Question Bank
721 approved questions from the community
Flyweight minimizes memory by sharing?
Prototype deep vs shallow?
State and Strategy identical diagrams?
Template vs Strategy?
Mediator vs Observer primary difference?
Bridge more suitable when?
Proxy introduces performance overhead?
Confused patterns?
Open/Closed Principle patterns?
Plugin architecture patterns?
Which of the following are practical applications of PKI? (Select all that apply)
What is the meet-in-the-middle attack on Feistel networks?
The Atbash cipher is a type of substitution cipher that reverses the alphabet.
Which of the following are stages in each round of a Feistel cipher? (Select all that apply)
What is the primary reason Feistel ciphers are elegant and widely used?
Which of the following contributed to DES being considered insecure? (Select all that apply)
Which of the following security properties does PKI provide? (Select all that apply)
What cryptographic operation does AES perform on the state array?
ECC signature creation and verification are typically faster than RSA for smaller messages.
In 1997, the Electronic Frontier Foundation successfully demonstrated that DES could be brute-forced in days.