WGU C839V5/D334 PASSED Exam 2025 WITH
100% VERIFIED QUESTIONS AND EXPERT
SOLUTIONS| GUARANTEED VALUE AND
SUCCESS.
1. Symmetric block ciphers make use of to perform substitution as
part the encryption process.
A. p-boxes
B. s-boxes
C. IVs - correct answer - S-boxes
2. PRESENT is a light-weight symmetric block cipher with a key size of 80
or 128 bits, 32 rounds, and bit block size.
A. 32
B. 64
C. 128 - correct answer - 64
3. cryptography makes use of a key pair (one public, one private)
to perform encryption and decryption. If a given key in a key pair is used
for encryption, only the opposite key in that key pair can perform the
reverse decryption.
A. Symmetric
B. Asymmetric
C. Hash - correct answer - Asymmetric
4. When encrypting data using symmetric cryptography, which key may
need to be exchanged to facilitate decryption?
, Page | 2
A. Secret key
B. Private key
C. Public key - correct answer - Secret key
5. RC5 is a conventional symmetric block cipher that is suitable for light-
weight implementations. It has a variable key size with a max of
bits.
A. 128
B. 256
C. 2048 - correct answer - 2048
6. What is the block and key size in bits used by the light-weight symmetric
block cipher CLEFIA?
A. 64 bit blocks; 64 bit keys
B. 64 or 80 bit blocks; 128 bit keys
C. 128 bit blocks; 128, 192, or 256 bit keys - correct answer - 128 bit
blocks; 128, 192, or 256 bit keys
7. If Shawn employs public key cryptography to send Sue a digitally signed
message, which key will Sue use to decrypt the message?
A. Sue's private key
B. Shawn's private key
C. Sue's public key - correct answer - Sue's private key
8. is a public key encryption method that is an extension of El
Gamal but adds a one-way hashing method which protects against an
adaptive chosen ciphertext attack.
, Page | 3
A. Cramer-Shoup
B. Ephemeral
C. Key Clustering - correct answer - Cramer-Shoup
9. With encryption, we can perform mathematical operations on
ciphered values i.e., before decryption.
A. Polyalphabetic
B. Homomorphic
C. Quantum - correct answer - Homomorphic
10. allows for a new unique passcode to be created for each
instance, based on an initial seed and for a given time period.
A. One Time Passwords (OTP)
B. Hashed One Time Passwords (HOTP)
C. Timed One Time Password (TOTP) - correct answer - TOTP
11. Which encoding scheme for x.509 certificates supports Base64 and
ASCII formats?
A. DER
B. PEM
C. MAC - correct answer - PEM
12. If Shawn plans to employ asymmetric cryptography to send Sue a
digitally signed message, which key will Shawn use to sign the
message?
A. Sue's private key
B. Shawn's private key
, Page | 4
C. Sue's public key - correct answer - Shawn's private key
13. If Shawn employs public key cryptography to send Sue a digitally
signed message, which key will Sue use to verify the message?
A. Sue's private key
B. Shawn's public key
C. Sue's public key - correct answer - Shawn's public key
14. The hash value in bits for MD5 is .
A. 128
B. 160
C. 256 - correct answer - 128
15. Hashing involves taking a length input and producing a
length output (message digest).
A. fixed; fixed
B. variable; fixed
C. fixed; variable - correct answer - variable; fixed
16. The hash value in bits for SHA-1 is .
A. 128
B. 160
C. 256 - correct answer - 160
17. The hash value in bits for MD4 is .
A. 128