(WGU)
D334 Introduction to Cryptography - WGU Western
Governors University
HNO1: Intro to Cryptography WGU D334 Assessment
Exam
Course Title and Number: HNO1: WGU D334 Assessment
Exam
Exam Title: Certification and Assessment
Exam Date: Exam 2025- 2026
Instructor: ____ [Insert Instructor’s Name] _______
Student Name: ___ [Insert Student’s Name] _____
Student ID: ____ [Insert Student ID] _____________
Examination
Time: - ____ Hours: ___ Minutes
Instructions:
1. Read each question carefully.
2. Answer all questions.
3. Use the provided answer sheet to mark your responses.
4. Ensure all answers are final before submitting the exam.
5. Please answer each question below and click Submit when you
have completed the Exam.
6. This test has a time limit, The test will save and submit
automatically when the time expires
7. This is Exam which will assess your knowledge on the course
Learning Resources.
Good Luck……...!
, I can Help BYPASS PROCTORED EXAM 📑
📱Hit Me UP__ Inbox Open 24/7 – 365 …...!!!!
💬 Chat with us here: 📧
Click Here To <<ORDER NOW >> Follow Link
https://yourassignmenthandlers.kit.com/93b2309b47
!!!.ORDER NOW.!!! << TO GET INSTANT EXPERT HELP >> !!!.ORDER
NOW.!!!
HNO1: Intro to Cryptography WGU D334 Assessment Exam
Review Actual Exam Questions 6- 60 and Answers | 100% Pass
Guaranteed | Graded A+ |
2025- 2026
HNO1: Intro to Cryptography WGU D334 Assessment Exam
D334 Introduction to Cryptography
WGU Western Governors University
Read All Instructions Carefully and Answer All the
Questions Correctly Good Luck: -
Bypass Proctor U Guardian Browser
I can Help U With Western Governors University WGU
Exams from OA Pre-Assessments or Any Other
Assessment and Exam Just HMU
Need Writing 📝Help? We've Got You Covered! ✍️
100% NO A I or Plagiarism Guaranteed🎯
💬 Chat with us here: 📧
, I can Help BYPASS PROCTORED EXAM 📑
📱Hit Me UP__ Inbox Open 24/7 – 365 …...!!!!
💬 Chat with us here: 📧
Need Writing 📝Help? We've Got You Covered! ✍️
100% NO A I or Plagiarism Guaranteed🎯
💬 Chat with us here: 📧
, I can Help BYPASS PROCTORED EXAM 📑
📱Hit Me UP__ Inbox Open 24/7 – 365 …...!!!!
💬 Chat with us here: 📧
HNO1 - Intro to Cryptography (Actual Exam
Questions 6-60)
This study guide contains the actual exam questions I took for
the HNO1: Intro to Cryptography course on March 25,
2025. The questions range from 6 to 60, which were the ones I
was able to retrieve after completing the exam. Please note
that the full exam contains 68 questions in total, and this
study guide covers a significant portion of those questions.
Use this guide to prepare for your upcoming exam, as it
includes the same questions you will encounter in the
actual test. Keep in mind, however, that while this guide
contains a comprehensive set of questions from the exam, it
does not include the full set from 1-68.
Good luck with your studies!
Actual Exam (Questions 6-60)
6. Which certificate format is text based?
a) Distinguished Encoding Rules (DER)
b) Rivest-Shamir-Adleman (RSA)
c) Public Key Infrastructure (PKI)
d) Privacy Enhanced Mail (PEM)
Answer: d) Privacy Enhanced Mail (PEM)
7. Which main stage of certificate management involves
certificate revocation?
a) Issued
b) Initialization
c) Hold
d) Cancellation
Answer: c) Hold
8. Which attack was used to crack Diffie-Hellman when
the keys for exportable software were limited to 512
bits or fewer?
a) Dictionary
b) OXOR
Need Writing 📝Help? We've Got You Covered! ✍️
100% NO A I or Plagiarism Guaranteed🎯
💬 Chat with us here: 📧
, I can Help BYPASS PROCTORED EXAM 📑
📱Hit Me UP__ Inbox Open 24/7 – 365 …...!!!!
💬 Chat with us here: 📧
c) OFREAK
d) Statistical analysis
Answer: c) OFREAK
9. A developer wants to perform code signing on
software so systems will trust the software. Which PKI
component is needed?
a) Digital certificate
b) Digital signature
c) Symmetric encryption
d) Asymmetric encryption
Answer: a) Digital certificate
10. A company wants to use two-factor authentication
to reduce the risk of network compromise if a password
is cracked. Which factor do the keys on a user's
certificate represent?
a) Somewhere the user is
b) Something the user is
c) Something the user knows
d) Something the user has
Answer: d) Something the user has
11. Two people want to share a symmetric key to
encrypt data. The person who created the key needs to
transfer it to the other person, ensuring no one else can
decrypt the key. Which key should the person who
created the symmetric key use?
a) Sender's public key
b) Recipient's private key
c) Recipient's public key
d) Sender's private key
Answer: c) Recipient's public key
12. Two people want to use a symmetric key to encrypt
data. The person who created the key needs to transfer
it to the other person, ensuring no one else can access
it. Which key should the person accepting the
symmetric key use to decrypt the message?
a) Recipient's private key
b) Sender's public key
c) Sender's private key
Need Writing 📝Help? We've Got You Covered! ✍️
100% NO A I or Plagiarism Guaranteed🎯
💬 Chat with us here: 📧
, I can Help BYPASS PROCTORED EXAM 📑
📱Hit Me UP__ Inbox Open 24/7 – 365 …...!!!!
💬 Chat with us here: 📧
d) Recipient's public key
Answer: a) Recipient's private key
13. What is used to protect WPA2?
a) 56-bit DES
b) 256-bit AES
c) 128-bit RC4
d) 1024-bit RSA
Answer: b) 256-bit AES
14. What is used to maintain confidentiality in WPA2?
a) PEAP
b) AES
c) TKIP
d) EAP
Answer: b) AES
15. Which mechanism associated with WEP is used to
ensure that the same plaintext value will result in a
different ciphertext?
a) Block algorithm
b) Global encryption key
c) Bit flipping
d) Initialization vector
Answer: d) Initialization vector
16. Which encryption is used in WEP?
a) 128-bit RC4
b) 256-bit AES
c) 128-bit AES
d) 40-bit RC4
Answer: d) 40-bit RC4
17. Which type of network were VPN connections
originally designed to tunnel through?
a) Encrypted
b) Protected
c) Private
d) Public
Answer: d) Public
Need Writing 📝Help? We've Got You Covered! ✍️
100% NO A I or Plagiarism Guaranteed🎯
💬 Chat with us here: 📧
, I can Help BYPASS PROCTORED EXAM 📑
📱Hit Me UP__ Inbox Open 24/7 – 365 …...!!!!
💬 Chat with us here: 📧
18. An administrator has configured a virtual private
network (VPN) connection utilizing IPsec transport mode
with Encapsulated Security Protocol (ESP) between a
server in the corporate office and a client computer in
the remote office. In which situation can the packet
content be inspected?
a) Only in the offsite location's network while data is in
transit
b) In the headquarters' and offsite location's networks
after the data has been sent
c) Only in the headquarters' network while data is in
transit
d) In devices at headquarters and offsite before being sent
and after being received
Answer: d) In devices at headquarters and offsite before
being sent and after being received
19. Which protocol indicates a virtual private network (VPN) is
using Encapsulating Security Payload (ESP)?
A) 48
B) 50
C) 51
D) 58
Correct Answer: B) 50
20. What is an attribute of RC4 encryption?
A) Substitution
B) Transposition
C) XOR
D) RSA
Correct Answer: C) XOR
21. Which cipher is polyalphabetic and uses a keyword for
encryption?
A) Bifid
B) OSHA-1
C) Caesar
D) Vigenère
Correct Answer: D) Vigenère
22. A security analyst uses a 15-letter shift to encrypt a
message. Which cipher is used to encrypt the message?
Need Writing 📝Help? We've Got You Covered! ✍️
100% NO A I or Plagiarism Guaranteed🎯
💬 Chat with us here: 📧
, I can Help BYPASS PROCTORED EXAM 📑
📱Hit Me UP__ Inbox Open 24/7 – 365 …...!!!!
💬 Chat with us here: 📧
A) Vigenère
B) Pigpen
C) Caesar
D) Playfair
Correct Answer: C) Caesar
23. What does a brute-force attack to break encryption
involve?
A) Analyzing ciphertext to identify text variation and comparing
the text to standard English characters
B) Interfering between two parties and sometimes intercepting
or modifying data in the communication stream
C) Performing an exhaustive search to attempt every possible
mapping or key
D) Identifying part of the ciphertext and the corresponding
plaintext
Correct Answer: C) Performing an exhaustive search
to attempt every possible mapping or key
24. Which type of exploit involves looking for similar
documents that generate the same hash?
A) Algebraic attack
B) Birthday attack
C) Linear cryptanalysis
D) Differential cryptanalysis
Correct Answer: B) Birthday attack
25. What is 53 mod 11?
A) 00
B) 04
C) 05
D) 09
Correct Answer: D) 09
26. Which result does 1010 XOR 0101?
A) 00000
B) 0011
C) 1100
D) 1111
Correct Answer: D) 1111
Need Writing 📝Help? We've Got You Covered! ✍️
100% NO A I or Plagiarism Guaranteed🎯
💬 Chat with us here: 📧
, I can Help BYPASS PROCTORED EXAM 📑
📱Hit Me UP__ Inbox Open 24/7 – 365 …...!!!!
💬 Chat with us here: 📧
27. Which symmetric encryption technique uses a 112-bit key
size and a 64-bit block size?
A) 27
B) 3DES
C) AES
D) OIDEA
Correct Answer: B) 3DES
28. What makes RC4 cipher unique compared to RCS and RC6?
A) Asymmetric
B) Stream
C) Symmetric
D) Block
Correct Answer: B) Stream
29. Which wireless cellular security standard uses either
A5/1 or A5/2 stream ciphers for encrypted
communications?
A) WPA
B) WEP
C) GSM
D) VPN
Answer:
✅ C) GSM
30. What do RC4 and AES have in common?
A) Both use stream encryption
B) Both use symmetric encryption
C) Both use block encryption
D) Both use asymmetric encryption
Answer:
✅ B) Both use symmetric encryption
31. How does CFB mode encryption function?
A) Encrypts each block with the same key, where each
block is independent of the others
B) Converts from block to stream, then uses a counter
value and a nonce to encrypt the data
Need Writing 📝Help? We've Got You Covered! ✍️
100% NO A I or Plagiarism Guaranteed🎯
💬 Chat with us here: 📧