Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D334 CRYPTOGRAPHY – FULL STUDY GUIDE & CONCEPT BREAKDOWN (2025 EDITION)

Rating
-
Sold
-
Pages
47
Grade
A+
Uploaded on
28-11-2025
Written in
2025/2026

WGU D334 CRYPTOGRAPHY – FULL STUDY GUIDE & CONCEPT BREAKDOWN (2025 EDITION)

Institution
WGU D334 CRYPTOGRAPHY
Course
WGU D334 CRYPTOGRAPHY

Content preview

WGU D334 CRYPTOGRAPHY – FULL STUDY
GUIDE & CONCEPT BREAKDOWN (2025
EDITION)

WGU D334 Cryptography: Practice Exam

1. The primary goal of cryptography is to ensure:
A. High-speed data transmission
B. Data integrity and confidentiality ✓
C. Data compression
D. Network bandwidth optimization

2. Which cryptographic concept ensures that a message sender cannot later deny sending a
message?
A. Confidentiality
B. Integrity
C. Authentication
D. Non-repudiation ✓

3. A substitution cipher that uses multiple alphabets is known as a:
A. Stream cipher
B. Polyalphabetic cipher ✓
C. Transposition cipher
D. Monoalphabetic cipher

4. The Caesar Cipher is a classic example of which type of cipher?
A. Transposition
B. Polyalphabetic substitution
C. Monoalphabetic substitution ✓
D. Asymmetric key

5. The Enigma machine implemented a complex form of which classical cipher?
A. Steganography
B. Scytale
C. Polyalphabetic substitution ✓
D. Hash function

,6. The process of converting plaintext into ciphertext is called:
A. Decryption
B. Cryptanalysis
C. Encryption ✓
D. Hashing

7. Which of the following is a fundamental principle of Kerckhoffs's principle?
A. A cipher should be secure even if everything about the system, except the key, is public
knowledge. ✓
B. A cipher should use a key length of at least 256 bits.
C. The encryption algorithm must be kept secret for security.
D. A cipher should only use asymmetric cryptography.

8. A cryptographic hash function must be:
A. Reversible
B. Predictable
C. Collision-resistant ✓
D. Based on a symmetric key

9. Which property is NOT a requirement for a secure cryptographic hash function?
A. Pre-image resistance
B. Fast reversibility ✓
C. Avalanche effect
D. Collision resistance

10. MD5 and SHA-1 are considered insecure for modern applications primarily because:
A. They are too slow.
B. They produce outputs that are too short.
C. Effective collision attacks have been found against them. ✓
D. They are symmetric algorithms.

11. What is the output length of a standard SHA-256 hash?
A. 128 bits
B. 160 bits
C. 256 bits ✓
D. 512 bits

12. A Message Authentication Code (MAC) is used to provide:
A. Only confidentiality
B. Only non-repudiation

,C. Confidentiality and integrity
D. Integrity and authentication ✓

13. HMAC (Hash-based MAC) combines a cryptographic hash function with what?
A. A public key
B. A secret key ✓
C. A digital certificate
D. A nonce

14. Which type of cryptography uses a single, shared key for both encryption and decryption?
A. Asymmetric Cryptography
B. Public Key Cryptography
C. Symmetric Cryptography ✓
D. Hash Functions

15. The major challenge with symmetric key cryptography is:
A. Its slow speed compared to asymmetric cryptography.
B. Its vulnerability to brute-force attacks.
C. The key distribution problem. ✓
D. Its inability to provide authentication.

16. Which of the following is a symmetric block cipher?
A. RSA
B. Diffie-Hellman
C. AES ✓
D. ECC

17. DES (Data Encryption Standard) uses a key size of:
A. 56 bits ✓
B. 128 bits
C. 192 bits
D. 256 bits

18. AES (Advanced Encryption Standard) can use all of the following key sizes EXCEPT:
A. 128 bits
B. 192 bits
C. 256 bits
D. 512 bits ✓

19. A mode of operation that turns a block cipher into a stream cipher is:
A. ECB (Electronic Codebook)

, B. CBC (Cipher Block Chaining)
C. CFB (Cipher Feedback) ✓
D. AES

20. Which block cipher mode uses an Initialization Vector (IV) and chains blocks together to
hide patterns?
A. ECB
B. CBC ✓
C. RSA
D. PKI

21. The main weakness of the ECB (Electronic Codebook) mode is that:
A. It is the slowest mode.
B. Identical plaintext blocks produce identical ciphertext blocks. ✓
C. It requires asymmetric keys.
D. It does not provide integrity.

22. Which of the following is an asymmetric (public key) cryptography algorithm?
A. AES
B. 3DES
C. Blowfish
D. RSA ✓

23. The security of the RSA algorithm is based on the computational difficulty of:
A. Finding discrete logarithms in a finite field.
B. Factoring large prime numbers. ✓
C. Solving elliptic curve discrete logarithms.
D. Reversing a one-way hash function.

24. In RSA, the public key consists of:
A. n and d
B. n and e ✓
C. p and q
D. d only

25. Diffie-Hellman key exchange allows two parties to:
A. Digitally sign a document.
B. Establish a shared secret key over an insecure channel. ✓
C. Encrypt large amounts of data efficiently.
D. Verify the integrity of a message.

Written for

Institution
WGU D334 CRYPTOGRAPHY
Course
WGU D334 CRYPTOGRAPHY

Document information

Uploaded on
November 28, 2025
Number of pages
47
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$12.59
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
BRAVOSTUVIA Teachme2-tutor
Follow You need to be logged in order to follow users or courses
Sold
56
Member since
1 year
Number of followers
3
Documents
2956
Last sold
12 hours ago
TOP GRADE

Assignments, Case Studies, Research, Essay writing service, Questions and Answers, Discussions etc. for students who want to see results twice as fast. I have done papers of various topics and complexities. I am punctual and always submit work on-deadline. I write engaging and informative content on all subjects. Send me your research papers, case studies, psychology papers, etc, and I’ll do them to the best of my abilities. Writing is my passion when it comes to academic work. I’ve got a good sense of structure and enjoy finding interesting ways to deliver information in any given paper. I love impressing clients with my work, and I am very punctual about deadlines. Send me your assignment and I’ll take it to the next level. I strive for my content to be of the highest quality. Your wishes come first— send me your requirements and I’ll make a piece of work with fresh ideas, consistent structure, and following the academic formatting rules. For every student you refer to me with an order that is completed and paid transparently, I will do one assignment for you, free of charge!!!!!!!!!!!!

Read more Read less
4.3

11 reviews

5
7
4
1
3
2
2
1
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions