Question Bank

1899 approved questions from the community

Command supports macro recording?

MEDIUM
TRUE FALSE
25s
Design Patterns
by Mohamed

Interpreter implements what?

MEDIUM
SINGLE CHOICE
35s
Design Patterns
by Mohamed

Pattern for nested menus?

MEDIUM
SINGLE CHOICE
35s
Design Patterns
by Mohamed

Builder separates what?

MEDIUM
SINGLE CHOICE
35s
Design Patterns
by Mohamed

Decorator differs from subclassing how?

MEDIUM
SINGLE CHOICE
35s
Design Patterns
by Mohamed

Pattern for different data representations?

MEDIUM
SINGLE CHOICE
35s
Design Patterns
by Mohamed

Behavioral patterns?

MEDIUM
MULTIPLE CHOICE
40s
Design Patterns
by Mohamed

Wrapping or delegation patterns?

MEDIUM
MULTIPLE CHOICE
40s
Design Patterns
by Mohamed

Proxy for lazy initialization?

MEDIUM
TRUE FALSE
25s
Design Patterns
by Mohamed

Pattern for operations without knowing class?

MEDIUM
SINGLE CHOICE
35s
Design Patterns
by Mohamed

What is the purpose of key expansion in AES?

MEDIUM
SINGLE CHOICE
35s
Cryptography
by Mohamed

What is Triple DES (3DES)?

MEDIUM
SINGLE CHOICE
35s
Cryptography
by Mohamed

How many rounds of encryption does DES perform?

MEDIUM
SINGLE CHOICE
25s
Cryptography
by Mohamed

What is the primary use case for asymmetric encryption?

MEDIUM
SINGLE CHOICE
30s
Cryptography
by Mohamed

Triple DES is more efficient than AES for modern encryption needs.

MEDIUM
TRUE FALSE
25s
Cryptography
by Mohamed

A 256-bit ECC key provides security equivalent to a 3072-bit RSA key.

MEDIUM
TRUE FALSE
25s
Cryptography
by Mohamed

Why is AES preferred over DES in modern applications?

MEDIUM
SINGLE CHOICE
35s
Cryptography
by Mohamed

The security of RSA relies on the difficulty of the discrete logarithm problem.

MEDIUM
TRUE FALSE
30s
Cryptography
by Mohamed

Simple substitution ciphers are vulnerable to frequency analysis attacks.

MEDIUM
TRUE FALSE
25s
Cryptography
by Mohamed

What does it mean for a cryptographic algorithm to be computationally secure?

MEDIUM
SINGLE CHOICE
40s
Cryptography
by Mohamed
PreviousPage 3 of 95Next