• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

D334 D 334 Pre-Assessment Latest

QUESTIONS & ANSWERS Dec 16, 2025 ★★★★★ (5.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

D334 / D 334 Pre-Assessment (Latest Update 2026 / 2027) Introduction to Cryptography | Questions with Answers | Grade A | 100% Correct (Verified Answers) - WGU

Question:

_____ allows a new unique passcode to be created each instance, based on a counter value and an initial seed.

Answer:

Hashed One Time Passwords HOTP

Question:

_____ computers have fast multiplication circuits, and thus can be used to perform multiplications and search a range of prime numbers at a speed which would break most existing RSA implementations.

Answer:

Quantum

  • / 4

Question:

_____ is a light-weight symmetric block cipher with variable block sizes, key sizes, and rounds, that is optimized for hardware implementations.

Answer:

SIMON

Question:

_____ is a light-weight symmetric block cipher with variable block sizes, key sizes, and rounds, that is optimized for software implementations.

Answer:

SPECK

Question:

PRESENT is a symmetric block cipher that was one of the first to be considered as a(n) _____ replacement for light-weight implementations.

Answer:

AES

  • / 4

Question:

Rabbit operates with a key size of ______ bits and an initialization vector (IV) of _____ bits.

Answer:

128; 64

Question:

______ is a secret key encryption algorithm, designed by the NSA, and was used with the Clipper chip.

Answer:

Skipjack

Question:

The IV used with WEP is ____ bits.

Answer:

24

Question:

The IV used with WPA is _____ bits.

Answer:

48 3 / 4

Question:

Two variations of WPA are ____ and ____.

Answer:

PSK; enterprise

Question:

A5/3 is for _____ , and is based on the MISTY1 cipher.

Answer:

3GPP

Question:

A5/1 is designed to be used for the _____ network.

Answer:

GSM

Question:

Google proposed _____ as an alternative to AES to be used with TLS connections.

Answer:

ChaCha20

  • / 4

User Reviews

★★★★★ (5.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★★

The practical examples offered by this document enhanced my understanding. A impressive purchase!

Download Document

Buy This Document

$1.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: QUESTIONS & ANSWERS
Added: Dec 16, 2025
Description:

D334 / D 334 Pre-Assessment (Latest Update) Introduction to Cryptography | Questions with Answers | Grade A | 100% Correct (Verified Answers) - WGU Question: _____ allows a new unique passcode to b...

Unlock Now
$ 1.00