Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

Introduction-to-Cryptography WGU Introduction to Cryptography HNO1 Questions and Answers

Questions 4

(Which attack may take the longest amount of time to achieve success?)

Options:

A.

Birthday

B.

Rainbow table

C.

Dictionary

D.

Brute-force

Buy Now
Questions 5

(What is an alternative to using a Certificate Revocation List (CRL) with certificates?)

Options:

A.

Privacy Enhanced Mail (PEM)

B.

Online Certificate Status Protocol (OCSP)

C.

Root Certificate Authority (CA)

D.

Policy Certificate Authority (CA)

Buy Now
Questions 6

(Which mechanism implemented in WPA-Enterprise guards against bit-flipping exploits?)

Options:

A.

Advanced Encryption Standard (AES)

B.

Pre-shared key (PSK)

C.

Message Integrity Check (MIC)

D.

Global encryption key

Buy Now
Questions 7

(Which is a primary reason for ethical concerns about encryption?)

Options:

A.

It only benefits large corporations.

B.

It complicates government access to potentially crucial information.

C.

It provides faster data transmission.

D.

It reduces data storage requirements.

Buy Now
Questions 8

(Employee A needs to send Employee B a symmetric key for confidential communication. Which key is used to encrypt the symmetric key?)

Options:

A.

Employee A’s private key

B.

Employee B’s public key

C.

Employee A’s public key

D.

Employee B’s private key

Buy Now
Questions 9

(Two people want to communicate through secure email. The person creating the email wants to ensure only their friend can decrypt the email. Which key should the person creating the email use to encrypt the message?)

Options:

A.

Sender’s public key

B.

Recipient’s private key

C.

Sender’s private key

D.

Recipient’s public key

Buy Now
Questions 10

(Which type of encryption is Advanced Encryption Standard (AES) considered to be?)

Options:

A.

Hybrid encryption

B.

Quantum encryption

C.

Asymmetric encryption

D.

Symmetric encryption

Buy Now
Questions 11

(Why should an asymmetric private key be used to encrypt the digest of an application?)

Options:

A.

An asymmetric private key uses the same key to encrypt and decrypt large amounts of media, one bit at a time.

B.

An asymmetric private key signs files by signing (encrypting) the hash of a file so integrity and authenticity can be verified with the corresponding public key.

C.

An asymmetric private key encrypts and decrypts data in blocks of characters at a time with a complex algorithm.

D.

An asymmetric private key encrypts a small amount of information, which is decrypted with the corresponding private key.

Buy Now
Questions 12

(How does adding salt to a password improve security?)

Options:

A.

Salt creates a different hash if two people use the same password.

B.

Salt enforces the complexity rules for passwords.

C.

Salt ensures two people do not have the same password.

D.

Salt prevents users from reusing the same password.

Buy Now
Questions 13

(What type of encryption uses different keys to encrypt and decrypt the message?)

Options:

A.

Symmetric

B.

Private key

C.

Secure

D.

Asymmetric

Buy Now
Questions 14

(An organization wants to digitally sign its software to guarantee the integrity of its source code. Which key should the customer use to decrypt the digest of the source code?)

Options:

A.

Customer’s private key

B.

Organization’s public key

C.

Organization’s private key

D.

Customer’s public key

Buy Now
Questions 15

(Which mechanism can be applied to protect the integrity of plaintext when using AES?)

Options:

A.

RC4

B.

Message Authentication Code (MAC)

C.

RSA

D.

Kerberos key sharing

Buy Now
Questions 16

(What is the length (in bits) of a SHA-1 hash output?)

Options:

A.

40

B.

80

C.

160

D.

320

Buy Now
Questions 17

(Why is lightweight cryptography important in modern information security?)

Options:

A.

To complicate data protection measures

B.

To ensure secure communication on high-speed networks

C.

To limit the use of encryption tools in organizations

D.

To address the security needs of Internet of Things (IoT) devices and mobile applications

Buy Now
Questions 18

(Which type of network were VPN connections originally designed to tunnel through?)

Options:

A.

Encrypted

B.

Protected

C.

Public

D.

Private

Buy Now
Questions 19

(What describes a true random number generator?)

Options:

A.

Fast and deterministic, and the same input produces the same results

B.

Slow and nondeterministic, and the same input produces different results

C.

Unique integer determined through factorization of integers

D.

Integer increased by one to match requests and responses

Buy Now
Questions 20

(Which certificate encoding process is binary-based?)

Options:

A.

Public Key Infrastructure (PKI)

B.

Distinguished Encoding Rules (DER)

C.

Rivest–Shamir–Adleman (RSA)

D.

Privacy Enhanced Mail (PEM)

Buy Now
Questions 21

(Which cryptographic operation uses a single key?)

Options:

A.

Hashing

B.

Asymmetric

C.

Padding

D.

Symmetric

Buy Now
Questions 22

(Which is an example of asymmetric encryption?)

Options:

A.

Secure Hash Algorithm 256 (SHA-256)

B.

Hash-based Message Authentication Code (HMAC)

C.

Data Encryption Standard (DES)

D.

Elliptic-Curve Cryptography (ECC)

Buy Now
Questions 23

(What is a characteristic of a hash function?)

Options:

A.

Data encryption

B.

Public-private key pair use

C.

One-way

D.

Reversible

Buy Now
Questions 24

(Why are large prime numbers important in cryptography?)

Options:

A.

They make encryption faster.

B.

They make decryption easier.

C.

They are used for encoding messages.

D.

They provide security in encryption algorithms.

Buy Now
Questions 25

(What is a focus of the ISO/IEC 27001 standard?)

Options:

A.

Development of new encryption algorithms

B.

Risk management and continuous improvement of information security

C.

Enforcement of criminal penalties for data breaches

D.

Exclusively addressing network security

Buy Now
Questions 26

(Which authentication method allows a customer to authenticate to a web service?)

Options:

A.

One-way server authentication

B.

End-to-end authentication

C.

Mutual authentication

D.

One-way client authentication

Buy Now
Questions 27

(Quantum computing poses a threat to which cryptographic algorithm?)

Options:

A.

Secure Hash Algorithm 256 (SHA-256)

B.

Advanced Encryption Standard (AES)

C.

Electronic Codebook (ECB)

D.

Rivest–Shamir–Adleman (RSA)

Buy Now
Exam Name: WGU Introduction to Cryptography HNO1
Last Update: May 19, 2026
Questions: 60
Introduction-to-Cryptography pdf

Introduction-to-Cryptography PDF

$25.5  $84.99
Introduction-to-Cryptography Engine

Introduction-to-Cryptography Testing Engine

$30  $99.99
Introduction-to-Cryptography PDF + Engine

Introduction-to-Cryptography PDF + Testing Engine

$40.5  $134.99