100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

WGU C839 INTRO TO CRYPTOGRAPHY PRE-ASSESSMENT EXAM QUESTIONS AND ANSWERS (VERIFIED ANSWERS) LATEST UPDATE 2026/2027 | GUARANTEED A+.

Puntuación
-
Vendido
-
Páginas
58
Grado
A+
Subido en
12-12-2025
Escrito en
2025/2026

WGU C839 INTRO TO CRYPTOGRAPHY PRE-ASSESSMENT EXAM QUESTIONS AND ANSWERS (VERIFIED ANSWERS) LATEST UPDATE 2026/2027 | GUARANTEED A+. What type of encryption uses different keys to encrypt and decrypt the message? A Symmetric B Private key C Secure D Asymmetric - CORRECT ANSWER D The most widely used asymmetric encryption algorithm is what? A RSA B Vigenere C DES D Caesar Cipher - CORRECT ANSWER A Original, unencrypted information is referred to as ____. A text B plaintext C cleantext D ciphertext - CORRECT ANSWER B Which of the following is NOT an asymmetric system? A PGP B RSA C SSL D DES - CORRECT ANSWER D The greatest weakness with symmetric algorithms is _____. A They are less secure than asymmetric B The problem of key exchange C They are slower than asymmetric D The problem of generating keys - CORRECT ANSWER B Which of the following is generally true about block sizes? A Smaller block sizes increase security B Block sizes must be more than 256 bits to be secure C Block size is irrelevant to security D Larger block sizes increase security - CORRECT ANSWER D A _____ is a function that takes a variable-size input m and returns a fixed-size string. A Symmetric cipher B Hash C Asymmetric cipher D Feistel - CORRECT ANSWER B Which of the following is a cryptographic protocol that allows two parties to establish a shared key over an insecure channel? A Elliptic Curve B RSA C MD5 D Diffie-Hellman - CORRECT ANSWER D A _________ is a digital representation of information that identifies you as a relevant entity by a trusted third party? A Digital Signature B Hash C Ownership stamp D Digest - CORRECT ANSWER A What is the standard used by most digital certificates? A X.509 B CRL C RFC 2298 D OCSP - CORRECT ANSWER A In order for User A to send User B an encrypted message that only User B can read, User A must encrypt message with which of the following keys? A User A's public key B User A's private key C User B's public key D User B's private key - CORRECT ANSWER C DES uses keys of what size? A 56 bits B 192 bits C 128 bits D 64 bits - CORRECT ANSWER A Which of the following is NOT a key size used by AES? A 512 bits B 128 bits C 192 bits D 256 bits - CORRECT ANSWER A Which of the following was a multi alphabet cipher widely used from the 16th century (1553) to the early 20th century (1900s)? A Vigenere B Caesar C Atbash D Scytale - CORRECT ANSWER A Which of the following is a substitution cipher used by ancient Hebrew scholars? A Caesar B Vigenere C Scytale D Atbash - CORRECT ANSWER D Shifting each letter in the alphabet a fixed number of spaces to the right or left is an example of what? A Bit shifting B Confusion

Mostrar más Leer menos
Institución
Grado











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Grado

Información del documento

Subido en
12 de diciembre de 2025
Número de páginas
58
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

WGU C839 INTRO TO CRYPTOGRAPHY PRE-ASSESSMENT
EXAM QUESTIONS AND ANSWERS (VERIFIED ANSWERS)
LATEST UPDATE 2026/2027 | GUARANTEED A+.



What type of encryption uses different keys to encrypt and decrypt the message?


A Symmetric
B Private key
C Secure
D Asymmetric - CORRECT ANSWER D


The most widely used asymmetric encryption algorithm is what?


A RSA
B Vigenere
C DES
D Caesar Cipher - CORRECT ANSWER A


Original, unencrypted information is referred to as ____.


A text
B plaintext
C cleantext

,D ciphertext - CORRECT ANSWER B


Which of the following is NOT an asymmetric system?


A PGP
B RSA
C SSL
D DES - CORRECT ANSWER D




The greatest weakness with symmetric algorithms is _____.


A They are less secure than asymmetric
B The problem of key exchange
C They are slower than asymmetric
D The problem of generating keys - CORRECT ANSWER B


Which of the following is generally true about block sizes?


A Smaller block sizes increase security
B Block sizes must be more than 256 bits to be secure
C Block size is irrelevant to security
D Larger block sizes increase security - CORRECT ANSWER D

,A _____ is a function that takes a variable-size input m and returns a fixed-size
string.


A Symmetric cipher
B Hash

C Asymmetric cipher
D Feistel - CORRECT ANSWER B


Which of the following is a cryptographic protocol that allows two parties to
establish a shared key over an insecure channel?


A Elliptic Curve
B RSA
C MD5
D Diffie-Hellman - CORRECT ANSWER D


A _________ is a digital representation of information that identifies you as a
relevant entity by a trusted third party?


A Digital Signature
B Hash
C Ownership stamp
D Digest - CORRECT ANSWER A


What is the standard used by most digital certificates?

, A X.509
B CRL
C RFC 2298

D OCSP - CORRECT ANSWER A




In order for User A to send User B an encrypted message that only User B can
read, User A must encrypt message with which of the following keys?


A User A's public key
B User A's private key
C User B's public key
D User B's private key - CORRECT ANSWER C


DES uses keys of what size?


A 56 bits
B 192 bits
C 128 bits

D 64 bits - CORRECT ANSWER A


Which of the following is NOT a key size used by AES?
$17.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
ExcelAcademia2026 Chamberlain College Of Nursing
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
2061
Miembro desde
4 año
Número de seguidores
1648
Documentos
7474
Última venta
1 día hace
EXCEL ACADEMIA TUTORS

At Excel Academia Tutoring, You will get solutions to all subjects in both assignments and major exams. Contact me for assistance. Good luck! Well-researched education materials for you. Expert in Nursing, Mathematics, Psychology, Biology etc. My Work has the Latest & Updated Exam Solutions, Study Guides and Notes (100% Verified Solutions that Guarantee Success)

3.7

337 reseñas

5
139
4
74
3
62
2
19
1
43

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes