Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dcdisc65

Page: 1 / 2
Total 18 questions
Exam Code: Introduction-to-Cryptography                Update: Feb 4, 2026
Exam Name: WGU Introduction to Cryptography HNO1

WGU WGU Introduction to Cryptography HNO1 Introduction-to-Cryptography Exam Dumps: Updated Questions & Answers (February 2026)

Question # 1

(A company wants to use certificates issued by a root CA to demonstrate to customers that it is a legitimate company being hosted by a cloud provider. Who needs to trust the root CA public key?)

A.

The seller and the buyer

B.

The cloud provider and the seller

C.

The Federal Trade Commission and the cloud provider

D.

The buyer and the Federal Trade Commission

Question # 2

(Why should an asymmetric private key be used to encrypt the digest of an application?)

A.

An asymmetric private key uses the same key to encrypt and decrypt large amounts of media, one bit at a time.

B.

An asymmetric private key signs files by signing (encrypting) the hash of a file so integrity and authenticity can be verified with the corresponding public key.

C.

An asymmetric private key encrypts and decrypts data in blocks of characters at a time with a complex algorithm.

D.

An asymmetric private key encrypts a small amount of information, which is decrypted with the corresponding private key.

Question # 3

(A security analyst uses a polyalphabetic substitution cipher with a keyword of YELLOW to encrypt a message. Which cipher should be used to encrypt the message?)

A.

Pigpen

B.

Caesar

C.

Vigenère

D.

Playfair

Question # 4

(What is the length of the Initialization Vector (IV) in WEP?)

A.

24 bits

B.

40 bits

C.

48 bits

D.

56 bits

Question # 5

(What describes a true random number generator?)

A.

Fast and deterministic, and the same input produces the same results

B.

Slow and nondeterministic, and the same input produces different results

C.

Unique integer determined through factorization of integers

D.

Integer increased by one to match requests and responses

Question # 6

(Why should a forensic investigator create a hash of a victim’s hard drive and of the bitstream copy of the hard drive?)

A.

To identify if someone opened the drive

B.

To certify the information on the drive is correct

C.

To establish who created the files on the drives

D.

To verify that the drives are identical

Question # 7

(Which encryption algorithm encrypts with one key, decrypts with another key, and then encrypts with the first key?)

A.

IDEA

B.

AES

C.

3DES

D.

DES

Question # 8

(How does Electronic Codebook (ECB) mode encryption function?)

A.

Converts from block to stream, then uses a counter value and a nonce to encrypt the data

B.

Uses a self-synchronizing stream on the blocks, where the IV is encrypted and XORed with the data stream

C.

Uses an IV to encrypt the first block, then uses the result to encrypt the next block

D.

Encrypts each block with the same key, where each block is independent of the others

Question # 9

(How does adding salt to a password improve security?)

A.

Salt creates a different hash if two people use the same password.

B.

Salt enforces the complexity rules for passwords.

C.

Salt ensures two people do not have the same password.

D.

Salt prevents users from reusing the same password.

Question # 10

(What makes the RC4 cipher unique compared to RC5 and RC6?)

A.

Stream

B.

Asymmetric

C.

Symmetric

D.

Block

Page: 1 / 2
Total 18 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 04 Feb 2026