answer: b) Caesar cipher

Explanation: The Caesar cipher is a simple substitution cipher that shifts the letters of the plaintext by a fixed number of positions.

Question 22

Which block cipher mode of operation involves XORing each plaintext block with the previous ciphertext block?

a) ECB
b) CBC
c) CTR
d) CFB

Correct Answer: b) CBC

Explanation: Cipher Block Chaining (CBC) mode XORs each plaintext block with the previous ciphertext block before encryption, ensuring that identical plaintext blocks produce different ciphertexts.

Question 23

Which of the following encryption algorithms is based on the difficulty of solving discrete logarithms?

a) RSA
b) AES
c) ECC
d) DES

Correct Answer: c) ECC

Explanation: Elliptic Curve Cryptography (ECC) is based on the mathematical difficulty of solving discrete logarithms, making it secure for encryption and key exchange

Question 24

Which of the following best describes a hash function?

a) It is reversible
b) It generates a fixed-length output from variable-length input
c) It uses a private key for decryption
d) It requires padding for encryption

Correct Answer: b) It generates a fixed-length output from variable-length input

Explanation: A hash function generates a fixed-length output (hash) from a variable-length input, ensuring data integrity without being reversible.

Question 25

Which of the following algorithms is commonly used for creating a digital signature?

a) AES
b) RSA
c) Blowfish
d) RC4

Correct Answer: b) RSA

Explanation: RSA is widely used for creating digital signatures, ensuring message integrity and authenticity.

Question 26

What is the primary disadvantage of symmetric encryption?

a) It is too slow for real-time applications
b) It requires a large key size
c) It requires secure key distribution
d) It is less secure than asymmetric encryption

Correct Answer: c) It requires secure key distribution

Explanation: The main disadvantage of symmetric encryption is the need for secure key distribution between parties, as both must use the same key.

Question 27

Which cryptographic attack involves manipulating the encryption algorithm to find weaknesses?

a) Brute-force attack
b) Man-in-the-middle attack
c) Cryptanalysis attack
d) Chosen-ciphertext attack

Correct Answer: c) Cryptanalysis attack

Explanation: A cryptanalysis attack involves manipulating the encryption algorithm to find weaknesses or patterns that can be exploited to break the encryption.

Question 28

Which of the following encryption modes allows for parallel processing of encrypted blocks?

a) ECB
b) CBC
c) CFB
d) CTR

Correct Answer: d) CTR

Explanation: Counter (CTR) mode allows for parallel processing because each block is encrypted independently, improving performance in high-speed environments.

Question 29

What is the primary purpose of forward secrecy?

a) To prevent man-in-the-middle attacks
b) To secure key exchanges
c) To ensure that past sessions remain secure even if long-term keys are compromised
d) To provide faster encryption and decryption

Correct Answer: c) To ensure that past sessions remain secure even if long-term keys are compromised

Explanation: Forward secrecy ensures that even if long-term keys are compromised, past communication sessions remain secure because session keys are not reused.

Question 30

Which type of encryption algorithm uses the same key for both encryption and decryption?

a) Asymmetric encryption
b) Symmetric encryption
c) Hashing
d) Digital signature

Correct Answer: b) Symmetric encryption

Explanation: In symmetric encryption, the same key is used for both encryption and decryption, requiring secure key exchange between the parties.

Question 31

Which of the following protocols is used to check the validity of digital certificates in real-time?

a) CRL
b) OCSP
c) RSA
d) Diffie-Hellman

Correct Answer: b) OCSP

Explanation: The Online Certificate Status Protocol (OCSP) is used to check the validity of digital certificates in real-time, ensuring that they have not been revoked.

Question 32

Which of the following best describes the function of a digital signature?

a) To ensure data confidentiality
b) To verify the identity of the sender and the integrity of the message
c) To encrypt messages for secure transmission
d) To generate cryptographic keys

Correct Answer: b) To verify the identity of the sender and the integrity of the message

Explanation: A digital signature verifies the identity of the sender and ensures that the message has not been tampered with during transmission.

Question 33

Which encryption algorithm is typically used in blockchain technologies for securing transactions?

a) AES
b) RSA
c) ECC
d) DES

Correct Answer: c) ECC

Explanation: Elliptic Curve Cryptography (ECC) is commonly used in blockchain technologies for securing transactions due to its efficiency and smaller key sizes.

Question 34

Which type of cryptographic attack involves capturing and reusing valid data transmissions?

a) Man-in-the-middle attack
b) Brute-force attack
c) Replay attack
d) Chosen-plaintext attack

Correct Answer: c) Replay attack

Explanation: In a replay attack, an attacker captures valid data transmissions and reuses them at a later time to gain unauthorized access

Question 35

Which cryptographic algorithm is used for generating a hash value?

a) AES
b) SHA-256
c) RSA
d) Diffie-Hellman

Correct Answer: b) SHA-256

Explanation: SHA-256 is a cryptographic hash algorithm that generates a fixed-length hash value, ensuring data integrity.

Question 36

Which of the following describes a man-in-the-middle attack?

a) An attacker intercepts and alters communications between two parties
b) An attacker uses brute-force techniques to decrypt encrypted data
c) An attacker impersonates one party in a communication to deceive the other
d) An attacker generates random keys to encrypt intercepted data

Correct Answer: a) An attacker intercepts and alters communications between two parties

Explanation: In a man-in-the-middle attack, an attacker intercepts and potentially alters the communication between two parties without their knowledge.

Question 37

Which of the following cryptographic methods uses different keys for encryption and decryption?

a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) Stream ciphers

Correct Answer: b) Asymmetric encryption

Explanation: Asymmetric encryption uses different keys for encryption and decryption, typically a public key for encryption and a private key for decryption.

Question 38

What is the purpose of a nonce in encryption?

a) To provide a unique value used only once to ensure data uniqueness
b) To generate the encryption key
c) To pad the plaintext to a fixed length
d) To ensure that data remains confidential

Correct Answer: a) To provide a unique value used only once to ensure data uniqueness

Explanation: A nonce is a value used only once in encryption to ensure that the same plaintext encrypted multiple times results in different ciphertexts.

Question 39

Which of the following is a primary advantage of elliptic curve cryptography (ECC)?

a) It uses smaller key sizes for the same level of security as RSA
b) It is easier to implement than RSA
c) It requires less computational power
d) It is faster than symmetric encryption algorithms

Correct Answer: a) It uses smaller key sizes for the same level of security as RSA

Explanation: ECC provides equivalent security to RSA but with much smaller key sizes, making it more efficient in terms of computation and storage.

Question 40

Which encryption mode produces identical ciphertext for identical plaintext blocks, making it vulnerable to pattern analysis?

a) CBC
b) CTR
c) ECB
d) OFB

Correct Answer: c) ECB

Explanation: In ECB mode, identical plaintext blocks produce identical ciphertext blocks, making it vulnerable to pattern analysis attacks.

Complete the Captcha to view next question set.

Tags

Prev Post
WGU D334 Practice Exam Questions – Set 3 – Part 1
Next Post
WGU D334 Practice Exam Questions – Set 3 – Part 3