100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

2025 W G U D334 Additional Practice All Questions and Correct Answers | Graded A+ | Verified Answers | Just Released | Western Governors University

Rating
-
Sold
2
Pages
43
Grade
A+
Uploaded on
30-08-2025
Written in
2025/2026

2025 W G U D334 Additional Practice All Questions and Correct Answers | Graded A+ | Verified Answers | Just Released | Western Governors University

Institution
2025 W G U D334 Additional Practice
Course
2025 W G U D334 Additional Practice











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
2025 W G U D334 Additional Practice
Course
2025 W G U D334 Additional Practice

Document information

Uploaded on
August 30, 2025
Number of pages
43
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

2025 W G U D334 Additional Practice All Questions
and Correct Answers | Graded A+ | Verified Answers |
Just Released | Western Governors University
The hash value in bits for MD5 is ____.

A. 128

B. 160

C. 256 - (ANSWER)128



Hashing involves taking a _____ length input and producing a _____ length output
(message digest).

A. fixed; fixed

B. variable; fixed

C. fixed; variable - (ANSWER)variable; fixed



The hash value in bits for SHA-1 is ____.

A. 128

B. 160

C. 256 - (ANSWER)160



The hash value in bits for MD4 is ____.

A. 128

B. 160

C. 256 - (ANSWER)128

,IPSec ______ mode involves "end-to-end" encryption; i.e. data remains encrypted
from the time it leaves a sender's device to the time it arrives at the receiver's
device.

A. Tunnel

B. Transport

C. Trusted - (ANSWER)Transport



IPSec ______ mode involves encryption from gateway to gateway, i.e. just
through the public network space.

A. Tunnel

B. Transport

C. Trusted - (ANSWER)Tunnel



A security analyst on a local network using monitoring tools is likely to only be
able to read contents of traffic encrypted using IPSec ______ mode.

A. Tunnel

B. Transport

C. Trusted - (ANSWER)Tunnel



Remember, with tunnel mode, encryption does not happen until just before it
leaves the local network. Traffic likely remains unencrypted between the end user
device and the local network boundary.

,_____ is a lightweight cryptography method for signing messages (MAC). It boasts
a relatively undemanding hardware implementation (only ~3,333 gates required
at 1MHz clock rate) making it suitable for IoT implementation. -
(ANSWER)Chaskey



Chaskey has a key size of _____ bits.

A. 256

B. 128

C. 80 - (ANSWER)128



A weakness of one-way hashing is that the same piece of plaintext will result in
the same ciphertext unless _____ is applied.

A. Salt

B. Ash

C. Ether - (ANSWER)salt



The minimum recommended key size to use with RC4 is _____ bits.

A. 40

B. 20

C. 64 - (ANSWER)40



RC4 is a symmetric stream cipher with a variable key size up to a max of _____
bits.

, A. 256

B. 2048

C. 1024 - (ANSWER)2048



_____ has a block size of 64 bits, key size of 56 bits, and 16 rounds of substitution
& transposition.

A. DES

B. AES

C. RC4 - (ANSWER)Data Encryption Standard (DES)



A(n) _____ is a collection of precomputed hash values of actual plaintext
passwords used for password cracking.

A. initialization vector

B. key pair

C. rainbow table - (ANSWER)rainbow table



_____ is a common x.509 certificate file type that is used with both PEM and DER
formats.

A. .crt

B. .cer

C. .der - (ANSWER).cer

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Examinor Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
3052
Member since
1 year
Number of followers
1
Documents
3334
Last sold
6 hours ago

5.0

2 reviews

5
2
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions