Question Bank
1899 approved questions from the community
Command supports macro recording?
Interpreter implements what?
Pattern for nested menus?
Builder separates what?
Decorator differs from subclassing how?
Pattern for different data representations?
Behavioral patterns?
Wrapping or delegation patterns?
Proxy for lazy initialization?
Pattern for operations without knowing class?
What is the purpose of key expansion in AES?
What is Triple DES (3DES)?
How many rounds of encryption does DES perform?
What is the primary use case for asymmetric encryption?
Triple DES is more efficient than AES for modern encryption needs.
A 256-bit ECC key provides security equivalent to a 3072-bit RSA key.
Why is AES preferred over DES in modern applications?
The security of RSA relies on the difficulty of the discrete logarithm problem.
Simple substitution ciphers are vulnerable to frequency analysis attacks.
What does it mean for a cryptographic algorithm to be computationally secure?