Question Bank

3705 approved questions from the community

What is second-preimage resistance in hash functions?

MEDIUM
SINGLE CHOICE
40s
Cryptography
by Mohamed

A nonce should be used multiple times to ensure consistent encryption results.

EASY
TRUE FALSE
20s
Cryptography
by Mohamed

Cryptography combines techniques from mathematics, computer science, and electrical engineering.

EASY
TRUE FALSE
20s
Cryptography
by Mohamed

What is the primary advantage of asymmetric cryptography over symmetric cryptography?

MEDIUM
SINGLE CHOICE
35s
Cryptography
by Mohamed

A 256-bit ECC key provides security equivalent to a 3072-bit RSA key.

MEDIUM
TRUE FALSE
25s
Cryptography
by Mohamed

Which of the following are required properties for a One-Time Pad to achieve perfect secrecy? (Select all that apply)

HARD
MULTIPLE CHOICE
40s
Cryptography
by Mohamed

RSA key generation is generally faster than ECC key generation.

MEDIUM
TRUE FALSE
25s
Cryptography
by Mohamed

RSA signature creation is generally faster than RSA encryption.

MEDIUM
TRUE FALSE
25s
Cryptography
by Mohamed

The One-Time Pad is the only practical cryptosystem that achieves perfect secrecy.

HARD
TRUE FALSE
25s
Cryptography
by Mohamed

What is a cryptographic hash function?

EASY
SINGLE CHOICE
30s
Cryptography
by Mohamed

What is the primary purpose of cryptography?

EASY
SINGLE CHOICE
30s
Cryptography
by Mohamed

What does it mean for a hash function to be collision resistant?

HARD
SINGLE CHOICE
40s
Cryptography
by Mohamed

What is the effective key length of DES?

MEDIUM
SINGLE CHOICE
25s
Cryptography
by Mohamed

Which of the following security properties does PKI provide? (Select all that apply)

HARD
MULTIPLE CHOICE
45s
Cryptography
by Mohamed

How should architecture and design patterns emerge in DDD?

MEDIUM
SINGLE CHOICE
35s
Domain Driven Design
by Mohamed

Invariants serve as guarantees that a system upholds during its regular operations.

EASY
TRUE FALSE
25s
Domain Driven Design
by Mohamed

In DDD, what should developers understand before writing any code?

EASY
SINGLE CHOICE
30s
Domain Driven Design
by Mohamed

What is the Partnership pattern in Context Mapping?

MEDIUM
SINGLE CHOICE
35s
Domain Driven Design
by Mohamed

What is a Guard Clause in DDD?

MEDIUM
SINGLE CHOICE
35s
Domain Driven Design
by Mohamed

Which technique preserves a history of changes for each aggregate and reconstructs state on restoration?

HARD
SINGLE CHOICE
40s
Domain Driven Design
by Mohamed
PreviousPage 13 of 186Next