100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C839v5 / D334 Passed Exam 2025 | 100% Verified Questions & Expert Solutions | Guaranteed Value & Success

Rating
-
Sold
-
Pages
42
Grade
A+
Uploaded on
03-12-2025
Written in
2025/2026

This WGU C839v5 / D334 Passed Exam 2025 package includes 100% verified exam questions with expert solutions. Covers core cryptography concepts including symmetric and asymmetric encryption, hashing algorithms, public key infrastructure, digital signatures, certificates, and key management. Designed for WGU students aiming for guaranteed success, thorough understanding, and top grades in the course.

Show more Read less
Institution
CyberSecurity Certified
Course
CyberSecurity Certified











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CyberSecurity Certified
Course
CyberSecurity Certified

Document information

Uploaded on
December 3, 2025
Number of pages
42
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

Page | 1

WGU C839V5/D334 PASSED Exam 2025 WITH
100% VERIFIED QUESTIONS AND EXPERT
SOLUTIONS| GUARANTEED VALUE AND
SUCCESS.

1. Symmetric block ciphers make use of to perform substitution as
part the encryption process.
A. p-boxes
B. s-boxes
C. IVs - correct answer - S-boxes




2. PRESENT is a light-weight symmetric block cipher with a key size of 80
or 128 bits, 32 rounds, and bit block size.
A. 32
B. 64
C. 128 - correct answer - 64




3. cryptography makes use of a key pair (one public, one private)
to perform encryption and decryption. If a given key in a key pair is used
for encryption, only the opposite key in that key pair can perform the
reverse decryption.
A. Symmetric
B. Asymmetric
C. Hash - correct answer - Asymmetric




4. When encrypting data using symmetric cryptography, which key may
need to be exchanged to facilitate decryption?

, Page | 2

A. Secret key
B. Private key
C. Public key - correct answer - Secret key




5. RC5 is a conventional symmetric block cipher that is suitable for light-
weight implementations. It has a variable key size with a max of
bits.
A. 128
B. 256
C. 2048 - correct answer - 2048




6. What is the block and key size in bits used by the light-weight symmetric
block cipher CLEFIA?
A. 64 bit blocks; 64 bit keys
B. 64 or 80 bit blocks; 128 bit keys
C. 128 bit blocks; 128, 192, or 256 bit keys - correct answer - 128 bit
blocks; 128, 192, or 256 bit keys




7. If Shawn employs public key cryptography to send Sue a digitally signed
message, which key will Sue use to decrypt the message?
A. Sue's private key
B. Shawn's private key
C. Sue's public key - correct answer - Sue's private key




8. is a public key encryption method that is an extension of El
Gamal but adds a one-way hashing method which protects against an
adaptive chosen ciphertext attack.

, Page | 3

A. Cramer-Shoup
B. Ephemeral
C. Key Clustering - correct answer - Cramer-Shoup




9. With encryption, we can perform mathematical operations on
ciphered values i.e., before decryption.
A. Polyalphabetic
B. Homomorphic
C. Quantum - correct answer - Homomorphic




10. allows for a new unique passcode to be created for each
instance, based on an initial seed and for a given time period.
A. One Time Passwords (OTP)
B. Hashed One Time Passwords (HOTP)
C. Timed One Time Password (TOTP) - correct answer - TOTP




11. Which encoding scheme for x.509 certificates supports Base64 and
ASCII formats?
A. DER
B. PEM
C. MAC - correct answer - PEM




12. If Shawn plans to employ asymmetric cryptography to send Sue a
digitally signed message, which key will Shawn use to sign the
message?
A. Sue's private key
B. Shawn's private key

, Page | 4

C. Sue's public key - correct answer - Shawn's private key




13. If Shawn employs public key cryptography to send Sue a digitally
signed message, which key will Sue use to verify the message?
A. Sue's private key
B. Shawn's public key
C. Sue's public key - correct answer - Shawn's public key


14. The hash value in bits for MD5 is .
A. 128
B. 160
C. 256 - correct answer - 128




15. Hashing involves taking a length input and producing a
length output (message digest).
A. fixed; fixed
B. variable; fixed
C. fixed; variable - correct answer - variable; fixed




16. The hash value in bits for SHA-1 is .
A. 128
B. 160
C. 256 - correct answer - 160




17. The hash value in bits for MD4 is .
A. 128
$10.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
StudyHQElite
5.0
(1)

Get to know the seller

Seller avatar
StudyHQElite Johns Hopkins University
View profile
Follow You need to be logged in order to follow users or courses
Sold
2
Member since
1 month
Number of followers
0
Documents
176
Last sold
1 week ago
Study HQ Ellite Vault

Welcome to Study HQ Ellite , your space for clear, organized, and easy-to-understand study materials. Every guide is crafted to help you learn faster, master key concepts, and feel confident for quizzes, assignments, and exams. My notes are original, structured, and designed to save you time while improving your understanding of even the toughest topics. If my study materials help you succeed, please consider leaving a review , it helps other students know they can rely on these resources. Thank you for supporting Study HQ Ellite!

Read more Read less
5.0

1 reviews

5
1
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions