Month End Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

Introduction-to-Cryptography WGU Introduction to Cryptography HNO1 Free Practice Exam Questions (2026 Updated)

Prepare effectively for your WGU Introduction-to-Cryptography WGU Introduction to Cryptography HNO1 certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2026, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 1
Total 60 questions

(An administrator has configured a Virtual Private Network (VPN) connection utilizing IPsec transport mode with Encapsulating Security Payload (ESP) between a server in the corporate office and a client computer in the remote office. In which situation can the packet content be inspected?)

A.

On devices at headquarters and offsite before being sent and after being received

B.

In the headquarters’ and offsite location’s networks after the data has been sent

C.

Only in the offsite location’s network while data is in transit

D.

Only in the headquarters’ network while data is in transit

(What is the maximum key size (in bits) supported by AES?)

A.

128

B.

192

C.

256

D.

512

(Why should an administrator choose lightweight cryptography?)

A.

The desktop is in a secure area of the building.

B.

The embedded system has limited resources.

C.

The payload requires complex rounds of encryption.

D.

The data requires minimal protection due to the sensitivity level.

(What is the value of 23 mod 6?)

A.

03

B.

04

C.

05

D.

06

(What is the value of 51 mod 11?)

A.

04

B.

05

C.

07

D.

11

(Which cryptographic operation uses a single key?)

A.

Hashing

B.

Asymmetric

C.

Padding

D.

Symmetric

(What type of encryption uses different keys to encrypt and decrypt the message?)

A.

Symmetric

B.

Private key

C.

Secure

D.

Asymmetric

(Which wireless security standard uses an authentication server with 802.1X and EAP?)

A.

WPA-PSK

B.

WEP

C.

WPA-Enterprise

D.

TKIP

(Which mechanism can be applied to protect the integrity of plaintext when using AES?)

A.

RC4

B.

Message Authentication Code (MAC)

C.

RSA

D.

Kerberos key sharing

(How are limits managed for the number of bitcoins that can be created and stored in a blockchain?)

A.

Rewards for mining reduce over time

B.

The total number of participants has been set

C.

A maximum has been established per country

D.

Each person has a maximum number

(Which operation can be performed on a certificate during the “Issued” stage?)

A.

Creation

B.

Key recovery

C.

Distribution

D.

Key archiving

(Which component is used to verify the integrity of a message?)

A.

TKIP

B.

HMAC

C.

AES

D.

IV

(What is the length (in bits) of a SHA-1 hash output?)

A.

40

B.

80

C.

160

D.

320

(What is an attribute of RC4 when used with WEP?)

A.

40-bit key

B.

128-bit key

C.

256-bit key

D.

512-bit key

(How often are transactions added to a blockchain?)

A.

Approximately every 10 minutes

B.

Approximately every 30 minutes

C.

Approximately every 1 hour

D.

Approximately every 24 hours

(What are the primary characteristics of Bitcoin proof of work?)

A.

Difficult to produce and difficult to verify

B.

Difficult to produce and easy to verify

C.

Easy to produce and easy to verify

D.

Easy to produce and difficult to verify

(Which mode of encryption converts data into a stream encryption and then uses a counter value and a nonce to encrypt the data?)

A.

Electronic Codebook (ECB)

B.

Counter (CTR)

C.

Cipher Block Chaining (CBC)

D.

Cipher Feedback (CFB)

(Which number generator has different results given the same input data?)

A.

Prime

B.

Sequence

C.

Pseudorandom

D.

True random

Page: 1 / 1
Total 60 questions
Copyright © 2014-2026 Solution2Pass. All Rights Reserved