Question Bank

1899 approved questions from the community

What is the effective key length of DES?

MEDIUM
SINGLE CHOICE
25s
Cryptography
by Mohamed

What mathematical problem is RSA security based on?

MEDIUM
SINGLE CHOICE
35s
Cryptography
by Mohamed

What is the purpose of key expansion in AES?

MEDIUM
SINGLE CHOICE
35s
Cryptography
by Mohamed

Which of the following are required properties of a cryptographic hash function? (Select all that apply)

MEDIUM
MULTIPLE CHOICE
45s
Cryptography
by Mohamed

In block ciphers, transmission errors propagate throughout the entire block.

MEDIUM
TRUE FALSE
25s
Cryptography
by Mohamed

Which of the following are core elements of Public Key Infrastructure (PKI)? (Select all that apply)

MEDIUM
MULTIPLE CHOICE
45s
Cryptography
by Mohamed

RSA key generation is generally faster than ECC key generation.

MEDIUM
TRUE FALSE
25s
Cryptography
by Mohamed

What is the purpose of OCSP (Online Certificate Status Protocol)?

MEDIUM
SINGLE CHOICE
35s
Cryptography
by Mohamed

Hash functions must produce the same output size regardless of input size.

MEDIUM
TRUE FALSE
25s
Cryptography
by Mohamed

RSA signature creation is generally faster than RSA encryption.

MEDIUM
TRUE FALSE
25s
Cryptography
by Mohamed

What is the primary use case for symmetric encryption?

MEDIUM
SINGLE CHOICE
30s
Cryptography
by Mohamed

Which key in asymmetric cryptography must be kept secret?

MEDIUM
SINGLE CHOICE
25s
Cryptography
by Mohamed

In asymmetric cryptography, which key is used for encryption?

MEDIUM
SINGLE CHOICE
25s
Cryptography
by Mohamed

What is second-preimage resistance in hash functions?

MEDIUM
SINGLE CHOICE
40s
Cryptography
by Mohamed

What is the primary use case for asymmetric encryption?

MEDIUM
SINGLE CHOICE
30s
Cryptography
by Mohamed

Which famous cipher uses the Feistel structure?

MEDIUM
SINGLE CHOICE
30s
Cryptography
by Mohamed

What does it mean for a cryptographic algorithm to be computationally secure?

MEDIUM
SINGLE CHOICE
40s
Cryptography
by Mohamed

Digital signatures can only be verified by the sender.

MEDIUM
TRUE FALSE
25s
Cryptography
by Mohamed

A 256-bit ECC key provides security equivalent to a 3072-bit RSA key.

MEDIUM
TRUE FALSE
25s
Cryptography
by Mohamed

Simple substitution ciphers are vulnerable to frequency analysis attacks.

MEDIUM
TRUE FALSE
25s
Cryptography
by Mohamed
PreviousPage 4 of 95Next