Interview
search
⌘Ctrlk
Interview
  • Overview
  • Intro
    • Company
    • Cross-functional
    • S.T.A.R
    • General
    • Career
    • Behavioral-Based
  • FedRAMP
    • Sensitive Architecture Diagrams
    • Networking
    • Reference architecture: PaaS
    • Managing infrastructure-as-a-service
  • Privacy
    • Data Privacy - General
    • CIPP
    • HIPAA
    • Business Associate Agreement (BAA)
    • Data Use Agreement (DUA)
    • GDPR
  • GRC
    • Compliance
    • Governance
    • Risk
    • Auditing
    • PCI
  • Security Skills & Technical Aptitude
    • General
    • Access Control
    • Cloud
    • Network
    • Web Application
    • Cryptography
      • What is cryptography?
      • What are the different types of cryptographic algorithms?
      • What is the difference between symmetric and asymmetric cryptography?
      • What is a hashing algorithm?
      • What is public-key cryptography?
      • What is the purpose of digital signatures?
      • How are digital signatures authenticated?
      • What is the difference between encryption and hashing?
      • How does encryption ensure the confidentiality of data?
      • What is the difference between encryption and steganography?
      • What is the difference between a cipher and a code?
      • What is a one-time pad?
      • What is the difference between symmetric and asymmetric key sizes?
      • What is a key management system?
      • What is a digital certificate?
      • What is the difference between a digital signature and a hash?
      • What’s the difference between Diffie-Hellman and RSA?
      • What is Forward Secrecy?
      • What are block and stream ciphers?
      • What are some examples of symmetric encryption algorithms?
      • What are some examples of asymmetric encryption algorithms?
    • TLS
  • Project Coordination & Collaboration
    • Project Management
  • Problems & START Examples
    • Ideas
    • Problems
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Security Skills & Technical Aptitude

Cryptography

What is cryptography?chevron-rightWhat are the different types of cryptographic algorithms?chevron-rightWhat is the difference between symmetric and asymmetric cryptography?chevron-rightWhat is a hashing algorithm?chevron-rightWhat is public-key cryptography?chevron-rightWhat is the purpose of digital signatures?chevron-rightHow are digital signatures authenticated?chevron-rightWhat is the difference between encryption and hashing?chevron-rightHow does encryption ensure the confidentiality of data?chevron-rightWhat is the difference between encryption and steganography?chevron-rightWhat is the difference between a cipher and a code?chevron-rightWhat is a one-time pad?chevron-rightWhat is the difference between symmetric and asymmetric key sizes?chevron-rightWhat is a key management system?chevron-rightWhat is a digital certificate?chevron-rightWhat is the difference between a digital signature and a hash?chevron-rightWhat’s the difference between Diffie-Hellman and RSA?chevron-rightWhat is Forward Secrecy?chevron-rightWhat are block and stream ciphers?chevron-rightWhat are some examples of symmetric encryption algorithms?chevron-rightWhat are some examples of asymmetric encryption algorithms?chevron-right
PreviousWhat measures do you take to ensure the security of a web application?chevron-leftNextWhat is cryptography?chevron-right

Last updated 3 years ago