WGU D334 Objective Assessment Exam
2025/2026 – Questions with Verified Correct
Solutions (100% Guaranteed Pass)
Question 1
What is the primary purpose of cryptography in securing digital communications?
A. To increase data storage capacity
B. To transform information into an unreadable format requiring a key to decipher
C. To compress data for faster transmission
D. To authenticate hardware devices
B. To transform information into an unreadable format requiring a key to decipher
Rationale: Cryptography protects data by transforming it into an unreadable format
(ciphertext) that requires a key to decrypt, ensuring confidentiality and security during
transmission or storage.
Question 2
Which of the following is a characteristic of symmetric cryptography?
A. Uses a public and private key pair
B. Uses the same key for encryption and decryption
C. Requires a certificate authority
D. Is primarily used for digital signatures
B. Uses the same key for encryption and decryption
Rationale: Symmetric cryptography uses a single key for both encryption and decryption,
making it faster but requiring secure key distribution.
Question 3
Which cipher mode encrypts each block of plaintext independently?
A. Cipher Block Chaining (CBC)
B. Electronic Code Book (ECB)
C. Counter (CTR)
D. Output Feedback (OFB)
, 2
B. Electronic Code Book (ECB)
Rationale: ECB encrypts each block of plaintext independently using the same key,
resulting in identical ciphertext for identical plaintext blocks, which can be a security weakness.
Question 4
RC4 is classified as which type of cipher?
A. Symmetric block cipher
B. Asymmetric block cipher
C. Symmetric stream cipher
D. Asymmetric stream cipher
C. Symmetric stream cipher
Rationale: RC4 is a symmetric stream cipher, not a block cipher, commonly used with SSL
and WEP, though its vulnerabilities have reduced its security.
Question 5
Which of the following is a stream cipher?
A. AES
B. ChaCha
C. DES
D. IDEA
B. ChaCha
Rationale: ChaCha is a symmetric stream cipher, while AES, DES, and IDEA are block
ciphers. Stream ciphers process data as a continuous stream.
Question 6
What is a key advantage of asymmetric cryptography over symmetric cryptography?
A. Faster processing speed
B. Eliminates the need for secure key exchange
C. Uses a single key for encryption and decryption
D. Requires less computational power
B. Eliminates the need for secure key exchange
Rationale: Asymmetric cryptography uses a public/private key pair, allowing the public key
to be shared openly, eliminating the need for secure key exchange.
, 3
Question 7
Which block cipher mode converts a block cipher into a synchronous stream cipher?
A. Electronic Code Book (ECB)
B. Cipher Block Chaining (CBC)
C. Output Feedback (OFB)
D. Cipher Feedback (CFB)
C. Output Feedback (OFB)
Rationale: OFB mode generates a keystream independently of the plaintext, converting a
block cipher into a synchronous stream cipher.
Question 8
What is the role of a Certificate Authority (CA) in Public Key Infrastructure (PKI)?
A. To encrypt data
B. To issue and manage digital certificates
C. To generate symmetric keys
D. To perform data compression
B. To issue and manage digital certificates
Rationale: A CA issues and manages digital certificates to verify the authenticity of public
keys, ensuring trust in PKI systems.
Question 9
Which key is shared in asymmetric cryptography to facilitate decryption?
A. Secret key
B. Private key
C. Public key
D. Session key
C. Public key
Rationale: In asymmetric cryptography, the public key is shared to encrypt data, while the
private key, kept secret, is used for decryption.
Question 10