WGU
Latest uploads at WGU. Looking for notes at WGU? We have lots of notes, study guides and study notes available for your school.
-
6274
- 0
-
290
All courses for WGU
- WGU 5177
- WGU C405 Anatomy and Physiology Task I 3
- WGU , 1
- WGU 1
- WGU C107, C405 Anatomy and Physiology I & II 1
- WGU C455 English Composition: Evaluate the benefits of pursuing a specific hobby C455 1
- WGU C493 Leadership and Professional Image C493 1
- WGU, 3
- WGU, , 1
- WGU: 1
Latest notes & summaries WGU
WGU - MBA - C211 - Global Economics 
for Managers Questions and Answers 
Rated A 
Base of the pyramid (BOP) Economies where people make less than $2,000 per capita per 
year. 
BRICA Brazil, Russia, India, and China. 
Emerging economies term that has gradually replaced the term "developing countries" since 
the 1990s. 
Emerging markets A term that is often used interchangeably with "emerging economies." 
Expatriate manager A manager who works abroad, or "expat" for short. 
Foreign direct in...
WGU C211PRE-ASSESSMENT: GLOBAL 
ECONOMICS FOR MANAGERS (UZC2) 
with Correct Answers Only 
Which view claims that the phenomenon of globalization was initially driven by the desire of 
Western economies to exploit their power through multinational enterprises? The new-force 
view 
Economic gains come from international trade because one country's exported goods, services, or 
other items are unique, valuable, and difficult to duplicate to the importing countries Resourcebased view 
What is the a...
WGU C211PRE-ASSESSMENT: GLOBAL 
ECONOMICS FOR MANAGERS (UZC2) 
with Correct Answers Only 
Which view claims that the phenomenon of globalization was initially driven by the desire of 
Western economies to exploit their power through multinational enterprises? The new-force 
view 
Economic gains come from international trade because one country's exported goods, services, or 
other items are unique, valuable, and difficult to duplicate to the importing countries Resourcebased view 
What is the a...
Intro to Cryptography WGU C839 Module 
1 Already Passed 
Most primitive of cryptographic algorithms, substitutes one character of cipher text for each 
character of plain text. Includes 
Caesar Cipher 
Atbash Cipher 
Affine Cipher 
Rot13 Cipher Mono-Alphabet Substitution 
First used by Julius Caesar 
Every letter is shifted a fixed number of spaces to the left or right the alphabet. Caesar Cipher 
Hebrew Code 
substitutes the first letter of the alphabet for the last, and the second letter for t...
Intro to Cryptography WGU C839 Module 
3 Questions and Answers 100% Pass 
Consists of public and private keys 
The public key is made public by publishing to a directory or installed on a computer. 
The private key is kept secret 
Does not involve exchanging a secret key or key exchange 
The public key is used to encrypt messages only the recipients private key can decrypt 
Asymmetric Cryptography 
Slower then Symmetric algorithms 
provides a secure way to communicate 
provides a method of valid...
Intro to Cryptography WGU C839 Module 
4 Already Passed 
These are usually the encryption of a message digest with the senders private key. 
In order to verify them, the recipient uses the senders public key. 
They are considered good if they provide the following. 
Authentication 
Integrity 
Non-repudiation Digital Signature 
It is a digital document that contains a public key and some information to allow your system to 
verify where they key came from. 
This is the most common way to distribu...
WGU - C839 Things to Memorize 
AES is ___ 
a. Asymmetric 
b. Symmetric B 
Serpent is ___ 
a. Asymmetric 
b. Symmetric B 
Two Fish is ___ 
a. Asymmetric 
b. Symmetric B 
RC5 & RC6 is ___ 
a. Asymmetric 
b. Symmetric B 
IDEA is ___ 
a. Asymmetric 
b. Symmetric B 
TEA is ___ 
a. Asymmetric 
b. Symmetric B 
Shark is ___ 
a. Asymmetric 
b. Symmetric BCAST is ___ 
a. Asymmetric 
b. Symmetric B 
Blowfish is ___ 
a. Asymmetric 
b. Symmetric B 
DES is ___ 
a. Asymmetric 
b. Symmetric B 
3DES is ___ 
a. A...
WGU C839 Flash Cards for OA Already 
Graded A 
DES 64 Bit Block - 56 Bit Key - 16 Rounds 
AES 128 Bit Block - 128, 192, 256 Bit Key - 10, 12, 14 Rounds 
BlowFish 64 Bit Block - 32 thru 448 Bit Key - 16 Rounds 
TwoFish 128 Bit Block - 1 thru 256 Bit Key - 16 Rounds 
Serpent 128 Bit Block 128, 192, 256 Bit Key - 32 Rounds 
SkipJack 64 Bit Block - 80 Bit Key - 32 Rounds 
IDEA 64 Bit Block - 128 Bit Key - 8.5 Rounds 
Symmetric Block Ciphers DES - AES - BlowFish - TwoFish - Serpent - SkipJack - IDEA ...
WGU C839 Introduction to Cryptography 
- (EC-Council CES) Latest 
CrypTool Software which allows encryption of text using historic algorithms 
The Enigma Machine In World War II the Germans made use of an electro-mechanical rotor 
based cipher Known as The Enigma Machine. 
Allied cipher machines used in WWII included the British TypeX and the American SIGABA. 
The ADFGVX Cipher invented by Colonel Fritz Nebel in 1918. 
The key for this algorithm is a six-by-six square of letters, used to encode...
WGU C839 Questions and Answers 
100% Pass 
Symmetric Which encryption standard uses the same key to encrypt and decrypt messages? 
Skipjack Which algorithm is designated as a Type 2 product by the National Security Agency 
(NSA)? 
X.509 v3 What is the most commonly used format for certificates? 
Certificate revocation list (CRL) What is referenced to determine if a certificate has been 
revoked? 
Sender's public key What needs to be installed on end users' computers to allow them to trust 
app...