Question Bank

721 approved questions from the community

What is the effective key length of Triple DES when using three distinct keys?

HARD
SINGLE CHOICE
35s
Cryptography
by Mohamed

The Atbash cipher is a type of substitution cipher that reverses the alphabet.

HARD
TRUE FALSE
25s
Cryptography
by Mohamed

What is the rail fence cipher an example of?

HARD
SINGLE CHOICE
35s
Cryptography
by Mohamed

What does it mean for a hash function to be collision resistant?

HARD
SINGLE CHOICE
40s
Cryptography
by Mohamed

Which of the following are practical applications of PKI? (Select all that apply)

HARD
MULTIPLE CHOICE
50s
Cryptography
by Mohamed

Which of the following are required properties for a One-Time Pad to achieve perfect secrecy? (Select all that apply)

HARD
MULTIPLE CHOICE
40s
Cryptography
by Mohamed

Which of the following are stages in each round of a Feistel cipher? (Select all that apply)

HARD
MULTIPLE CHOICE
45s
Cryptography
by Mohamed

Which of the following contributed to DES being considered insecure? (Select all that apply)

HARD
MULTIPLE CHOICE
45s
Cryptography
by Mohamed

In the context of perfect secrecy, what condition must be satisfied?

HARD
SINGLE CHOICE
45s
Cryptography
by Mohamed

What is the main difference between electronic signatures and digital signatures?

HARD
SINGLE CHOICE
45s
Cryptography
by Mohamed

AES operations in Galois Field transformation use finite field arithmetic.

HARD
TRUE FALSE
30s
Cryptography
by Mohamed

What cryptographic operation does AES perform on the state array?

HARD
SINGLE CHOICE
40s
Cryptography
by Mohamed

The security of Feistel ciphers depends on both the strength of the substitution function and the quality of round key generation.

HARD
TRUE FALSE
30s
Cryptography
by Mohamed

What is the meet-in-the-middle attack on Feistel networks?

HARD
SINGLE CHOICE
45s
Cryptography
by Mohamed

Which of the following security properties does PKI provide? (Select all that apply)

HARD
MULTIPLE CHOICE
45s
Cryptography
by Mohamed

What is linear cryptanalysis in the context of DES?

HARD
SINGLE CHOICE
45s
Cryptography
by Mohamed

In AES encryption, what happens in the final round that differs from other rounds?

HARD
SINGLE CHOICE
40s
Cryptography
by Mohamed

What is perfect secrecy in cryptography?

HARD
SINGLE CHOICE
45s
Cryptography
by Mohamed

What is the purpose of using codebase granularity as a strategy for defining Bounded Contexts?

HARD
SINGLE CHOICE
40s
Domain Driven Design
by Mohamed

What is Two-Phase Commit (2PC) in DDD?

HARD
SINGLE CHOICE
45s
Domain Driven Design
by Mohamed
PreviousPage 3 of 37Next