Question Bank

1899 approved questions from the community

What is the purpose of key expansion in AES?

MEDIUM
SINGLE CHOICE
35s
Cryptography
by Mohamed

Which of the following is a common symmetric encryption algorithm?

MEDIUM
SINGLE CHOICE
30s
Cryptography
by Mohamed

A hash function that is pre-image resistant means it should be computationally infeasible to derive the original input from the hash output.

MEDIUM
TRUE FALSE
30s
Cryptography
by Mohamed

What is the primary use case for symmetric encryption?

MEDIUM
SINGLE CHOICE
30s
Cryptography
by Mohamed

A 256-bit ECC key provides security equivalent to a 3072-bit RSA key.

MEDIUM
TRUE FALSE
25s
Cryptography
by Mohamed

Digital signatures prevent non-repudiation by making it impossible for the sender to deny sending a message.

MEDIUM
TRUE FALSE
25s
Cryptography
by Mohamed

Which of the following are required properties of a cryptographic hash function? (Select all that apply)

MEDIUM
MULTIPLE CHOICE
45s
Cryptography
by Mohamed

Stream ciphers typically have higher latency than block ciphers.

MEDIUM
TRUE FALSE
25s
Cryptography
by Mohamed

Triple DES is more efficient than AES for modern encryption needs.

MEDIUM
TRUE FALSE
25s
Cryptography
by Mohamed

What is the primary advantage of asymmetric cryptography over symmetric cryptography?

MEDIUM
SINGLE CHOICE
35s
Cryptography
by Mohamed

What mathematical problem is RSA security based on?

MEDIUM
SINGLE CHOICE
35s
Cryptography
by Mohamed

What is second-preimage resistance in hash functions?

MEDIUM
SINGLE CHOICE
40s
Cryptography
by Mohamed

Symmetric encryption typically requires shorter key lengths than asymmetric encryption for equivalent security.

MEDIUM
TRUE FALSE
30s
Cryptography
by Mohamed

The security of RSA relies on the difficulty of the discrete logarithm problem.

MEDIUM
TRUE FALSE
30s
Cryptography
by Mohamed

Compared to RSA, what is a key advantage of ECC (Elliptic Curve Cryptography)?

MEDIUM
SINGLE CHOICE
35s
Cryptography
by Mohamed

What is the purpose of OCSP (Online Certificate Status Protocol)?

MEDIUM
SINGLE CHOICE
35s
Cryptography
by Mohamed

What type of cipher is the Caesar cipher?

MEDIUM
SINGLE CHOICE
25s
Cryptography
by Mohamed

What role does a Certificate Authority (CA) play in PKI?

MEDIUM
SINGLE CHOICE
35s
Cryptography
by Mohamed

What network structure does AES use?

MEDIUM
SINGLE CHOICE
35s
Cryptography
by Mohamed

How many rounds does AES perform with a 128-bit key?

MEDIUM
SINGLE CHOICE
30s
Cryptography
by Mohamed
PreviousPage 5 of 95Next