Question Bank
3705 approved questions from the community
Which of the following are symmetric encryption algorithms? (Select all that apply)
What mathematical problem is RSA security based on?
What is the main difference between a stream cipher and a block cipher?
How many rounds does a standard Feistel cipher typically perform?
What is the primary purpose of a salt in password hashing?
Which of the following are asymmetric encryption algorithms? (Select all that apply)
What is the rail fence cipher an example of?
Which of the following are best practices for cryptographic systems? (Select all that apply)
Which of the following are stages in each round of a Feistel cipher? (Select all that apply)
What is the effective key length of Triple DES when using three distinct keys?
What is the purpose of using a nonce in TLS/SSL protocols?
What cryptographic operation does AES perform on the state array?
What is linear cryptanalysis in the context of DES?
What happens if a private key in an asymmetric system is compromised?
Which of the following security properties does PKI provide? (Select all that apply)
Which of the following are advantages of ECC over RSA? (Select all that apply)
Which of the following are reasons why DES is considered insecure today? (Select all that apply)
Which of the following are characteristics of stream ciphers? (Select all that apply)
Which of the following are common digital signature algorithms? (Select all that apply)
A hash function that is pre-image resistant means it should be computationally infeasible to derive the original input from the hash output.