100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

WGU C839v5 / D334 Passed Exam 2025 | 100% Verified Questions & Expert Solutions | Guaranteed Value & Success

Puntuación
-
Vendido
-
Páginas
42
Grado
A+
Subido en
03-12-2025
Escrito en
2025/2026

This WGU C839v5 / D334 Passed Exam 2025 package includes 100% verified exam questions with expert solutions. Covers core cryptography concepts including symmetric and asymmetric encryption, hashing algorithms, public key infrastructure, digital signatures, certificates, and key management. Designed for WGU students aiming for guaranteed success, thorough understanding, and top grades in the course.

Mostrar más Leer menos
Institución
CyberSecurity Certified
Grado
CyberSecurity Certified











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CyberSecurity Certified
Grado
CyberSecurity Certified

Información del documento

Subido en
3 de diciembre de 2025
Número de páginas
42
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Vista previa del contenido

Page | 1

WGU C839V5/D334 PASSED Exam 2025 WITH
100% VERIFIED QUESTIONS AND EXPERT
SOLUTIONS| GUARANTEED VALUE AND
SUCCESS.

1. Symmetric block ciphers make use of to perform substitution as
part the encryption process.
A. p-boxes
B. s-boxes
C. IVs - correct answer - S-boxes




2. PRESENT is a light-weight symmetric block cipher with a key size of 80
or 128 bits, 32 rounds, and bit block size.
A. 32
B. 64
C. 128 - correct answer - 64




3. cryptography makes use of a key pair (one public, one private)
to perform encryption and decryption. If a given key in a key pair is used
for encryption, only the opposite key in that key pair can perform the
reverse decryption.
A. Symmetric
B. Asymmetric
C. Hash - correct answer - Asymmetric




4. When encrypting data using symmetric cryptography, which key may
need to be exchanged to facilitate decryption?

, Page | 2

A. Secret key
B. Private key
C. Public key - correct answer - Secret key




5. RC5 is a conventional symmetric block cipher that is suitable for light-
weight implementations. It has a variable key size with a max of
bits.
A. 128
B. 256
C. 2048 - correct answer - 2048




6. What is the block and key size in bits used by the light-weight symmetric
block cipher CLEFIA?
A. 64 bit blocks; 64 bit keys
B. 64 or 80 bit blocks; 128 bit keys
C. 128 bit blocks; 128, 192, or 256 bit keys - correct answer - 128 bit
blocks; 128, 192, or 256 bit keys




7. If Shawn employs public key cryptography to send Sue a digitally signed
message, which key will Sue use to decrypt the message?
A. Sue's private key
B. Shawn's private key
C. Sue's public key - correct answer - Sue's private key




8. is a public key encryption method that is an extension of El
Gamal but adds a one-way hashing method which protects against an
adaptive chosen ciphertext attack.

, Page | 3

A. Cramer-Shoup
B. Ephemeral
C. Key Clustering - correct answer - Cramer-Shoup




9. With encryption, we can perform mathematical operations on
ciphered values i.e., before decryption.
A. Polyalphabetic
B. Homomorphic
C. Quantum - correct answer - Homomorphic




10. allows for a new unique passcode to be created for each
instance, based on an initial seed and for a given time period.
A. One Time Passwords (OTP)
B. Hashed One Time Passwords (HOTP)
C. Timed One Time Password (TOTP) - correct answer - TOTP




11. Which encoding scheme for x.509 certificates supports Base64 and
ASCII formats?
A. DER
B. PEM
C. MAC - correct answer - PEM




12. If Shawn plans to employ asymmetric cryptography to send Sue a
digitally signed message, which key will Shawn use to sign the
message?
A. Sue's private key
B. Shawn's private key

, Page | 4

C. Sue's public key - correct answer - Shawn's private key




13. If Shawn employs public key cryptography to send Sue a digitally
signed message, which key will Sue use to verify the message?
A. Sue's private key
B. Shawn's public key
C. Sue's public key - correct answer - Shawn's public key


14. The hash value in bits for MD5 is .
A. 128
B. 160
C. 256 - correct answer - 128




15. Hashing involves taking a length input and producing a
length output (message digest).
A. fixed; fixed
B. variable; fixed
C. fixed; variable - correct answer - variable; fixed




16. The hash value in bits for SHA-1 is .
A. 128
B. 160
C. 256 - correct answer - 160




17. The hash value in bits for MD4 is .
A. 128
$10.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
StudyHQElite
5.0
(1)

Conoce al vendedor

Seller avatar
StudyHQElite Johns Hopkins University
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
2
Miembro desde
1 mes
Número de seguidores
0
Documentos
176
Última venta
1 semana hace
Study HQ Ellite Vault

Welcome to Study HQ Ellite , your space for clear, organized, and easy-to-understand study materials. Every guide is crafted to help you learn faster, master key concepts, and feel confident for quizzes, assignments, and exams. My notes are original, structured, and designed to save you time while improving your understanding of even the toughest topics. If my study materials help you succeed, please consider leaving a review , it helps other students know they can rely on these resources. Thank you for supporting Study HQ Ellite!

Lee mas Leer menos
5.0

1 reseñas

5
1
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes