Question Bank
1899 approved questions from the community
Digital signatures can only be verified by the sender.
Which of the following are best practices for cryptographic systems? (Select all that apply)
What role does a Certificate Authority (CA) play in PKI?
What type of cipher is the Caesar cipher?
Compared to RSA, what is a key advantage of ECC (Elliptic Curve Cryptography)?
What happens if a private key in an asymmetric system is compromised?
What is the Conformist pattern in Context Mapping?
What is the main difference between a Repository and a Service in DDD?
When using Domain Events with event sourcing, what do they act as?
What is a Context Map in DDD?
Entities in DDD are considered equal if their identity matches, regardless of attribute values.
Domain Services are primarily concerned with data storage and persistence.
The Shared Kernel should be kept lightweight and only include elements pertinent to collaborating domains.
All changes within an Aggregate must go through the Aggregate Root.
In DDD, Aggregates should be designed to ensure transactional consistency across all domain objects in the system.
Regulatory requirements can influence the definition of Bounded Contexts.
What is the Customer-Supplier pattern in Context Mapping?
In DDD, different Bounded Contexts can have the same terms with different meanings.
What additional operations might Repositories handle beyond basic CRUD?
What pattern are Domain Events often implemented with?