Question Bank

721 approved questions from the community

Flyweight minimizes memory by sharing?

HARD
TRUE FALSE
30s
Design Patterns
by Mohamed

Prototype deep vs shallow?

HARD
SINGLE CHOICE
40s
Design Patterns
by Mohamed

State and Strategy identical diagrams?

HARD
TRUE FALSE
30s
Design Patterns
by Mohamed

Template vs Strategy?

HARD
SINGLE CHOICE
40s
Design Patterns
by Mohamed

Mediator vs Observer primary difference?

HARD
SINGLE CHOICE
38s
Design Patterns
by Mohamed

Bridge more suitable when?

HARD
SINGLE CHOICE
38s
Design Patterns
by Mohamed

Proxy introduces performance overhead?

HARD
TRUE FALSE
30s
Design Patterns
by Mohamed

Confused patterns?

HARD
MULTIPLE CHOICE
45s
Design Patterns
by Mohamed

Open/Closed Principle patterns?

HARD
MULTIPLE CHOICE
45s
Design Patterns
by Mohamed

Plugin architecture patterns?

HARD
MULTIPLE CHOICE
45s
Design Patterns
by Mohamed

Which of the following are practical applications of PKI? (Select all that apply)

HARD
MULTIPLE CHOICE
50s
Cryptography
by Mohamed

What is the meet-in-the-middle attack on Feistel networks?

HARD
SINGLE CHOICE
45s
Cryptography
by Mohamed

The Atbash cipher is a type of substitution cipher that reverses the alphabet.

HARD
TRUE FALSE
25s
Cryptography
by Mohamed

Which of the following are stages in each round of a Feistel cipher? (Select all that apply)

HARD
MULTIPLE CHOICE
45s
Cryptography
by Mohamed

What is the primary reason Feistel ciphers are elegant and widely used?

HARD
SINGLE CHOICE
40s
Cryptography
by Mohamed

Which of the following contributed to DES being considered insecure? (Select all that apply)

HARD
MULTIPLE CHOICE
45s
Cryptography
by Mohamed

Which of the following security properties does PKI provide? (Select all that apply)

HARD
MULTIPLE CHOICE
45s
Cryptography
by Mohamed

What cryptographic operation does AES perform on the state array?

HARD
SINGLE CHOICE
40s
Cryptography
by Mohamed

ECC signature creation and verification are typically faster than RSA for smaller messages.

HARD
TRUE FALSE
30s
Cryptography
by Mohamed

In 1997, the Electronic Frontier Foundation successfully demonstrated that DES could be brute-forced in days.

HARD
TRUE FALSE
30s
Cryptography
by Mohamed
PreviousPage 2 of 37Next