OA Exams

  • web.groovymark@gmail.com
  • November 29, 2024

Question 41

Which of the following describes a side-channel attack?

a) The attacker uses timing information to infer the encryption key
b) The attacker intercepts and decrypts data during transmission
c) The attacker manipulates the encryption algorithm
d) The attacker uses brute-force attempts to guess the key

Correct Answer: a) The attacker uses timing information to infer the encryption key

Explanation: In a side-channel attack, the attacker gathers information from the physical implementation of the cryptosystem, such as timing or power consumption, to infer the encryption key.

Question 42

What is the role of a Certificate Authority (CA) in public key infrastructure?

a) To generate encryption keys
b) To issue and manage digital certificates
c) To encrypt data for secure transmission
d) To store private keys securely

Correct Answer: b) To issue and manage digital certificates

Explanation: A Certificate Authority (CA) is responsible for issuing, managing, and validating digital certificates used in public key infrastructure (PKI).

Question 43

Which type of attack involves analyzing the frequency of letters in a ciphertext to crack the encryption?

a) Brute-force attack
b) Replay attack
c) Frequency analysis attack
d) Man-in-the-middle attack

Correct Answer: c) Frequency analysis attack

Explanation: A frequency analysis attack involves analyzing the frequency of letters or symbols in ciphertext to deduce the underlying plaintext or encryption key.

Question 44

What is the primary function of a Trusted Platform Module (TPM)?

a) To store encryption keys securely
b) To generate digital certificates
c) To encrypt data for transmission
d) To manage public key infrastructure

Correct Answer: a) To store encryption keys securely

Explanation: A TPM is a hardware component that securely stores cryptographic keys and ensures they are protected from unauthorized access.

Question 45

Which of the following describes a digital signature?

a) It encrypts a message for secure transmission
b) It verifies the integrity and authenticity of a message
c) It generates a public and private key pair
d) It encrypts data using symmetric encryption

Correct Answer: b) It verifies the integrity and authenticity of a message

Explanation: A digital signature is used to verify the integrity and authenticity of a message, ensuring that it has not been tampered with and was sent by the claimed sender.

Question 46

Which of the following best describes an initialization vector (IV) in encryption?

a) It is a secret key used to encrypt data
b) It is a random value used to ensure that identical plaintexts produce different ciphertexts
c) It is a value used to pad the plaintext to a fixed length
d) It is a value used for generating digital signatures

Correct Answer: b) It is a random value used to ensure that identical plaintexts produce different ciphertexts

Explanation: An initialization vector (IV) is a random value used to ensure that the same plaintext encrypted multiple times with the same key produces different ciphertexts.

Question 47

 What is the primary difference between symmetric and asymmetric encryption?

a) Symmetric encryption uses different keys for encryption and decryption, while asymmetric encryption uses the same key for both
b) Symmetric encryption is faster, while asymmetric encryption provides better security
c) Asymmetric encryption is faster, while symmetric encryption provides better security
d) Asymmetric encryption uses smaller keys than symmetric encryption

Correct Answer: b) Symmetric encryption is faster, while asymmetric encryption provides better security

Explanation: Symmetric encryption is generally faster, but asymmetric encryption provides better security by using separate keys for encryption and decryption.

Question 48

Which of the following encryption algorithms is used for key exchange in secure communication?

a) AES
b) RSA
c) Diffie-Hellman
d) SHA-256

Correct Answer: c) Diffie-Hellman

Explanation: Diffie-Hellman is a key exchange algorithm used to establish a shared secret between parties over an insecure channel.

Question 49

Which type of cryptographic attack involves modifying the encryption process to leak information about the plaintext or key?

a) Chosen-plaintext attack
b) Timing attack
c) Man-in-the-middle attack
d) Replay attack

Correct Answer: b) Timing attack

Explanation: A timing attack involves analyzing the time taken to perform cryptographic operations to gather information about the encryption key or plaintext.

Question 50

What is the purpose of hashing in cryptography?

a) To ensure data confidentiality
b) To ensure data integrity
c) To encrypt data for secure transmission
d) To generate cryptographic keys

Correct Answer: b) To ensure data integrity

Explanation: Hashing ensures data integrity by producing a fixed-length hash value from input data, allowing verification that the data has not been altered.

Complete the Captcha to view next question set.

Tags

Prev Post
WGU D334 Practice Exam Questions – Set 3 – Part 2
Next Post
WGU D334 Practice Exam Questions – Set 4 – Part 2