Question Bank
3705 approved questions from the community
What is second-preimage resistance in hash functions?
A nonce should be used multiple times to ensure consistent encryption results.
Cryptography combines techniques from mathematics, computer science, and electrical engineering.
What is the primary advantage of asymmetric cryptography over symmetric cryptography?
A 256-bit ECC key provides security equivalent to a 3072-bit RSA key.
Which of the following are required properties for a One-Time Pad to achieve perfect secrecy? (Select all that apply)
RSA key generation is generally faster than ECC key generation.
RSA signature creation is generally faster than RSA encryption.
The One-Time Pad is the only practical cryptosystem that achieves perfect secrecy.
What is a cryptographic hash function?
What is the primary purpose of cryptography?
What does it mean for a hash function to be collision resistant?
What is the effective key length of DES?
Which of the following security properties does PKI provide? (Select all that apply)
How should architecture and design patterns emerge in DDD?
Invariants serve as guarantees that a system upholds during its regular operations.
In DDD, what should developers understand before writing any code?
What is the Partnership pattern in Context Mapping?
What is a Guard Clause in DDD?
Which technique preserves a history of changes for each aggregate and reconstructs state on restoration?