Ace prep Exams
On this page, you find all documents, package deals, and flashcards offered by seller rickyenzo329.
- 521
- 0
- 8
Community
- Followers
- Following
528 items
AP World History - Unit 9 Latest 2022 Graded A
Identify how new modes of communication and transportation increased global connectivity - 
20th century innovations in transportation and mass transit made possible the surging movement 
of goods and people (cars buses, trucks, containerized, shipping and supertankers, airplanes and 
air friet 
-Greatest social and cultural impact in transportation in 20th century was the automobile 
-by 1920's ford's model T production made the US the first country to market cars to the masses 
Communication...
- Package deal
- Exam (elaborations)
- • 9 pages •
Identify how new modes of communication and transportation increased global connectivity - 
20th century innovations in transportation and mass transit made possible the surging movement 
of goods and people (cars buses, trucks, containerized, shipping and supertankers, airplanes and 
air friet 
-Greatest social and cultural impact in transportation in 20th century was the automobile 
-by 1920's ford's model T production made the US the first country to market cars to the masses 
Communication...
AP WORLD CHAPTER 17 REVIEW ALREADY PASSED
What factors led to the industrial revolution? Ag innovations, selective breeding, population 
increase between 1400 and 1800 in Europe because competative nature, many people had capital, 
iron, and coal, energy crisis. 
What new sources of energy began to be used? Fossil fuels, coal, oil, and natural gas 
The earliest innovations in the industrial revolution were in what industry? The textile 
Industry 
What was the greatest technological breakthrough of the industrial revolution? The coal-fir...
- Package deal
- Exam (elaborations)
- • 4 pages •
What factors led to the industrial revolution? Ag innovations, selective breeding, population 
increase between 1400 and 1800 in Europe because competative nature, many people had capital, 
iron, and coal, energy crisis. 
What new sources of energy began to be used? Fossil fuels, coal, oil, and natural gas 
The earliest innovations in the industrial revolution were in what industry? The textile 
Industry 
What was the greatest technological breakthrough of the industrial revolution? The coal-fir...
AP World Chapter 14 Latest 2022 Already Passed
Compare how the rulers of Muslim and Chinese empires used the new wealth circulating in global 
trade. Chinese and Muslim rulers glorified their regimes through magnificent architecture and 
art 
In what way did the Islamic world in the period between 1500 and 1780 change from its earlier 
pattern of cultural development? The Islamic world developed three distinctive cultural 
traditions centered on the Mughal, Ottoman, and Safavid empires. 
Which group closed off the studies to European science...
- Package deal
- Exam (elaborations)
- • 3 pages •
Compare how the rulers of Muslim and Chinese empires used the new wealth circulating in global 
trade. Chinese and Muslim rulers glorified their regimes through magnificent architecture and 
art 
In what way did the Islamic world in the period between 1500 and 1780 change from its earlier 
pattern of cultural development? The Islamic world developed three distinctive cultural 
traditions centered on the Mughal, Ottoman, and Safavid empires. 
Which group closed off the studies to European science...
WGU C839- test Questions and Answers Already Passed
What is the block and key size for Blowfish - 64 bit block 
- 32-448 bit key 
What term from the list below best describes a data concealment for covert communication that 
makes use of LSB replacement? Steganography 
What term from the list below best describes a data concealment for covert communication that 
makes use of LSB replacement? Steganography 
Which block cipher below uses a block size of 128 bits and key sizes up to 256 bits? TwoFish 
Symmetric encryption is expressed mathematically...
- Exam (elaborations)
- • 10 pages •
What is the block and key size for Blowfish - 64 bit block 
- 32-448 bit key 
What term from the list below best describes a data concealment for covert communication that 
makes use of LSB replacement? Steganography 
What term from the list below best describes a data concealment for covert communication that 
makes use of LSB replacement? Steganography 
Which block cipher below uses a block size of 128 bits and key sizes up to 256 bits? TwoFish 
Symmetric encryption is expressed mathematically...
WGU C839-Practice test Questions and Answers Already Passed
What term from the list below best describes a data concealment for covert communication that 
makes use of LSB replacement? 
-Crypanalysis 
-Stegnalysis 
-Steganography 
-Whitening Steganography 
Which block cipher below uses a block size of 128 bits and key sizes up to 256 bits? 
-DES 
-Blowfish 
-TwoFish 
-Tiger TwoFish 
Symmetric encryptionm is expressed mathematically as : 
- C=E(k,p) 
- P= E(k,c) 
- Me % n 
- y^2 = x^3 + Ax +B C = E (k,p) 
Name all the Hashing algorithms - Tiger 
- SHA256 ...
- Exam (elaborations)
- • 20 pages •
What term from the list below best describes a data concealment for covert communication that 
makes use of LSB replacement? 
-Crypanalysis 
-Stegnalysis 
-Steganography 
-Whitening Steganography 
Which block cipher below uses a block size of 128 bits and key sizes up to 256 bits? 
-DES 
-Blowfish 
-TwoFish 
-Tiger TwoFish 
Symmetric encryptionm is expressed mathematically as : 
- C=E(k,p) 
- P= E(k,c) 
- Me % n 
- y^2 = x^3 + Ax +B C = E (k,p) 
Name all the Hashing algorithms - Tiger 
- SHA256 ...
WGU C839 Questions and Answers 100% Pass
Symmetric Which encryption standard uses the same key to encrypt and decrypt messages? 
Skipjack Which algorithm is designated as a Type 2 product by the National Security Agency 
(NSA)? 
X.509 v3 What is the most commonly used format for certificates? 
Certificate revocation list (CRL) What is referenced to determine if a certificate has been 
revoked? 
Sender's public key What needs to be installed on end users' computers to allow them to trust 
applications that have been digitally signed b...
- Exam (elaborations)
- • 13 pages •
Symmetric Which encryption standard uses the same key to encrypt and decrypt messages? 
Skipjack Which algorithm is designated as a Type 2 product by the National Security Agency 
(NSA)? 
X.509 v3 What is the most commonly used format for certificates? 
Certificate revocation list (CRL) What is referenced to determine if a certificate has been 
revoked? 
Sender's public key What needs to be installed on end users' computers to allow them to trust 
applications that have been digitally signed b...
WGU C839 Introduction to Cryptography - (EC-Council CES) Latest 2022
CrypTool Software which allows encryption of text using historic algorithms 
The Enigma Machine In World War II the Germans made use of an electro-mechanical rotor 
based cipher Known as The Enigma Machine. 
Allied cipher machines used in WWII included the British TypeX and the American SIGABA. 
The ADFGVX Cipher invented by Colonel Fritz Nebel in 1918. 
The key for this algorithm is a six-by-six square of letters, used to encode a 36-letter alphabet. 
The Playfair Cipher invented in 1854 by Cha...
- Exam (elaborations)
- • 27 pages •
CrypTool Software which allows encryption of text using historic algorithms 
The Enigma Machine In World War II the Germans made use of an electro-mechanical rotor 
based cipher Known as The Enigma Machine. 
Allied cipher machines used in WWII included the British TypeX and the American SIGABA. 
The ADFGVX Cipher invented by Colonel Fritz Nebel in 1918. 
The key for this algorithm is a six-by-six square of letters, used to encode a 36-letter alphabet. 
The Playfair Cipher invented in 1854 by Cha...
WGU C839 Flash Cards for OA Already Graded A
DES 64 Bit Block - 56 Bit Key - 16 Rounds 
AES 128 Bit Block - 128, 192, 256 Bit Key - 10, 12, 14 Rounds 
BlowFish 64 Bit Block - 32 thru 448 Bit Key - 16 Rounds 
TwoFish 128 Bit Block - 1 thru 256 Bit Key - 16 Rounds 
Serpent 128 Bit Block 128, 192, 256 Bit Key - 32 Rounds 
SkipJack 64 Bit Block - 80 Bit Key - 32 Rounds 
IDEA 64 Bit Block - 128 Bit Key - 8.5 Rounds 
Symmetric Block Ciphers DES - AES - BlowFish - TwoFish - Serpent - SkipJack - IDEA 
Symmetric Block Ciphers with 64 Bit Block Size...
- Exam (elaborations)
- • 7 pages •
DES 64 Bit Block - 56 Bit Key - 16 Rounds 
AES 128 Bit Block - 128, 192, 256 Bit Key - 10, 12, 14 Rounds 
BlowFish 64 Bit Block - 32 thru 448 Bit Key - 16 Rounds 
TwoFish 128 Bit Block - 1 thru 256 Bit Key - 16 Rounds 
Serpent 128 Bit Block 128, 192, 256 Bit Key - 32 Rounds 
SkipJack 64 Bit Block - 80 Bit Key - 32 Rounds 
IDEA 64 Bit Block - 128 Bit Key - 8.5 Rounds 
Symmetric Block Ciphers DES - AES - BlowFish - TwoFish - Serpent - SkipJack - IDEA 
Symmetric Block Ciphers with 64 Bit Block Size...
WGU - C839 Things to Memorize AES is ___
a. Asymmetric 
b. Symmetric B 
Serpent is ___ 
a. Asymmetric 
b. Symmetric B 
Two Fish is ___ 
a. Asymmetric 
b. Symmetric B 
RC5 & RC6 is ___ 
a. Asymmetric 
b. Symmetric B 
IDEA is ___ 
a. Asymmetric 
b. Symmetric B 
TEA is ___ 
a. Asymmetric 
b. Symmetric B 
Shark is ___ 
a. Asymmetric 
b. Symmetric BCAST is ___ 
a. Asymmetric 
b. Symmetric B 
Blowfish is ___ 
a. Asymmetric 
b. Symmetric B 
DES is ___ 
a. Asymmetric 
b. Symmetric B 
3DES is ___ 
a. Asymmetric 
b. Symmetric B 
Skipjack is ___ ...
- Exam (elaborations)
- • 38 pages •
a. Asymmetric 
b. Symmetric B 
Serpent is ___ 
a. Asymmetric 
b. Symmetric B 
Two Fish is ___ 
a. Asymmetric 
b. Symmetric B 
RC5 & RC6 is ___ 
a. Asymmetric 
b. Symmetric B 
IDEA is ___ 
a. Asymmetric 
b. Symmetric B 
TEA is ___ 
a. Asymmetric 
b. Symmetric B 
Shark is ___ 
a. Asymmetric 
b. Symmetric BCAST is ___ 
a. Asymmetric 
b. Symmetric B 
Blowfish is ___ 
a. Asymmetric 
b. Symmetric B 
DES is ___ 
a. Asymmetric 
b. Symmetric B 
3DES is ___ 
a. Asymmetric 
b. Symmetric B 
Skipjack is ___ ...
Intro to Cryptography WGU C839 Module 4 Already Passed
These are usually the encryption of a message digest with the senders private key. 
In order to verify them, the recipient uses the senders public key. 
They are considered good if they provide the following. 
Authentication 
Integrity 
Non-repudiation Digital Signature 
It is a digital document that contains a public key and some information to allow your system to 
verify where they key came from. 
This is the most common way to distribute pubic keys in asymmetric cryptography. Digital 
Certif...
- Exam (elaborations)
- • 11 pages •
These are usually the encryption of a message digest with the senders private key. 
In order to verify them, the recipient uses the senders public key. 
They are considered good if they provide the following. 
Authentication 
Integrity 
Non-repudiation Digital Signature 
It is a digital document that contains a public key and some information to allow your system to 
verify where they key came from. 
This is the most common way to distribute pubic keys in asymmetric cryptography. Digital 
Certif...