100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C839v5/D334 Additional Exam Questions and Answers Verified 100%.

Rating
-
Sold
-
Pages
15
Grade
A+
Uploaded on
20-07-2025
Written in
2024/2025

WGU C839v5/D334 Additional Exam Questions and Answers Verified 100%. The hash value in bits for MD5 is . - CORRECT ANS>>128 Hashing involves taking a length input and producing a length output (message digest). - CORRECT ANS>>variable; fixed The hash value in bits for SHA-1 is . - CORRECT ANS>>160 The hash value in bits for MD4 is . - CORRECT ANS>>128 IPSec mode involves "end-to-end" encryption; i.e. data remains encrypted from the time it leaves a sender's device to the time it arrives at the receiver's device. - CORRECT ANS>>Transport IPSec mode involves encryption from gateway to gateway, i.e. just through the public network space. - CORRECT ANS>>Tunnel A security analyst on a local network using monitoring tools is likely to only be able to read contents of traffic encrypted using IPSec mode. - CORRECT ANS>>Tunnel Remember, with tunnel mode, encryption does not happen until just before it leaves the local network. Traffic likely remains unencrypted between the end user device and the local network boundary. is a lightweight cryptography method for signing messages (MAC). It boasts a relatively undemanding hardware implementation (only ~3,333 gates required at 1MHz clock rate) making it suitable for IoT implementation. - CORRECT ANS>>Chaskey Chaskey has a key size of bits. - CORRECT ANS>>128 A weakness of one-way hashing is that the same piece of plaintext will result in the same ciphertext unless is applied. - CORRECT ANS>>salt The minimum recommended key size to use with RC4 is bits. - CORRECT ANS>>40 RC4 is a symmetric stream cipher with a variable key size up to a max of bits. - CORRECT ANS>>2048 has a block size of 64 bits, key size of 56 bits, and 16 rounds of substitution & transposition. - CORRECT ANS>>Data Encryption Standard (DES) A(n) is a collection of precomputed hash values of actual plaintext passwords used for password cracking. - CORRECT ANS>>rainbow table is a common x.509 certificate file type that is used with both PEM and DER formats. - CORRECT ANS>>.cer has a block size of 64 bits, key size of 112 bits, and 48 rounds of substitution & transposition. - CORRECT ANS>>Triple Data Encryption Standard (3DES)

Show more Read less
Institution
WGU C839v5/D334
Course
WGU C839v5/D334









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C839v5/D334
Course
WGU C839v5/D334

Document information

Uploaded on
July 20, 2025
Number of pages
15
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU C839v5/D334 Additional Exam Questions and
Answers 2025-2026 Verified 100%.
The hash value in bits for MD5 is .
- CORRECT ANS>>128


Hashing involves taking a length input and producing a length output (message digest).
- CORRECT ANS>>variable; fixed


The hash value in bits for SHA-1 is .
- CORRECT ANS>>160


The hash value in bits for MD4 is .
- CORRECT ANS>>128


IPSec mode involves "end-to-end" encryption; i.e. data remains encrypted from the time it leaves a
sender's device to the time it arrives at the receiver's device.
- CORRECT ANS>>Transport


IPSec mode involves encryption from gateway to gateway, i.e. just through the public network space.
- CORRECT ANS>>Tunnel


A security analyst on a local network using monitoring tools is likely to only be able to read contents of
traffic encrypted using IPSec mode.
- CORRECT ANS>>Tunnel


Remember, with tunnel mode, encryption does not happen until just before it leaves the local network.
Traffic likely remains unencrypted between the end user device and the local network boundary.


is a lightweight cryptography method for signing messages (MAC). It boasts a relatively
undemanding hardware implementation (only ~3,333 gates required at 1MHz clock rate) making it
suitable for IoT implementation. - CORRECT ANS>>Chaskey


Chaskey has a key size of bits.
- CORRECT ANS>>128


A weakness of one-way hashing is that the same piece of plaintext will result in the same ciphertext
unless is applied.
- CORRECT ANS>>salt

, The minimum recommended key size to use with RC4 is bits.
- CORRECT ANS>>40


RC4 is a symmetric stream cipher with a variable key size up to a max of bits.
- CORRECT ANS>>2048


has a block size of 64 bits, key size of 56 bits, and 16 rounds of substitution & transposition.
- CORRECT ANS>>Data Encryption Standard (DES)


A(n) is a collection of precomputed hash values of actual plaintext passwords used for password
cracking.
- CORRECT ANS>>rainbow table


is a common x.509 certificate file type that is used with both PEM and DER formats.
- CORRECT ANS>>.cer


has a block size of 64 bits, key size of 112 bits, and 48 rounds of substitution & transposition.
- CORRECT ANS>>Triple Data Encryption Standard (3DES)


Key sizes used with the Advanced Encryption Standard (AES) include . , or .
- CORRECT ANS>>128, 192, 256


The Advanced Encryption Standard (AES) operates using bit blocks.
- CORRECT ANS>>128


Skipjack is a symmetric block cipher that uses a bit key.
- CORRECT ANS>>80


Enocoro operates with a key size of bits and an initialization vector (IV) of bits.
- CORRECT ANS>>128-bit key size; 64-bit IV


Skipjack has a block size of bits.
- CORRECT ANS>>64


PHOTON, SPONGENT, Lesamnta-LW, and Quark are examples of light-weight
- CORRECT ANS>>Light-weight hashing algorithms


has a block size of 64 bits, key size of 128 bits, and >17 rounds of substitution & transposition.
- CORRECT ANS>>IDEA

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Nurslink Chamberlain College Of Nursing
Follow You need to be logged in order to follow users or courses
Sold
219
Member since
2 year
Number of followers
72
Documents
1675
Last sold
3 days ago
Nurslink.

Pre-eminent study guidance.

3,4

23 reviews

5
8
4
6
3
3
2
0
1
6

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions