11/26/25, 3:40 PM WGU C839V5/D334 Exam fully solved & updated 2025-2026(latest version verified for accuracy) | 2024\2025Latest!! Flashcards | …
WGU C839V5/D334 Exam fully solved & updated
2025-2026(latest version verified for accuracy) |
2024\2025Latest!!
Save
Terms in this set (152)
The hash value in bits for 128
MD5 is ____.
A. 128
B. 160
C. 256
Hashing involves taking a variable; fixed
_____ length input and
producing a _____ length
output (message digest).
A. fixed; fixed
B. variable; fixed
C. fixed; variable
The hash value in bits for 160
SHA-1 is ____.
A. 128
B. 160
C. 256
https://quizlet.com/1113579654/wgu-c839v5d334-exam-fully-solved-updated-2025-2026latest-version-verified-for-accuracy-20242025latest-flash-card… 1/25
,11/26/25, 3:40 PM WGU C839V5/D334 Exam fully solved & updated 2025-2026(latest version verified for accuracy) | 2024\2025Latest!! Flashcards | …
The hash value in bits for 128
MD4 is ____.
A. 128
B. 160
C. 256
IPSec ______ mode involves Transport
"end-to-end" encryption;
i.e. data remains
encrypted from the time it
leaves a sender's device to
the time it arrives at the
receiver's device.
A. Tunnel
B. Transport
C. Trusted
IPSec ______ mode involves Tunnel
encryption from gateway
to gateway, i.e. just
through the public
network space.
A. Tunnel
B. Transport
C. Trusted
A security analyst on a Tunnel
local network using
monitoring tools is likely Remember, with tunnel mode, encryption does not
to only be able to read happen until just before it leaves the local network.
contents of traffic Traffic likely remains unencrypted between the end
encrypted using IPSec user device and the local network boundary.
______ mode.
A. Tunnel
B. Transport
C. Trusted
https://quizlet.com/1113579654/wgu-c839v5d334-exam-fully-solved-updated-2025-2026latest-version-verified-for-accuracy-20242025latest-flash-card… 2/25
, 11/26/25, 3:40 PM WGU C839V5/D334 Exam fully solved & updated 2025-2026(latest version verified for accuracy) | 2024\2025Latest!! Flashcards | …
_____ is a lightweight Chaskey
cryptography method for
signing messages (MAC).
It boasts a relatively
undemanding hardware
implementation (only
~3,333 gates required at
1MHz clock rate) making it
suitable for IoT
implementation.
Chaskey has a key size of 128
_____ bits.
A. 256
B. 128
C. 80
A weakness of one-way salt
hashing is that the same
piece of plaintext will
result in the same
ciphertext unless _____ is
applied.
A. Salt
B. Ash
C. Ether
The minimum 40
recommended key size to
use with RC4 is _____ bits.
A. 40
B. 20
C. 64
https://quizlet.com/1113579654/wgu-c839v5d334-exam-fully-solved-updated-2025-2026latest-version-verified-for-accuracy-20242025latest-flash-card… 3/25
WGU C839V5/D334 Exam fully solved & updated
2025-2026(latest version verified for accuracy) |
2024\2025Latest!!
Save
Terms in this set (152)
The hash value in bits for 128
MD5 is ____.
A. 128
B. 160
C. 256
Hashing involves taking a variable; fixed
_____ length input and
producing a _____ length
output (message digest).
A. fixed; fixed
B. variable; fixed
C. fixed; variable
The hash value in bits for 160
SHA-1 is ____.
A. 128
B. 160
C. 256
https://quizlet.com/1113579654/wgu-c839v5d334-exam-fully-solved-updated-2025-2026latest-version-verified-for-accuracy-20242025latest-flash-card… 1/25
,11/26/25, 3:40 PM WGU C839V5/D334 Exam fully solved & updated 2025-2026(latest version verified for accuracy) | 2024\2025Latest!! Flashcards | …
The hash value in bits for 128
MD4 is ____.
A. 128
B. 160
C. 256
IPSec ______ mode involves Transport
"end-to-end" encryption;
i.e. data remains
encrypted from the time it
leaves a sender's device to
the time it arrives at the
receiver's device.
A. Tunnel
B. Transport
C. Trusted
IPSec ______ mode involves Tunnel
encryption from gateway
to gateway, i.e. just
through the public
network space.
A. Tunnel
B. Transport
C. Trusted
A security analyst on a Tunnel
local network using
monitoring tools is likely Remember, with tunnel mode, encryption does not
to only be able to read happen until just before it leaves the local network.
contents of traffic Traffic likely remains unencrypted between the end
encrypted using IPSec user device and the local network boundary.
______ mode.
A. Tunnel
B. Transport
C. Trusted
https://quizlet.com/1113579654/wgu-c839v5d334-exam-fully-solved-updated-2025-2026latest-version-verified-for-accuracy-20242025latest-flash-card… 2/25
, 11/26/25, 3:40 PM WGU C839V5/D334 Exam fully solved & updated 2025-2026(latest version verified for accuracy) | 2024\2025Latest!! Flashcards | …
_____ is a lightweight Chaskey
cryptography method for
signing messages (MAC).
It boasts a relatively
undemanding hardware
implementation (only
~3,333 gates required at
1MHz clock rate) making it
suitable for IoT
implementation.
Chaskey has a key size of 128
_____ bits.
A. 256
B. 128
C. 80
A weakness of one-way salt
hashing is that the same
piece of plaintext will
result in the same
ciphertext unless _____ is
applied.
A. Salt
B. Ash
C. Ether
The minimum 40
recommended key size to
use with RC4 is _____ bits.
A. 40
B. 20
C. 64
https://quizlet.com/1113579654/wgu-c839v5d334-exam-fully-solved-updated-2025-2026latest-version-verified-for-accuracy-20242025latest-flash-card… 3/25