Brainiacs
Get upto date Exams,testbanks,course guides and predictors with 100% rated questions and answers
Search for desired course (Store includes variety of courses)
Get (all years included) ellaborated exams,testbanks,guides,predictors etc.
Store appreciates customers using big offers e.g FREE EXAMS,offering half price,lowered prices (Get lucky and find your document for free/half price)
Get 2019,2020,2021,2022 documents for reference(straight pass)Reasonable prices offered for old reference exams
- 1230
- 0
- 41
Community
- Followers
- Following
1267 items
AP World History Unit 12 Vocabulary Already Passed
AP World History Unit 12 Vocabulary 
Already Passed 
Silk Roads *trade route that connected the Han and Roman Empire in classical times 
*exchange of goods, ideas, and disease 
*Asia and India traded silk and spices west to consumers 
Fall of Roman Empire *problems: internal opposition, power struggle, generals struggled for 
power and died violently; empire was simply too large. 
*Empire divided into two districts 
*Germans from the north attacked the western half 
*Hun invasions pressured othe...
- Package deal
- Exam (elaborations)
- • 2 pages •
AP World History Unit 12 Vocabulary 
Already Passed 
Silk Roads *trade route that connected the Han and Roman Empire in classical times 
*exchange of goods, ideas, and disease 
*Asia and India traded silk and spices west to consumers 
Fall of Roman Empire *problems: internal opposition, power struggle, generals struggled for 
power and died violently; empire was simply too large. 
*Empire divided into two districts 
*Germans from the north attacked the western half 
*Hun invasions pressured othe...
AP World History - Chapter 18 <Vocabulary> Already Passed
AP World History - Chapter 18 
<Vocabulary> Already Passed 
bourgeoisie (pron. boor-zwah-ZEE) Term that Karl Marx used to describe the owners of 
industrial capital; originally meant "townspeople." 
British Royal Society Association of scientists established in England in 1660 that was 
dedicated to the promotion of "useful knowledge." 
Caste War of Yucatán Long revolutionary struggle () of the Maya people of Mexico 
against European and mestizo intruders. 
Caudillo (pron. kow-DEE-yoh...
- Package deal
- Exam (elaborations)
- • 4 pages •
AP World History - Chapter 18 
<Vocabulary> Already Passed 
bourgeoisie (pron. boor-zwah-ZEE) Term that Karl Marx used to describe the owners of 
industrial capital; originally meant "townspeople." 
British Royal Society Association of scientists established in England in 1660 that was 
dedicated to the promotion of "useful knowledge." 
Caste War of Yucatán Long revolutionary struggle () of the Maya people of Mexico 
against European and mestizo intruders. 
Caudillo (pron. kow-DEE-yoh...
Intro to Cryptography WGU C839 Module 1 Already Passed
Intro to Cryptography WGU C839 Module 
1 Already Passed 
Most primitive of cryptographic algorithms, substitutes one character of cipher text for each 
character of plain text. Includes 
Caesar Cipher 
Atbash Cipher 
Affine Cipher 
Rot13 Cipher Mono-Alphabet Substitution 
First used by Julius Caesar 
Every letter is shifted a fixed number of spaces to the left or right the alphabet. Caesar Cipher 
Hebrew Code 
substitutes the first letter of the alphabet for the last, and the second letter for t...
- Package deal
- Exam (elaborations)
- • 4 pages •
Intro to Cryptography WGU C839 Module 
1 Already Passed 
Most primitive of cryptographic algorithms, substitutes one character of cipher text for each 
character of plain text. Includes 
Caesar Cipher 
Atbash Cipher 
Affine Cipher 
Rot13 Cipher Mono-Alphabet Substitution 
First used by Julius Caesar 
Every letter is shifted a fixed number of spaces to the left or right the alphabet. Caesar Cipher 
Hebrew Code 
substitutes the first letter of the alphabet for the last, and the second letter for t...
Intro to Cryptography WGU C839 Module 3 Questions and Answers 100% Pass
Intro to Cryptography WGU C839 Module 
3 Questions and Answers 100% Pass 
Consists of public and private keys 
The public key is made public by publishing to a directory or installed on a computer. 
The private key is kept secret 
Does not involve exchanging a secret key or key exchange 
The public key is used to encrypt messages only the recipients private key can decrypt 
Asymmetric Cryptography 
Slower then Symmetric algorithms 
provides a secure way to communicate 
provides a method of valid...
- Package deal
- Exam (elaborations)
- • 6 pages •
Intro to Cryptography WGU C839 Module 
3 Questions and Answers 100% Pass 
Consists of public and private keys 
The public key is made public by publishing to a directory or installed on a computer. 
The private key is kept secret 
Does not involve exchanging a secret key or key exchange 
The public key is used to encrypt messages only the recipients private key can decrypt 
Asymmetric Cryptography 
Slower then Symmetric algorithms 
provides a secure way to communicate 
provides a method of valid...
Intro to Cryptography WGU C839 Module 4 Already Passed
Intro to Cryptography WGU C839 Module 
4 Already Passed 
These are usually the encryption of a message digest with the senders private key. 
In order to verify them, the recipient uses the senders public key. 
They are considered good if they provide the following. 
Authentication 
Integrity 
Non-repudiation Digital Signature 
It is a digital document that contains a public key and some information to allow your system to 
verify where they key came from. 
This is the most common way to distribu...
- Package deal
- Exam (elaborations)
- • 11 pages •
Intro to Cryptography WGU C839 Module 
4 Already Passed 
These are usually the encryption of a message digest with the senders private key. 
In order to verify them, the recipient uses the senders public key. 
They are considered good if they provide the following. 
Authentication 
Integrity 
Non-repudiation Digital Signature 
It is a digital document that contains a public key and some information to allow your system to 
verify where they key came from. 
This is the most common way to distribu...
WGU - C839 Things to Memorize AES is ___
WGU - C839 Things to Memorize 
AES is ___ 
a. Asymmetric 
b. Symmetric B 
Serpent is ___ 
a. Asymmetric 
b. Symmetric B 
Two Fish is ___ 
a. Asymmetric 
b. Symmetric B 
RC5 & RC6 is ___ 
a. Asymmetric 
b. Symmetric B 
IDEA is ___ 
a. Asymmetric 
b. Symmetric B 
TEA is ___ 
a. Asymmetric 
b. Symmetric B 
Shark is ___ 
a. Asymmetric 
b. Symmetric BCAST is ___ 
a. Asymmetric 
b. Symmetric B 
Blowfish is ___ 
a. Asymmetric 
b. Symmetric B 
DES is ___ 
a. Asymmetric 
b. Symmetric B 
3DES is ___ 
a. A...
- Package deal
- Exam (elaborations)
- • 38 pages •
WGU - C839 Things to Memorize 
AES is ___ 
a. Asymmetric 
b. Symmetric B 
Serpent is ___ 
a. Asymmetric 
b. Symmetric B 
Two Fish is ___ 
a. Asymmetric 
b. Symmetric B 
RC5 & RC6 is ___ 
a. Asymmetric 
b. Symmetric B 
IDEA is ___ 
a. Asymmetric 
b. Symmetric B 
TEA is ___ 
a. Asymmetric 
b. Symmetric B 
Shark is ___ 
a. Asymmetric 
b. Symmetric BCAST is ___ 
a. Asymmetric 
b. Symmetric B 
Blowfish is ___ 
a. Asymmetric 
b. Symmetric B 
DES is ___ 
a. Asymmetric 
b. Symmetric B 
3DES is ___ 
a. A...
WGU C839 Flash Cards for OA Already Graded A
WGU C839 Flash Cards for OA Already 
Graded A 
DES 64 Bit Block - 56 Bit Key - 16 Rounds 
AES 128 Bit Block - 128, 192, 256 Bit Key - 10, 12, 14 Rounds 
BlowFish 64 Bit Block - 32 thru 448 Bit Key - 16 Rounds 
TwoFish 128 Bit Block - 1 thru 256 Bit Key - 16 Rounds 
Serpent 128 Bit Block 128, 192, 256 Bit Key - 32 Rounds 
SkipJack 64 Bit Block - 80 Bit Key - 32 Rounds 
IDEA 64 Bit Block - 128 Bit Key - 8.5 Rounds 
Symmetric Block Ciphers DES - AES - BlowFish - TwoFish - Serpent - SkipJack - IDEA ...
- Package deal
- Exam (elaborations)
- • 7 pages •
WGU C839 Flash Cards for OA Already 
Graded A 
DES 64 Bit Block - 56 Bit Key - 16 Rounds 
AES 128 Bit Block - 128, 192, 256 Bit Key - 10, 12, 14 Rounds 
BlowFish 64 Bit Block - 32 thru 448 Bit Key - 16 Rounds 
TwoFish 128 Bit Block - 1 thru 256 Bit Key - 16 Rounds 
Serpent 128 Bit Block 128, 192, 256 Bit Key - 32 Rounds 
SkipJack 64 Bit Block - 80 Bit Key - 32 Rounds 
IDEA 64 Bit Block - 128 Bit Key - 8.5 Rounds 
Symmetric Block Ciphers DES - AES - BlowFish - TwoFish - Serpent - SkipJack - IDEA ...
WGU C839 Introduction to Cryptography - (EC-Council CES) Latest 2022-2023
WGU C839 Introduction to Cryptography 
- (EC-Council CES) Latest 
CrypTool Software which allows encryption of text using historic algorithms 
The Enigma Machine In World War II the Germans made use of an electro-mechanical rotor 
based cipher Known as The Enigma Machine. 
Allied cipher machines used in WWII included the British TypeX and the American SIGABA. 
The ADFGVX Cipher invented by Colonel Fritz Nebel in 1918. 
The key for this algorithm is a six-by-six square of letters, used to encode...
- Package deal
- Exam (elaborations)
- • 27 pages •
WGU C839 Introduction to Cryptography 
- (EC-Council CES) Latest 
CrypTool Software which allows encryption of text using historic algorithms 
The Enigma Machine In World War II the Germans made use of an electro-mechanical rotor 
based cipher Known as The Enigma Machine. 
Allied cipher machines used in WWII included the British TypeX and the American SIGABA. 
The ADFGVX Cipher invented by Colonel Fritz Nebel in 1918. 
The key for this algorithm is a six-by-six square of letters, used to encode...
WGU C839 Questions and Answers 100% Pass
WGU C839 Questions and Answers 
100% Pass 
Symmetric Which encryption standard uses the same key to encrypt and decrypt messages? 
Skipjack Which algorithm is designated as a Type 2 product by the National Security Agency 
(NSA)? 
X.509 v3 What is the most commonly used format for certificates? 
Certificate revocation list (CRL) What is referenced to determine if a certificate has been 
revoked? 
Sender's public key What needs to be installed on end users' computers to allow them to trust 
app...
- Package deal
- Exam (elaborations)
- • 13 pages •
WGU C839 Questions and Answers 
100% Pass 
Symmetric Which encryption standard uses the same key to encrypt and decrypt messages? 
Skipjack Which algorithm is designated as a Type 2 product by the National Security Agency 
(NSA)? 
X.509 v3 What is the most commonly used format for certificates? 
Certificate revocation list (CRL) What is referenced to determine if a certificate has been 
revoked? 
Sender's public key What needs to be installed on end users' computers to allow them to trust 
app...
WGU C839-Practice test Questions and Answers Already Passed
WGU C839-Practice test Questions and 
Answers Already Passed 
What term from the list below best describes a data concealment for covert communication that 
makes use of LSB replacement? 
-Crypanalysis 
-Stegnalysis 
-Steganography 
-Whitening Steganography 
Which block cipher below uses a block size of 128 bits and key sizes up to 256 bits? 
-DES 
-Blowfish 
-TwoFish 
-Tiger TwoFish 
Symmetric encryptionm is expressed mathematically as : 
- C=E(k,p) 
- P= E(k,c) 
- Me % n 
- y^2 = x^3 + Ax +B C...
- Package deal
- Exam (elaborations)
- • 20 pages •
WGU C839-Practice test Questions and 
Answers Already Passed 
What term from the list below best describes a data concealment for covert communication that 
makes use of LSB replacement? 
-Crypanalysis 
-Stegnalysis 
-Steganography 
-Whitening Steganography 
Which block cipher below uses a block size of 128 bits and key sizes up to 256 bits? 
-DES 
-Blowfish 
-TwoFish 
-Tiger TwoFish 
Symmetric encryptionm is expressed mathematically as : 
- C=E(k,p) 
- P= E(k,c) 
- Me % n 
- y^2 = x^3 + Ax +B C...