Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

Introduction-to-Cryptography Sample Questions Answers

Questions 4

(What describes a true random number generator?)

Options:

A.

Fast and deterministic, and the same input produces the same results

B.

Slow and nondeterministic, and the same input produces different results

C.

Unique integer determined through factorization of integers

D.

Integer increased by one to match requests and responses

Buy Now
Questions 5

(Which authentication method allows a web service installed on a network operating system to prove its identity to a customer?)

Options:

A.

One-way client authentication

B.

One-way server authentication

C.

Mutual authentication

D.

End-to-end authentication

Buy Now
Questions 6

(Which authentication method allows a customer to authenticate to a web service?)

Options:

A.

One-way server authentication

B.

End-to-end authentication

C.

Mutual authentication

D.

One-way client authentication

Buy Now
Questions 7

(What type of encryption uses different keys to encrypt and decrypt the message?)

Options:

A.

Symmetric

B.

Private key

C.

Secure

D.

Asymmetric

Buy Now
Questions 8

(Which certificate encoding process is binary-based?)

Options:

A.

Public Key Infrastructure (PKI)

B.

Distinguished Encoding Rules (DER)

C.

Rivest–Shamir–Adleman (RSA)

D.

Privacy Enhanced Mail (PEM)

Buy Now
Questions 9

(What is used to randomize the initial value when generating Initialization Vectors (IVs)?)

Options:

A.

Key

B.

Plaintext

C.

Algorithm

D.

Nonce

Buy Now
Questions 10

(Which cipher uses shifting letters of the alphabet for encryption?)

Options:

A.

SHA-1

B.

Vigenère

C.

Bifid

D.

Caesar

Buy Now
Questions 11

(Which cryptographic operation uses a single key?)

Options:

A.

Hashing

B.

Asymmetric

C.

Padding

D.

Symmetric

Buy Now
Questions 12

(Which component is used to verify the integrity of a message?)

Options:

A.

TKIP

B.

HMAC

C.

AES

D.

IV

Buy Now
Questions 13

(What is the value of 23 mod 6?)

Options:

A.

03

B.

04

C.

05

D.

06

Buy Now
Questions 14

(Which type of exploit involves looking for different inputs that generate the same hash?)

Options:

A.

Birthday attack

B.

Linear cryptanalysis

C.

Algebraic attack

D.

Differential cryptanalysis

Buy Now
Questions 15

(What are the roles of keys when using digital signatures?)

Options:

A.

A private key is used for both signing and signature validation.

B.

A private key is used for signing, and a public key is used for signature validation.

C.

A public key is used for both signing and signature validation.

D.

A public key is used for signing, and a private key is used for signature validation.

Buy Now
Questions 16

(How are limits managed for the number of bitcoins that can be created and stored in a blockchain?)

Options:

A.

Rewards for mining reduce over time

B.

The total number of participants has been set

C.

A maximum has been established per country

D.

Each person has a maximum number

Buy Now
Questions 17

(A company wants to use certificates issued by a root CA to demonstrate to customers that it is a legitimate company being hosted by a cloud provider. Who needs to trust the root CA public key?)

Options:

A.

The seller and the buyer

B.

The cloud provider and the seller

C.

The Federal Trade Commission and the cloud provider

D.

The buyer and the Federal Trade Commission

Buy Now
Questions 18

(Which operation can be performed on a certificate during the “Issued” stage?)

Options:

A.

Creation

B.

Key recovery

C.

Distribution

D.

Key archiving

Buy Now
Exam Code: Introduction-to-Cryptography
Exam Name: WGU Introduction to Cryptography HNO1
Last Update: Feb 5, 2026
Questions: 60
$66  $164.99
$50  $124.99
$42  $104.99
buy now Introduction-to-Cryptography