2027) Introduction to Cryptography Core
Exam Topics Questions and Answers 100%
Correct {Grade A} - WGU
symmetric encryption - correct answer two types, Block and stream
Symmetric Block Encryption - correct answer involves grouping data into blocks and
encrypting the individual blocks
padding is used to fill blocks to operating size.
Symmetric stream encryption - correct answer -involves encrypting one bit at a time,
i.e., a synchronous stream
-is often much faster than block and can typically be applied in real-time applications.
S-boxes - correct answer perform substitution as part the encryption process. Take a
given input and leverage look-up tables that produce a given output
Salting - correct answer the process of adding an initialization vector to the ciphering
process to change its operation and ensure that the ciphertext does not give the
original plaintext when played back
,D 334 Study Guide (Latest Update 2026 /
2027) Introduction to Cryptography Core
Exam Topics Questions and Answers 100%
Correct {Grade A} - WGU
Encryption/Decryption - correct answer changing plaintext into ciphertext / changing
it back
should be applied to information you want to protect at rest as well as in transit
Aescrypt - correct answer Encrypt individual files
Bitlocker and FileVault - correct answer encrypt full disks
Mono-alphabetic code or substitution - correct answer Single mapping from alphabet
to cipher alphabet
polyalphabetic code - correct answer Mapping of alphabet to multiple cipher
alphabets
One-time pad - correct answer Unbreakable encryption. only uses its cipher code
once
Pseudo-random number generators (PRNGs) - correct answer This method repeats
the random numbers after a given time (periodic). They are fast and are also
deterministic and are useful in producing a repeatable set of random numbers.
, D 334 Study Guide (Latest Update 2026 /
2027) Introduction to Cryptography Core
Exam Topics Questions and Answers 100%
Correct {Grade A} - WGU
True Random number generators (TRNGs) - correct answer This method generates a
true random number and uses some form of random process. One approach is to
monitor the movements of a mouse pointer on a screen or from the pauses between
keystrokes. Overall, the method is generally slow, especially if it involves human
interaction, but is non-deterministic and aperiodic.
Frequency analysis - correct answer Cipher cracking methodology that involves
identifying patterns and variations in the probability of codes.
Electronic Code Book (ECB) - correct answer Most basic, weak and unsecure mode.
Each block is processed separately. No salt or IV is used, same key is used to encrypt
each block.
Cipher block Chaining (CBC) - correct answer step up from ECB, incorporates IV.
Results of encryption from previous block is input into encryption process of the
current block