OA Exams

  • California, TX 70240
  • Info@gmail.com
  • Office Hours: 8:00 AM – 7:45 PM
  • web.groovymark@gmail.com
  • November 28, 2024

Question 01

Which of the following best describes the concept of “non-repudiation” in cryptography?

a) Ensuring that a message cannot be decrypted without the correct key
b) Preventing the sender from denying they sent a message
c) Securing communications against eavesdropping
d) Ensuring data integrity during transmission

Correct Answer: b) Preventing the sender from denying they sent a message

Explanation: Non-repudiation ensures that the sender of a message cannot deny having sent it, typically achieved using digital signatures.

Question 02

What is the primary characteristic of a public key in asymmetric encryption?

a) It is used for decryption only
b) It is kept secret and shared only with trusted parties
c) It is used for encryption and can be freely distributed
d) It is faster than symmetric encryption

Correct Answer: c) It is used for encryption and can be freely distributed

Explanation: In asymmetric encryption, the public key is used for encryption and can be freely distributed, while the private key is kept secret and used for decryption.

Question 03

Which of the following describes the main difference between RSA and Elliptic Curve Cryptography (ECC)?

a) RSA is faster than ECC
b) ECC requires smaller key sizes for equivalent security
c) RSA uses fewer computational resources than ECC
d) ECC is less secure than RSA

Correct Answer: b) ECC requires smaller key sizes for equivalent security

Explanation: ECC provides the same level of security as RSA but with much smaller key sizes, making it more efficient in terms of storage and computation.

Question 04

What is the primary function of a digital certificate?

a) To encrypt messages during transmission
b) To provide authentication and public key verification
c) To generate symmetric keys
d) To secure communications using hashing

Correct Answer: b) To provide authentication and public key verification

Explanation: A digital certificate is used to verify the identity of an entity and associate it with a public key for secure communications.

Question 05

Which of the following cryptographic techniques provides forward secrecy?

a) RSA
b) Diffie-Hellman
c) SHA-256
d) MD5

Correct Answer: b) Diffie-Hellman

Explanation: Diffie-Hellman provides forward secrecy by ensuring that session keys are not derived from long-term keys, preventing compromise of past sessions.

Question 06

Which of the following encryption modes uses a counter and allows parallel processing of blocks?

a) ECB
b) CBC
c) CFB
d) CTR

Correct Answer: d) CTR

Explanation: Counter (CTR) mode allows for parallel processing of blocks because each block is encrypted independently, improving encryption performance.

Question 07

Which of the following describes a “replay attack”?

a) An attacker intercepts and reuses valid data transmissions
b) An attacker modifies encrypted messages in transit
c) An attacker decrypts a message using brute force
d) An attacker injects malicious code into encrypted data

Correct Answer: a) An attacker intercepts and reuses valid data transmissions

Explanation: A replay attack involves capturing and reusing legitimate data transmissions, often to gain unauthorized access or deceive systems.

Question 08

What is the key length for AES-128 encryption?

a) 128 bits
b) 192 bits
c) 256 bits
d) 64 bits

Correct Answer: a) 128 bits

Explanation: AES-128 uses a 128-bit key for encryption, providing a balance between security and performance.

Question 09

Which of the following cryptographic attacks involves analyzing the time taken to execute encryption operations to deduce the key?

a) Side-channel attack
b) Brute-force attack
c) Replay attack
d) Man-in-the-middle attack

Correct Answer: a) Side-channel attack

Explanation: In a side-channel attack, the attacker analyzes the time, power consumption, or other physical characteristics of encryption operations to gather information about the encryption key.

Question 10

Which of the following cryptographic protocols is used for secure key exchange over an untrusted network?

a) AES
b) RSA
c) Diffie-Hellman
d) SHA-1

Correct Answer: c) Diffie-Hellman

Explanation: Diffie-Hellman is a key exchange protocol that allows two parties to securely exchange cryptographic keys over an untrusted network.

Question 11

What is the primary role of hashing in digital signatures?

a) To encrypt the data
b) To provide confidentiality
c) To ensure data integrity
d) To establish a secure communication channel

Correct Answer: c) To ensure data integrity

Explanation: Hashing in digital signatures ensures that the data has not been altered by creating a unique hash of the data, which is signed by the sender for verification by the recipient.

Question 12

Which of the following describes the Caesar cipher?

a) A transposition cipher
b) A stream cipher
c) A substitution cipher that shifts letters by a fixed number
d) A block cipher that operates in parallel

Correct Answer: c) A substitution cipher that shifts letters by a fixed number

Explanation: The Caesar cipher is a simple substitution cipher that shifts each letter of the plaintext by a fixed number of positions in the alphabet.

Question 13

What is the primary advantage of using elliptic curve cryptography (ECC) in mobile devices?

a) It provides faster encryption than RSA
b) It uses smaller key sizes, requiring less computational power
c) It is more secure than other encryption methods
d) It uses symmetric encryption, which is faster

Correct Answer: b) It uses smaller key sizes, requiring less computational power

Explanation: ECC uses smaller key sizes compared to RSA, making it more efficient for mobile devices with limited computational power.

Question 14

Which of the following describes a chosen-plaintext attack?

a) The attacker chooses plaintext to encrypt and observe the resulting ciphertext
b) The attacker intercepts and decrypts ciphertext without knowing the key
c) The attacker selects ciphertext to be decrypted and analyzes the plaintext
d) The attacker modifies the ciphertext in transit

Correct Answer: a) The attacker chooses plaintext to encrypt and observe the resulting ciphertext

Explanation: In a chosen-plaintext attack, the attacker selects plaintext to encrypt and uses the resulting ciphertext to gather information about the encryption algorithm.

Question 15

Which of the following block cipher modes of operation ensures that each ciphertext block depends on all previous blocks?

a) ECB
b) CBC
c) CTR
d) OFB

Correct Answer: b) CBC

Explanation: Cipher Block Chaining (CBC) mode ensures that each ciphertext block depends on the encryption of the previous block, making it more secure than ECB.

Question 16

 What is the primary purpose of a cryptographic nonce?

a) To store a secret key
b) To ensure that identical plaintexts produce different ciphertexts
c) To generate a digital signature
d) To provide authentication

Correct Answer: b) To ensure that identical plaintexts produce different ciphertexts

Explanation: A nonce is a random value used only once in encryption to ensure that the same plaintext encrypted multiple times results in different ciphertexts.

Question 17

Which of the following describes a public key in asymmetric encryption?

a) It is used for encryption and can be freely distributed
b) It is used for decryption and must be kept secret
c) It is used for hashing and digital signatures
d) It is faster than symmetric encryption

Correct Answer: a) It is used for encryption and can be freely distributed

Explanation: In asymmetric encryption, the public key is used for encryption and can be freely distributed, while the private key is kept secret for decryption.

Question 18

Which cryptographic algorithm is typically used for digital signatures?

a) AES
b) RSA
c) DES
d) RC4

Correct Answer: b) RSA

Explanation: RSA is commonly used for digital signatures because it provides authentication and data integrity by allowing the recipient to verify the identity of the sender.

Question 19

What is the primary purpose of salting in password hashing?

a) To encrypt the password before hashing
b) To ensure that the same password generates different hash values
c) To compress the password into a fixed length
d) To generate a secret key

Correct Answer: b) To ensure that the same password generates different hash values

Explanation: Salting adds random data to passwords before hashing to ensure that identical passwords result in different hash values, preventing attackers from using precomputed tables to crack hashes.

Question 20

Which of the following encryption methods is used to secure Wi-Fi networks under WPA2?

a) RSA
b) AES
c) DES
d) ECC

Correct Answer: b) AES

Explanation: AES is used to secure Wi-Fi networks under WPA2, providing strong encryption to protect wireless communications.

Complete the Captcha to view next question set.

Prev Post
WGU D334 Practice Exam Questions – Set 1 – Part 3
Next Post
WGU D334 Practice Exam Questions – Set 2 – Part 1