100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C839V5/D334 PASSED Exam WITH 100% VERIFIED QUESTIONS AND EXPERT SOLUTION (GUARANTEED VALUE AND SUCCESS).

Rating
-
Sold
-
Pages
42
Grade
A+
Uploaded on
22-10-2025
Written in
2025/2026

WGU C839V5/D334 PASSED Exam WITH 100% VERIFIED QUESTIONS AND EXPERT SOLUTION (GUARANTEED VALUE AND SUCCESS).

Institution
WGU C839V5/D334
Module
WGU C839V5/D334











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C839V5/D334
Module
WGU C839V5/D334

Document information

Uploaded on
October 22, 2025
Number of pages
42
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Page | | | ||


1
WGU C839V5 D334 PASSED Exam 2025-2026
WITH 100% VERIFIED QUESTIONS AND
EXPERT SOLUTION (GUARANTEED VALUE AND
SUCCESS).

1. Symmetric block ciphers make use of || || || || || || to perform substitution as
|| || ||


part the encryption process.
|| || || ||


A. p-boxes
B. s-boxes
C. IVs - correct answer - S-boxes || || || || ||




2. PRESENT is a light-weight symmetric block cipher with a key size of 80
|| || || || || || || || || || || ||


or 128 bits, 32 rounds, and
|| || || bit block size. || || || || || ||


A. 32
B. 64
C. 128 - correct answer - 64 || || || || ||




3. cryptography makes use of a key pair (one public, one private) || || || || || || || || || ||


|| to perform encryption and decryption. If a given key in a key pair is used
|| || || || || || || || || || || || || ||


|| for encryption, only the opposite key in that key pair can perform the
|| || || || || || || || || || || ||


|| reverse decryption. ||


A. Symmetric
B. Asymmetric
C. Hash - correct answer - Asymmetric || || || || ||




4. When encrypting data using symmetric cryptography, which key may
|| || || || || || || ||


need to be exchanged to facilitate decryption?
|| || || || || || ||

, Page | | | ||


2
A. Secret key ||


B. Private key ||


C. Public key - correct answer - Secret key || || || || || || ||




5. RC5 is a conventional symmetric block cipher that is suitable for light-
|| || || || || || || || || || ||


weight implementations. It has a variable key size with a max of
|| || || || || || || || || || || ||


bits.
A. 128
B. 256
C. 2048 - correct answer - 2048 || || || || ||




6. What is the block and key size in bits used by the light-weight symmetric
|| || || || || || || || || || || || ||


block cipher CLEFIA?
|| || ||


A. 64 bit blocks; 64 bit keys
|| || || || ||


B. 64 or 80 bit blocks; 128 bit keys
|| || || || || || ||


C. 128 bit blocks; 128, 192, or 256 bit keys - correct answer - 128 bit
|| || || || || || || || || || || || || ||


blocks; 128, 192, or 256 bit keys || || || || || ||




7. If Shawn employs public key cryptography to send Sue a digitally signed
|| || || || || || || || || || ||


message, which key will Sue use to decrypt the message?
|| || || || || || || || || ||


A. Sue's private key || ||


B. Shawn's private key || ||


C. Sue's public key - correct answer - Sue's private key || || || || || || || || ||




8. is a public key encryption method that is an extension of El
|| || || || || || || || || || ||


|| Gamal but adds a one-way hashing method which protects against an
|| || || || || || || || || ||


|| adaptive chosen ciphertext attack. || || ||

, Page | | | ||


3
A. Cramer-Shoup
B. Ephemeral
C. Key Clustering - correct answer - Cramer-Shoup
|| || || || || ||




9. With || encryption, we can perform mathematical operations on || || || || || ||


ciphered values i.e., before decryption.
|| || || || ||


A. Polyalphabetic
B. Homomorphic
C. Quantum - correct answer - Homomorphic || || || || ||




10. allows for a new unique passcode to be created for each || || || || || || || || || ||


|| instance, based on an initial seed and for a given time period.
|| || || || || || || || || || ||


A. One Time Passwords (OTP)
|| || ||


B. Hashed One Time Passwords (HOTP) || || || ||


C. Timed One Time Password (TOTP) - correct answer - TOTP
|| || || || || || || || ||




11. Which encoding scheme for x.509 certificates supports Base64 and
|| || || || || || || ||


|| ASCII formats?
||


A. DER
B. PEM
C. MAC - correct answer - PEM
|| || || || ||




12. If Shawn plans to employ asymmetric cryptography to send Sue a
|| || || || || || || || || ||


|| digitally signed message, which key will Shawn use to sign the
|| || || || || || || || || ||


|| message?
A. Sue's private key || ||


B. Shawn's private key || ||

, Page | | | ||


4
C. Sue's public key - correct answer - Shawn's private key
|| || || || || || || || ||




13. If Shawn employs public key cryptography to send Sue a digitally
|| || || || || || || || || ||


|| signed message, which key will Sue use to verify the message?
|| || || || || || || || || ||


A. Sue's private key || ||


B. Shawn's public key || ||


C. Sue's public key - correct answer - Shawn's public key
|| || || || || || || || ||




14. The hash value in bits for MD5 is
|| || || || || || || || .
A. 128
B. 160
C. 256 - correct answer - 128
|| || || || ||




15. Hashing involves taking a || length input and producing a || || || || || || || ||


|| length output (message digest).
|| || ||


A. fixed; fixed ||


B. variable; fixed ||


C. fixed; variable - correct answer - variable; fixed
|| || || || || || ||




16. The hash value in bits for SHA-1 is
|| || || || || || || || .
A. 128
B. 160
C. 256 - correct answer - 160
|| || || || ||




17. The hash value in bits for MD4 is
|| || || || || || || || .
A. 128

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Lectphilip West Virginia University
View profile
Follow You need to be logged in order to follow users or courses
Sold
168
Member since
1 year
Number of followers
6
Documents
17934
Last sold
1 day ago
WELCOME TO LECTPHILIP, A PLACE WHERE WE UNLOCK YOUR ACADEMIC OPPORTUNITIES

On this page, you find all documents, package deals and flashcards offered by seller lectphilip

4.3

24 reviews

5
14
4
5
3
4
2
1
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions