Page | | | ||
1
WGU C839V5 D334 PASSED Exam 2025-2026
WITH 100% VERIFIED QUESTIONS AND
EXPERT SOLUTION (GUARANTEED VALUE AND
SUCCESS).
1. Symmetric block ciphers make use of || || || || || || to perform substitution as
|| || ||
part the encryption process.
|| || || ||
A. p-boxes
B. s-boxes
C. IVs - correct answer - S-boxes || || || || ||
2. PRESENT is a light-weight symmetric block cipher with a key size of 80
|| || || || || || || || || || || ||
or 128 bits, 32 rounds, and
|| || || bit block size. || || || || || ||
A. 32
B. 64
C. 128 - correct answer - 64 || || || || ||
3. cryptography makes use of a key pair (one public, one private) || || || || || || || || || ||
|| to perform encryption and decryption. If a given key in a key pair is used
|| || || || || || || || || || || || || ||
|| for encryption, only the opposite key in that key pair can perform the
|| || || || || || || || || || || ||
|| reverse decryption. ||
A. Symmetric
B. Asymmetric
C. Hash - correct answer - Asymmetric || || || || ||
4. When encrypting data using symmetric cryptography, which key may
|| || || || || || || ||
need to be exchanged to facilitate decryption?
|| || || || || || ||
, Page | | | ||
2
A. Secret key ||
B. Private key ||
C. Public key - correct answer - Secret key || || || || || || ||
5. RC5 is a conventional symmetric block cipher that is suitable for light-
|| || || || || || || || || || ||
weight implementations. It has a variable key size with a max of
|| || || || || || || || || || || ||
bits.
A. 128
B. 256
C. 2048 - correct answer - 2048 || || || || ||
6. What is the block and key size in bits used by the light-weight symmetric
|| || || || || || || || || || || || ||
block cipher CLEFIA?
|| || ||
A. 64 bit blocks; 64 bit keys
|| || || || ||
B. 64 or 80 bit blocks; 128 bit keys
|| || || || || || ||
C. 128 bit blocks; 128, 192, or 256 bit keys - correct answer - 128 bit
|| || || || || || || || || || || || || ||
blocks; 128, 192, or 256 bit keys || || || || || ||
7. If Shawn employs public key cryptography to send Sue a digitally signed
|| || || || || || || || || || ||
message, which key will Sue use to decrypt the message?
|| || || || || || || || || ||
A. Sue's private key || ||
B. Shawn's private key || ||
C. Sue's public key - correct answer - Sue's private key || || || || || || || || ||
8. is a public key encryption method that is an extension of El
|| || || || || || || || || || ||
|| Gamal but adds a one-way hashing method which protects against an
|| || || || || || || || || ||
|| adaptive chosen ciphertext attack. || || ||
, Page | | | ||
3
A. Cramer-Shoup
B. Ephemeral
C. Key Clustering - correct answer - Cramer-Shoup
|| || || || || ||
9. With || encryption, we can perform mathematical operations on || || || || || ||
ciphered values i.e., before decryption.
|| || || || ||
A. Polyalphabetic
B. Homomorphic
C. Quantum - correct answer - Homomorphic || || || || ||
10. allows for a new unique passcode to be created for each || || || || || || || || || ||
|| instance, based on an initial seed and for a given time period.
|| || || || || || || || || || ||
A. One Time Passwords (OTP)
|| || ||
B. Hashed One Time Passwords (HOTP) || || || ||
C. Timed One Time Password (TOTP) - correct answer - TOTP
|| || || || || || || || ||
11. Which encoding scheme for x.509 certificates supports Base64 and
|| || || || || || || ||
|| ASCII formats?
||
A. DER
B. PEM
C. MAC - correct answer - PEM
|| || || || ||
12. If Shawn plans to employ asymmetric cryptography to send Sue a
|| || || || || || || || || ||
|| digitally signed message, which key will Shawn use to sign the
|| || || || || || || || || ||
|| message?
A. Sue's private key || ||
B. Shawn's private key || ||
, Page | | | ||
4
C. Sue's public key - correct answer - Shawn's private key
|| || || || || || || || ||
13. If Shawn employs public key cryptography to send Sue a digitally
|| || || || || || || || || ||
|| signed message, which key will Sue use to verify the message?
|| || || || || || || || || ||
A. Sue's private key || ||
B. Shawn's public key || ||
C. Sue's public key - correct answer - Shawn's public key
|| || || || || || || || ||
14. The hash value in bits for MD5 is
|| || || || || || || || .
A. 128
B. 160
C. 256 - correct answer - 128
|| || || || ||
15. Hashing involves taking a || length input and producing a || || || || || || || ||
|| length output (message digest).
|| || ||
A. fixed; fixed ||
B. variable; fixed ||
C. fixed; variable - correct answer - variable; fixed
|| || || || || || ||
16. The hash value in bits for SHA-1 is
|| || || || || || || || .
A. 128
B. 160
C. 256 - correct answer - 160
|| || || || ||
17. The hash value in bits for MD4 is
|| || || || || || || || .
A. 128
1
WGU C839V5 D334 PASSED Exam 2025-2026
WITH 100% VERIFIED QUESTIONS AND
EXPERT SOLUTION (GUARANTEED VALUE AND
SUCCESS).
1. Symmetric block ciphers make use of || || || || || || to perform substitution as
|| || ||
part the encryption process.
|| || || ||
A. p-boxes
B. s-boxes
C. IVs - correct answer - S-boxes || || || || ||
2. PRESENT is a light-weight symmetric block cipher with a key size of 80
|| || || || || || || || || || || ||
or 128 bits, 32 rounds, and
|| || || bit block size. || || || || || ||
A. 32
B. 64
C. 128 - correct answer - 64 || || || || ||
3. cryptography makes use of a key pair (one public, one private) || || || || || || || || || ||
|| to perform encryption and decryption. If a given key in a key pair is used
|| || || || || || || || || || || || || ||
|| for encryption, only the opposite key in that key pair can perform the
|| || || || || || || || || || || ||
|| reverse decryption. ||
A. Symmetric
B. Asymmetric
C. Hash - correct answer - Asymmetric || || || || ||
4. When encrypting data using symmetric cryptography, which key may
|| || || || || || || ||
need to be exchanged to facilitate decryption?
|| || || || || || ||
, Page | | | ||
2
A. Secret key ||
B. Private key ||
C. Public key - correct answer - Secret key || || || || || || ||
5. RC5 is a conventional symmetric block cipher that is suitable for light-
|| || || || || || || || || || ||
weight implementations. It has a variable key size with a max of
|| || || || || || || || || || || ||
bits.
A. 128
B. 256
C. 2048 - correct answer - 2048 || || || || ||
6. What is the block and key size in bits used by the light-weight symmetric
|| || || || || || || || || || || || ||
block cipher CLEFIA?
|| || ||
A. 64 bit blocks; 64 bit keys
|| || || || ||
B. 64 or 80 bit blocks; 128 bit keys
|| || || || || || ||
C. 128 bit blocks; 128, 192, or 256 bit keys - correct answer - 128 bit
|| || || || || || || || || || || || || ||
blocks; 128, 192, or 256 bit keys || || || || || ||
7. If Shawn employs public key cryptography to send Sue a digitally signed
|| || || || || || || || || || ||
message, which key will Sue use to decrypt the message?
|| || || || || || || || || ||
A. Sue's private key || ||
B. Shawn's private key || ||
C. Sue's public key - correct answer - Sue's private key || || || || || || || || ||
8. is a public key encryption method that is an extension of El
|| || || || || || || || || || ||
|| Gamal but adds a one-way hashing method which protects against an
|| || || || || || || || || ||
|| adaptive chosen ciphertext attack. || || ||
, Page | | | ||
3
A. Cramer-Shoup
B. Ephemeral
C. Key Clustering - correct answer - Cramer-Shoup
|| || || || || ||
9. With || encryption, we can perform mathematical operations on || || || || || ||
ciphered values i.e., before decryption.
|| || || || ||
A. Polyalphabetic
B. Homomorphic
C. Quantum - correct answer - Homomorphic || || || || ||
10. allows for a new unique passcode to be created for each || || || || || || || || || ||
|| instance, based on an initial seed and for a given time period.
|| || || || || || || || || || ||
A. One Time Passwords (OTP)
|| || ||
B. Hashed One Time Passwords (HOTP) || || || ||
C. Timed One Time Password (TOTP) - correct answer - TOTP
|| || || || || || || || ||
11. Which encoding scheme for x.509 certificates supports Base64 and
|| || || || || || || ||
|| ASCII formats?
||
A. DER
B. PEM
C. MAC - correct answer - PEM
|| || || || ||
12. If Shawn plans to employ asymmetric cryptography to send Sue a
|| || || || || || || || || ||
|| digitally signed message, which key will Shawn use to sign the
|| || || || || || || || || ||
|| message?
A. Sue's private key || ||
B. Shawn's private key || ||
, Page | | | ||
4
C. Sue's public key - correct answer - Shawn's private key
|| || || || || || || || ||
13. If Shawn employs public key cryptography to send Sue a digitally
|| || || || || || || || || ||
|| signed message, which key will Sue use to verify the message?
|| || || || || || || || || ||
A. Sue's private key || ||
B. Shawn's public key || ||
C. Sue's public key - correct answer - Shawn's public key
|| || || || || || || || ||
14. The hash value in bits for MD5 is
|| || || || || || || || .
A. 128
B. 160
C. 256 - correct answer - 128
|| || || || ||
15. Hashing involves taking a || length input and producing a || || || || || || || ||
|| length output (message digest).
|| || ||
A. fixed; fixed ||
B. variable; fixed ||
C. fixed; variable - correct answer - variable; fixed
|| || || || || || ||
16. The hash value in bits for SHA-1 is
|| || || || || || || || .
A. 128
B. 160
C. 256 - correct answer - 160
|| || || || ||
17. The hash value in bits for MD4 is
|| || || || || || || || .
A. 128