100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU D334 Objective Assessment Exam 2025/2026 – Questions with Verified Correct Solutions (100% Guaranteed Pass)

Rating
-
Sold
1
Pages
22
Grade
A+
Uploaded on
11-09-2025
Written in
2025/2026

This document provides the complete set of actual exam questions with verified correct solutions for the WGU D334 Objective Assessment 2025/2026. It covers all essential course topics, ensuring students have accurate and exam-focused material to strengthen understanding and improve performance. With reliable solutions and clear explanations, this resource is designed to support thorough preparation and guaranteed exam success.

Show more Read less
Institution
WGU D334 Objective Assessment
Course
WGU D334 Objective Assessment










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D334 Objective Assessment
Course
WGU D334 Objective Assessment

Document information

Uploaded on
September 11, 2025
Number of pages
22
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

1



WGU D334 Objective Assessment Exam
2025/2026 – Questions with Verified Correct
Solutions (100% Guaranteed Pass)
Question 1

What is the primary purpose of cryptography in securing digital communications?
A. To increase data storage capacity
B. To transform information into an unreadable format requiring a key to decipher
C. To compress data for faster transmission
D. To authenticate hardware devices

B. To transform information into an unreadable format requiring a key to decipher
Rationale: Cryptography protects data by transforming it into an unreadable format
(ciphertext) that requires a key to decrypt, ensuring confidentiality and security during
transmission or storage.



Question 2

Which of the following is a characteristic of symmetric cryptography?
A. Uses a public and private key pair
B. Uses the same key for encryption and decryption
C. Requires a certificate authority
D. Is primarily used for digital signatures

B. Uses the same key for encryption and decryption
Rationale: Symmetric cryptography uses a single key for both encryption and decryption,
making it faster but requiring secure key distribution.



Question 3

Which cipher mode encrypts each block of plaintext independently?
A. Cipher Block Chaining (CBC)
B. Electronic Code Book (ECB)
C. Counter (CTR)
D. Output Feedback (OFB)

, 2


B. Electronic Code Book (ECB)
Rationale: ECB encrypts each block of plaintext independently using the same key,
resulting in identical ciphertext for identical plaintext blocks, which can be a security weakness.



Question 4

RC4 is classified as which type of cipher?
A. Symmetric block cipher
B. Asymmetric block cipher
C. Symmetric stream cipher
D. Asymmetric stream cipher

C. Symmetric stream cipher
Rationale: RC4 is a symmetric stream cipher, not a block cipher, commonly used with SSL
and WEP, though its vulnerabilities have reduced its security.



Question 5

Which of the following is a stream cipher?
A. AES
B. ChaCha
C. DES
D. IDEA

B. ChaCha
Rationale: ChaCha is a symmetric stream cipher, while AES, DES, and IDEA are block
ciphers. Stream ciphers process data as a continuous stream.



Question 6

What is a key advantage of asymmetric cryptography over symmetric cryptography?
A. Faster processing speed
B. Eliminates the need for secure key exchange
C. Uses a single key for encryption and decryption
D. Requires less computational power

B. Eliminates the need for secure key exchange
Rationale: Asymmetric cryptography uses a public/private key pair, allowing the public key
to be shared openly, eliminating the need for secure key exchange.

, 3




Question 7

Which block cipher mode converts a block cipher into a synchronous stream cipher?
A. Electronic Code Book (ECB)
B. Cipher Block Chaining (CBC)
C. Output Feedback (OFB)
D. Cipher Feedback (CFB)

C. Output Feedback (OFB)
Rationale: OFB mode generates a keystream independently of the plaintext, converting a
block cipher into a synchronous stream cipher.



Question 8

What is the role of a Certificate Authority (CA) in Public Key Infrastructure (PKI)?
A. To encrypt data
B. To issue and manage digital certificates
C. To generate symmetric keys
D. To perform data compression

B. To issue and manage digital certificates
Rationale: A CA issues and manages digital certificates to verify the authenticity of public
keys, ensuring trust in PKI systems.



Question 9

Which key is shared in asymmetric cryptography to facilitate decryption?
A. Secret key
B. Private key
C. Public key
D. Session key

C. Public key
Rationale: In asymmetric cryptography, the public key is shared to encrypt data, while the
private key, kept secret, is used for decryption.



Question 10

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
STUVIASTUDYGUIDE University Of California - Los Angeles (UCLA)
View profile
Follow You need to be logged in order to follow users or courses
Sold
570
Member since
2 year
Number of followers
198
Documents
4004
Last sold
6 hours ago
STUVIASTUDYGUIDES

Join Thousands of successful students who use our study materials to boost their grades. With carefully crafted notes and well-researched guides, you're just a click away from mastering your courses. Study hard, study smart, and get the grades you deserve!

3.5

72 reviews

5
31
4
11
3
9
2
7
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions