100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU D334 OBJECTIVE ASSESSMENT ACTUAL EXAM 2025/2026 QUESTIONS WITH VERIFIED CORRECT SOLUTIONS || 100% GUARANTEED PASS <BRAND NEW VERSION>

Rating
3.0
(1)
Sold
7
Pages
31
Grade
A+
Uploaded on
04-03-2025
Written in
2024/2025

WGU D334 OBJECTIVE ASSESSMENT ACTUAL EXAM 2025/2026 QUESTIONS WITH VERIFIED CORRECT SOLUTIONS || 100% GUARANTEED PASS &lt;BRAND NEW VERSION&gt; 1. Electronic Code Book (ECB) - ANSWER Block 1 encrypted = Cipher 1, Block 2 encrypted = Cipher 2 2. Cipher Block Chaining (CBC) - ANSWER IV XOR Block 1 = Cipher text 1, Cipher Text 1 XOR Block 2 = Cipher text 2. 3. Cipher Feedback (CFB) - ANSWER IV encrypted XOR Block 1 = Cipher 1, Cipher 1 XOR Block 2 = Cipher 2 4. Output Feedback (OFB) - ANSWER IV encrypted XOR Block 1 = Cipher 1, Cipher 1 encrypted XOR Block 2 = Cipher 2 5. Counter Mode (CTR) - ANSWER Nonce encrypted XOR Block 1 = Cipher 1, Nonce +1 encrypted XOR block 2 = Cipher 2 6. Triple Data Encryption Standard (3DES) - ANSWER Symmetric Block Key size: 112 Block size: 64 Rounds: 48 7. Advanced Encryption Standard (AES) - ANSWER Symmetric Block Key Size: 128,192,256 Block size: 128 Rounds: 10, 12, 14 8. International Data Encryption Algorithm (IDEA) - ANSWER Symmetric Block Key Size: 128 Block Size: 64 Rounds: 17+ 9. Skipjack - ANSWER Symmetric Block Key Size: 80 Block Size: 64 Rounds: 32 10. Encryption - ANSWER Changing plaintext to ciphertext -Applied to information at rest and in transit 11. Decryption - ANSWER Process of changing ciphertext into plaintext 12. Encrypt individual Files - ANSWER Aescrypt 13. Encrypt Full Disks - ANSWER Bitlocker (Windows) Filevault (Mac) 14. Mono-alphabetic code - ANSWER A single mapping from our alphanet to a cipher alphabet is created -Early cryptosystems used this 15. Polyalphabetic - ANSWER The mapping of our alphabet to a number of cipher alphabets -Adds complexity 16. One-time pad - ANSWER Only uses its cipher code once -Unbreakable 17. Pseudo-Random Number Generators - ANSWER (PRNGs) Repeats the random numbers after a given time (periodic) -Fast and deterministic -Useful in producing repeatable set of random numbers 18. True Random Number Generators - ANSWER (TRNGs) Generates a true random number and uses some form of random process -Movements of a mouse -Pauses between keystrokes -Slow, but non-deterministic 19. Frequency Analysis - ANSWER Cipher cracking methodology that involves identifying patterns and variations in the probability of codes -3 letter code seen often at the beginning of sentences? Might be 'The' 20. Entropy - ANSWER Measures level of unpredictability - uncertainty in the encryption process 21. Encoding Methods - ANSWER ASCII (8-bit, up to 256 characters) UTF-16 (16-bit, up to 65,536 characters) 22. What is more efficient - hardware or software encryption? - ANSWER Hardware 23. HSM - ANSWER Hardware Security Module -a tamper-evident and intrusion-resistant physical device that safeguards and manages cryptographic keys and provides cryptographic processing 24. TPM - ANSWER Trusted Platform Module -A dedicated processor that handles hardware-level encryption; allows the use of full disk encryption on a hard drive in a manner that minimizes the impact on system performance -Contain encryption keys 25. AND - ANSWER 11110 10100 10100 26. OR - ANSWER 11110 10100 11110 27. XOR - ANSWER 1 1 1 1 0 1 0 100

Show more Read less
Institution
WGU D334
Course
WGU D334











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D334
Course
WGU D334

Document information

Uploaded on
March 4, 2025
Number of pages
31
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU D334 OBJECTIVE ASSESSMENT
ACTUAL EXAM 2025/2026 QUESTIONS WITH
VERIFIED CORRECT SOLUTIONS || 100%
GUARANTEED PASS
<BRAND NEW VERSION>



1. Electronic Code Book (ECB) - ANSWER ✓ Block 1 encrypted = Cipher 1,
Block 2 encrypted = Cipher 2

2. Cipher Block Chaining (CBC) - ANSWER ✓ IV XOR Block 1 = Cipher text
1, Cipher Text 1 XOR Block 2 = Cipher text 2.

3. Cipher Feedback (CFB) - ANSWER ✓ IV encrypted XOR Block 1 = Cipher
1, Cipher 1 XOR Block 2 = Cipher 2

4. Output Feedback (OFB) - ANSWER ✓ IV encrypted XOR Block 1 = Cipher
1, Cipher 1 encrypted XOR Block 2 = Cipher 2

5. Counter Mode (CTR) - ANSWER ✓ Nonce encrypted XOR Block 1 =
Cipher 1, Nonce +1 encrypted XOR block 2 = Cipher 2

6. Triple Data Encryption Standard (3DES) - ANSWER ✓ Symmetric Block
Key size: 112
Block size: 64
Rounds: 48

7. Advanced Encryption Standard (AES) - ANSWER ✓ Symmetric Block
Key Size: 128,192,256
Block size: 128
Rounds: 10, 12, 14

,8. International Data Encryption Algorithm (IDEA) - ANSWER ✓ Symmetric
Block
Key Size: 128
Block Size: 64
Rounds: 17+

9. Skipjack - ANSWER ✓ Symmetric Block
Key Size: 80
Block Size: 64
Rounds: 32

10.Encryption - ANSWER ✓ Changing plaintext to ciphertext
-Applied to information at rest and in transit

11.Decryption - ANSWER ✓ Process of changing ciphertext into plaintext

12.Encrypt individual Files - ANSWER ✓ Aescrypt

13.Encrypt Full Disks - ANSWER ✓ Bitlocker (Windows)
Filevault (Mac)

14.Mono-alphabetic code - ANSWER ✓ A single mapping from our alphanet to
a cipher alphabet is created
-Early cryptosystems used this

15.Polyalphabetic - ANSWER ✓ The mapping of our alphabet to a number of
cipher alphabets
-Adds complexity

16.One-time pad - ANSWER ✓ Only uses its cipher code once
-Unbreakable

17.Pseudo-Random Number Generators - ANSWER ✓ (PRNGs)
Repeats the random numbers after a given time (periodic)
-Fast and deterministic
-Useful in producing repeatable set of random numbers

18.True Random Number Generators - ANSWER ✓ (TRNGs)

, Generates a true random number and uses some form of random process
-Movements of a mouse
-Pauses between keystrokes
-Slow, but non-deterministic

19.Frequency Analysis - ANSWER ✓ Cipher cracking methodology that
involves identifying patterns and variations in the probability of codes
-3 letter code seen often at the beginning of sentences? Might be 'The'

20.Entropy - ANSWER ✓ Measures level of unpredictability - uncertainty in
the encryption process

21.Encoding Methods - ANSWER ✓ ASCII (8-bit, up to 256 characters)
UTF-16 (16-bit, up to 65,536 characters)

22.What is more efficient - hardware or software encryption? - ANSWER ✓
Hardware

23.HSM - ANSWER ✓ Hardware Security Module
-a tamper-evident and intrusion-resistant physical device that safeguards and
manages cryptographic keys and provides cryptographic processing

24.TPM - ANSWER ✓ Trusted Platform Module
-A dedicated processor that handles hardware-level encryption; allows the
use of full disk encryption on a hard drive in a manner that minimizes the
impact on system performance
-Contain encryption keys

25.AND - ANSWER ✓ 11110
10100
10100

26.OR - ANSWER ✓ 11110
10100
11110

27.XOR - ANSWER ✓ 1 1 1 1 0
1 0 100

, 01010

28.Pigpen - ANSWER ✓ Mono-alphabetic subsitution cipher that makes use of
mapping plaintext characters to graphical characters rather than to alphabetic
ones

29.Rail Code - ANSWER ✓ Employs a method to scramble text by writing it in
a sequence across a number of rails

30.BIFID - ANSWER ✓ Makes use of a grid and which maps the letters into
numeric values

31.Playfair - ANSWER ✓ 5x5 matrix containing the alphabet less the letter J.
Cipher/decipher process consists of a set of rules outlining use of column
and row combinations

32.Morse Code - ANSWER ✓ Encoding method, not a cipher, that works by
translating characters into a sequence of dots and dashes

33.Caesar - ANSWER ✓ Mono-alphabetic substitution known as a shift cipher

34.Vigenere - ANSWER ✓ Polyalphabetic cipher that involves using a different
mapping, based on a keyword, for each character of the cipher
-Same plaintext character will have different mappings

35.Four-square Cipher - ANSWER ✓ Uses four 5x5 matrices arranges in a
square, are where each matrix contains 25 letters for encoding and decoding
operations

36.Enigma Machine - ANSWER ✓ Polyalphabetic substitution cipher
-Weakness: none of the plain text letters could ne ciphered as itself

37.Secret Key encryption - ANSWER ✓ Symmetric Cryptography
-Makes use of a single secret key for both encryption and decryption
-Challenge: Finding a secure way to share the key

38.Diffie-Hellman - ANSWER ✓ Widely used key exchange algorithm used to
exchange the secret key in symmetric cryptography

Reviews from verified buyers

Showing all reviews
4 months ago

4 months ago

Thank you for your great feedback! Wishing you the best in your studies. If you ever need support with exam prep, assignments, research, test banks, or study resources, feel free to reach out or check out my page. I'm here to help! Warm regards

3.0

1 reviews

5
0
4
0
3
1
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
ProfBenjamin Havard School
View profile
Follow You need to be logged in order to follow users or courses
Sold
389
Member since
1 year
Number of followers
13
Documents
2785
Last sold
2 days ago
EXCELLENT ACHIEVERS LIBRARY

As a professional tutor, I provide exceptional assistance with homework, quizzes, and exams across various subjects, including Psychology, Nursing, Biological Sciences, Business, Engineering, Human Resource Management, and Mathematics. I am dedicated to offering high-quality support and ensuring that all work meets scholarly standards. To enhance the effectiveness of our services, I work with a team of experienced tutors to create comprehensive and effective revision materials. Together, we are committed to helping students achieve excellent grades through our collaborative efforts and expertise.

Read more Read less
3.8

70 reviews

5
30
4
11
3
21
2
4
1
4

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions