1
For Expert help and assignment solutions, +254707240657
WGU C839 INTRO TO CRYPTOGRAPHY
FINAL EXAM 2025/2026 BANK 2 VERSIONS
QUESTIONS AND ACCURATE ACTUAL EXAM
WITH FREQUENTLY TESTED QUESTIONS AND
STUDY GUIDE / EXPERT VERIFIED FOR
GUARANTEED PASS/ALREADY GRADED A+
Graded A+
© 2025 Assignment Expert
What type of encryption uses different keys to encrypt and
decrypt the message?
Guru01 - Stuvia
A Symmetric
B Private key
C Secure
D Asymmetric [ANS:] D
The most widely used asymmetric encryption algorithm is what?
A RSA
B Vigenere
C DES
, 2
For Expert help and assignment solutions, +254707240657
D Caesar Cipher [ANS:] A
Original, unencrypted information is referred to as ____.
A text
B plaintext
C cleantext
© 2025 Assignment Expert
D ciphertext [ANS:] B
Which of the following is NOT an asymmetric system?
Guru01 - Stuvia
A PGP
B RSA
C SSL
D DES [ANS:] D
In order for User A to send User B an encrypted message that only
User B can read, User A must encrypt message with which of the
following keys?
A User A's public key
B User A's private key
, 3
For Expert help and assignment solutions, +254707240657
C User B's public key
D User B's private key [ANS:] C
The greatest weakness with symmetric algorithms is _____.
A They are less secure than asymmetric
B The problem of key exchange
© 2025 Assignment Expert
C They are slower than asymmetric
D The problem of generating keys [ANS:] B
Guru01 - Stuvia
Which of the following is generally true about block sizes?
A Smaller block sizes increase security
B Block sizes must be more than 256 bits to be secure
C Block size is irrelevant to security
D Larger block sizes increase security [ANS:] D
A _____ is a function that takes a variable-size input m and returns
a fixed-size string.
A Symmetric cipher
, 4
For Expert help and assignment solutions, +254707240657
B Hash
C Asymmetric cipher
D Feistel [ANS:] B
Which of the following is a cryptographic protocol that allows two
parties to establish a shared key over an insecure channel?
© 2025 Assignment Expert
A Elliptic Curve
B RSA
Guru01 - Stuvia
C MD5
D Diffie-Hellman [ANS:] D
A _________ is a digital representation of information that identifies
you as a relevant entity by a trusted third party?
A Digital Signature
B Hash
C Ownership stamp
D Digest [ANS:] A
What is the standard used by most digital certificates?
For Expert help and assignment solutions, +254707240657
WGU C839 INTRO TO CRYPTOGRAPHY
FINAL EXAM 2025/2026 BANK 2 VERSIONS
QUESTIONS AND ACCURATE ACTUAL EXAM
WITH FREQUENTLY TESTED QUESTIONS AND
STUDY GUIDE / EXPERT VERIFIED FOR
GUARANTEED PASS/ALREADY GRADED A+
Graded A+
© 2025 Assignment Expert
What type of encryption uses different keys to encrypt and
decrypt the message?
Guru01 - Stuvia
A Symmetric
B Private key
C Secure
D Asymmetric [ANS:] D
The most widely used asymmetric encryption algorithm is what?
A RSA
B Vigenere
C DES
, 2
For Expert help and assignment solutions, +254707240657
D Caesar Cipher [ANS:] A
Original, unencrypted information is referred to as ____.
A text
B plaintext
C cleantext
© 2025 Assignment Expert
D ciphertext [ANS:] B
Which of the following is NOT an asymmetric system?
Guru01 - Stuvia
A PGP
B RSA
C SSL
D DES [ANS:] D
In order for User A to send User B an encrypted message that only
User B can read, User A must encrypt message with which of the
following keys?
A User A's public key
B User A's private key
, 3
For Expert help and assignment solutions, +254707240657
C User B's public key
D User B's private key [ANS:] C
The greatest weakness with symmetric algorithms is _____.
A They are less secure than asymmetric
B The problem of key exchange
© 2025 Assignment Expert
C They are slower than asymmetric
D The problem of generating keys [ANS:] B
Guru01 - Stuvia
Which of the following is generally true about block sizes?
A Smaller block sizes increase security
B Block sizes must be more than 256 bits to be secure
C Block size is irrelevant to security
D Larger block sizes increase security [ANS:] D
A _____ is a function that takes a variable-size input m and returns
a fixed-size string.
A Symmetric cipher
, 4
For Expert help and assignment solutions, +254707240657
B Hash
C Asymmetric cipher
D Feistel [ANS:] B
Which of the following is a cryptographic protocol that allows two
parties to establish a shared key over an insecure channel?
© 2025 Assignment Expert
A Elliptic Curve
B RSA
Guru01 - Stuvia
C MD5
D Diffie-Hellman [ANS:] D
A _________ is a digital representation of information that identifies
you as a relevant entity by a trusted third party?
A Digital Signature
B Hash
C Ownership stamp
D Digest [ANS:] A
What is the standard used by most digital certificates?