100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

WGU C839 INTRO TO CRYPTOGRAPHY FINAL EXAM 2025/2026 BANK 2 VERSIONS QUESTIONS AND ACCURATE ACTUAL EXAM WITH FREQUENTLY TESTED QUESTIONS AND STUDY GUIDE / EXPERT VERIFIED FOR GUARANTEED PASS/ALREADY GRADED A+

Puntuación
-
Vendido
-
Páginas
49
Grado
A+
Subido en
28-07-2025
Escrito en
2024/2025

WGU C839 INTRO TO CRYPTOGRAPHY FINAL EXAM 2025/2026 BANK 2 VERSIONS QUESTIONS AND ACCURATE ACTUAL EXAM WITH FREQUENTLY TESTED QUESTIONS AND STUDY GUIDE / EXPERT VERIFIED FOR GUARANTEED PASS/ALREADY GRADED A+

Institución
WGU C839 INTRO TO CRYPTOGRAPHY
Grado
WGU C839 INTRO TO CRYPTOGRAPHY











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
WGU C839 INTRO TO CRYPTOGRAPHY
Grado
WGU C839 INTRO TO CRYPTOGRAPHY

Información del documento

Subido en
28 de julio de 2025
Número de páginas
49
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

WGU C839 INTRO TO CRYPTOGRAPHY FINAL EXAM 2025 BANK 2 VERSIONS QUESTIONS
AND ACCURATE ACTUAL EXAM WITH FREQUENTLY TESTED QUESTIONS AND STUDY
GUIDE / EXPERT VERIFIED FOR GUARANTEED PASS/ALREADY GRADED A+






What type of encryption uses different keys to encrypt and decrypt the message?



A Symmetric

B Private key

C Secure

D Asymmetric - (ANSWER)D



The most widely used asymmetric encryption algorithm is what?



A RSA

B Vigenere

C DES

D Caesar Cipher - (ANSWER)A



Original, unencrypted information is referred to as ____.



A text

B plaintext

C cleantext

D ciphertext - (ANSWER)B



Which of the following is NOT an asymmetric system?



A PGP

B RSA

,WGU C839 INTRO TO CRYPTOGRAPHY FINAL EXAM 2025 BANK 2 VERSIONS QUESTIONS
AND ACCURATE ACTUAL EXAM WITH FREQUENTLY TESTED QUESTIONS AND STUDY
GUIDE / EXPERT VERIFIED FOR GUARANTEED PASS/ALREADY GRADED A+






C SSL

D DES - (ANSWER)D



In order for User A to send User B an encrypted message that only User B can read, User A must encrypt
message with which of the following keys?



A User A's public key

B User A's private key

C User B's public key

D User B's private key - (ANSWER)C



The greatest weakness with symmetric algorithms is _____.



A They are less secure than asymmetric

B The problem of key exchange

C They are slower than asymmetric

D The problem of generating keys - (ANSWER)B



Which of the following is generally true about block sizes?



A Smaller block sizes increase security

B Block sizes must be more than 256 bits to be secure

C Block size is irrelevant to security

D Larger block sizes increase security - (ANSWER)D



A _____ is a function that takes a variable-size input m and returns a fixed-size string.

,WGU C839 INTRO TO CRYPTOGRAPHY FINAL EXAM 2025 BANK 2 VERSIONS QUESTIONS
AND ACCURATE ACTUAL EXAM WITH FREQUENTLY TESTED QUESTIONS AND STUDY
GUIDE / EXPERT VERIFIED FOR GUARANTEED PASS/ALREADY GRADED A+






A Symmetric cipher

B Hash

C Asymmetric cipher

D Feistel - (ANSWER)B



Which of the following is a cryptographic protocol that allows two parties to establish a shared key over
an insecure channel?



A Elliptic Curve

B RSA

C MD5

D Diffie-Hellman - (ANSWER)D



A _________ is a digital representation of information that identifies you as a relevant entity by a
trusted third party?



A Digital Signature

B Hash

C Ownership stamp

D Digest - (ANSWER)A



What is the standard used by most digital certificates?



A X.509

B CRL

, WGU C839 INTRO TO CRYPTOGRAPHY FINAL EXAM 2025 BANK 2 VERSIONS QUESTIONS
AND ACCURATE ACTUAL EXAM WITH FREQUENTLY TESTED QUESTIONS AND STUDY
GUIDE / EXPERT VERIFIED FOR GUARANTEED PASS/ALREADY GRADED A+






C RFC 2298

D OCSP - (ANSWER)A



DES uses keys of what size?



A 56 bits

B 192 bits

C 128 bits

D 64 bits - (ANSWER)A



Which of the following is NOT a key size used by AES?



A 512 bits

B 128 bits

C 192 bits

D 256 bits - (ANSWER)A



Which of the following was a multi alphabet cipher widely used from the 16th century (1553) to the
early 20th century (1900s)?



A Vigenere

B Caesar

C Atbash

D Scytale - (ANSWER)A



Which of the following is a substitution cipher used by ancient Hebrew scholars?
$17.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
SmartAllay Harvard University
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
3825
Miembro desde
11 meses
Número de seguidores
8
Documentos
1401
Última venta
1 día hace

A+ Graded docs for tight schedule and deadline....ALL THE BEST!!!!!

5.0

4 reseñas

5
4
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes