100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU C839v5 / D334 Passed Exam 2025 | 100% Verified Questions & Expert Solutions | Guaranteed Value & Success

Beoordeling
-
Verkocht
-
Pagina's
42
Cijfer
A+
Geüpload op
03-12-2025
Geschreven in
2025/2026

This WGU C839v5 / D334 Passed Exam 2025 package includes 100% verified exam questions with expert solutions. Covers core cryptography concepts including symmetric and asymmetric encryption, hashing algorithms, public key infrastructure, digital signatures, certificates, and key management. Designed for WGU students aiming for guaranteed success, thorough understanding, and top grades in the course.

Meer zien Lees minder
Instelling
CyberSecurity Certified
Vak
CyberSecurity Certified











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
CyberSecurity Certified
Vak
CyberSecurity Certified

Documentinformatie

Geüpload op
3 december 2025
Aantal pagina's
42
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

Page | 1

WGU C839V5/D334 PASSED Exam 2025 WITH
100% VERIFIED QUESTIONS AND EXPERT
SOLUTIONS| GUARANTEED VALUE AND
SUCCESS.

1. Symmetric block ciphers make use of to perform substitution as
part the encryption process.
A. p-boxes
B. s-boxes
C. IVs - correct answer - S-boxes




2. PRESENT is a light-weight symmetric block cipher with a key size of 80
or 128 bits, 32 rounds, and bit block size.
A. 32
B. 64
C. 128 - correct answer - 64




3. cryptography makes use of a key pair (one public, one private)
to perform encryption and decryption. If a given key in a key pair is used
for encryption, only the opposite key in that key pair can perform the
reverse decryption.
A. Symmetric
B. Asymmetric
C. Hash - correct answer - Asymmetric




4. When encrypting data using symmetric cryptography, which key may
need to be exchanged to facilitate decryption?

, Page | 2

A. Secret key
B. Private key
C. Public key - correct answer - Secret key




5. RC5 is a conventional symmetric block cipher that is suitable for light-
weight implementations. It has a variable key size with a max of
bits.
A. 128
B. 256
C. 2048 - correct answer - 2048




6. What is the block and key size in bits used by the light-weight symmetric
block cipher CLEFIA?
A. 64 bit blocks; 64 bit keys
B. 64 or 80 bit blocks; 128 bit keys
C. 128 bit blocks; 128, 192, or 256 bit keys - correct answer - 128 bit
blocks; 128, 192, or 256 bit keys




7. If Shawn employs public key cryptography to send Sue a digitally signed
message, which key will Sue use to decrypt the message?
A. Sue's private key
B. Shawn's private key
C. Sue's public key - correct answer - Sue's private key




8. is a public key encryption method that is an extension of El
Gamal but adds a one-way hashing method which protects against an
adaptive chosen ciphertext attack.

, Page | 3

A. Cramer-Shoup
B. Ephemeral
C. Key Clustering - correct answer - Cramer-Shoup




9. With encryption, we can perform mathematical operations on
ciphered values i.e., before decryption.
A. Polyalphabetic
B. Homomorphic
C. Quantum - correct answer - Homomorphic




10. allows for a new unique passcode to be created for each
instance, based on an initial seed and for a given time period.
A. One Time Passwords (OTP)
B. Hashed One Time Passwords (HOTP)
C. Timed One Time Password (TOTP) - correct answer - TOTP




11. Which encoding scheme for x.509 certificates supports Base64 and
ASCII formats?
A. DER
B. PEM
C. MAC - correct answer - PEM




12. If Shawn plans to employ asymmetric cryptography to send Sue a
digitally signed message, which key will Shawn use to sign the
message?
A. Sue's private key
B. Shawn's private key

, Page | 4

C. Sue's public key - correct answer - Shawn's private key




13. If Shawn employs public key cryptography to send Sue a digitally
signed message, which key will Sue use to verify the message?
A. Sue's private key
B. Shawn's public key
C. Sue's public key - correct answer - Shawn's public key


14. The hash value in bits for MD5 is .
A. 128
B. 160
C. 256 - correct answer - 128




15. Hashing involves taking a length input and producing a
length output (message digest).
A. fixed; fixed
B. variable; fixed
C. fixed; variable - correct answer - variable; fixed




16. The hash value in bits for SHA-1 is .
A. 128
B. 160
C. 256 - correct answer - 160




17. The hash value in bits for MD4 is .
A. 128
€9,16
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten

Maak kennis met de verkoper
Seller avatar
StudyHQElite
5,0
(1)

Maak kennis met de verkoper

Seller avatar
StudyHQElite Johns Hopkins University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
2
Lid sinds
1 maand
Aantal volgers
0
Documenten
176
Laatst verkocht
1 week geleden
Study HQ Ellite Vault

Welcome to Study HQ Ellite , your space for clear, organized, and easy-to-understand study materials. Every guide is crafted to help you learn faster, master key concepts, and feel confident for quizzes, assignments, and exams. My notes are original, structured, and designed to save you time while improving your understanding of even the toughest topics. If my study materials help you succeed, please consider leaving a review , it helps other students know they can rely on these resources. Thank you for supporting Study HQ Ellite!

Lees meer Lees minder
5,0

1 beoordelingen

5
1
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen