Question Bank

3705 approved questions from the community

Which of the following are symmetric encryption algorithms? (Select all that apply)

EASY
MULTIPLE CHOICE
35s
Cryptography
by Mohamed

What mathematical problem is RSA security based on?

MEDIUM
SINGLE CHOICE
35s
Cryptography
by Mohamed

What is the main difference between a stream cipher and a block cipher?

EASY
SINGLE CHOICE
30s
Cryptography
by Mohamed

How many rounds does a standard Feistel cipher typically perform?

HARD
SINGLE CHOICE
30s
Cryptography
by Mohamed

What is the primary purpose of a salt in password hashing?

MEDIUM
SINGLE CHOICE
35s
Cryptography
by Mohamed

Which of the following are asymmetric encryption algorithms? (Select all that apply)

EASY
MULTIPLE CHOICE
35s
Cryptography
by Mohamed

What is the rail fence cipher an example of?

HARD
SINGLE CHOICE
35s
Cryptography
by Mohamed

Which of the following are best practices for cryptographic systems? (Select all that apply)

MEDIUM
MULTIPLE CHOICE
45s
Cryptography
by Mohamed

Which of the following are stages in each round of a Feistel cipher? (Select all that apply)

HARD
MULTIPLE CHOICE
45s
Cryptography
by Mohamed

What is the effective key length of Triple DES when using three distinct keys?

HARD
SINGLE CHOICE
35s
Cryptography
by Mohamed

What is the purpose of using a nonce in TLS/SSL protocols?

MEDIUM
SINGLE CHOICE
35s
Cryptography
by Mohamed

What cryptographic operation does AES perform on the state array?

HARD
SINGLE CHOICE
40s
Cryptography
by Mohamed

What is linear cryptanalysis in the context of DES?

HARD
SINGLE CHOICE
45s
Cryptography
by Mohamed

What happens if a private key in an asymmetric system is compromised?

MEDIUM
SINGLE CHOICE
35s
Cryptography
by Mohamed

Which of the following security properties does PKI provide? (Select all that apply)

HARD
MULTIPLE CHOICE
45s
Cryptography
by Mohamed

Which of the following are advantages of ECC over RSA? (Select all that apply)

MEDIUM
MULTIPLE CHOICE
45s
Cryptography
by Mohamed

Which of the following are reasons why DES is considered insecure today? (Select all that apply)

MEDIUM
MULTIPLE CHOICE
40s
Cryptography
by Mohamed

Which of the following are characteristics of stream ciphers? (Select all that apply)

MEDIUM
MULTIPLE CHOICE
40s
Cryptography
by Mohamed

Which of the following are common digital signature algorithms? (Select all that apply)

MEDIUM
MULTIPLE CHOICE
40s
Cryptography
by Mohamed

A hash function that is pre-image resistant means it should be computationally infeasible to derive the original input from the hash output.

MEDIUM
TRUE FALSE
30s
Cryptography
by Mohamed
PreviousPage 11 of 186Next