0
0
HLDsystem_design~20 mins

Encryption at rest and in transit in HLD - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
Encryption Mastery
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
2:00remaining
Understanding Encryption at Rest

Which of the following best describes encryption at rest in a system?

AData is encrypted when stored on disk or persistent storage to protect it from unauthorized access.
BData is encrypted only when it is being sent over the network between services.
CData is encrypted only during processing in memory to prevent leaks.
DData is encrypted only when backed up to external storage devices.
Attempts:
2 left
💡 Hint

Think about when data is saved and not moving.

Architecture
intermediate
2:00remaining
Choosing Encryption Methods for Data in Transit

Which encryption method is most appropriate for securing data in transit between client and server?

AHashing passwords before storing them in the database.
BEncrypting data backups with a symmetric key.
CTLS (Transport Layer Security) protocol to encrypt network communication.
DAES encryption applied directly to stored files on the server.
Attempts:
2 left
💡 Hint

Consider how data moves between devices over the network.

scaling
advanced
3:00remaining
Scaling Encryption Key Management

In a large distributed system with thousands of servers, what is the best practice to manage encryption keys for data at rest?

AStore all encryption keys locally on each server to reduce network latency.
BUse a centralized key management service (KMS) that securely stores and rotates keys.
CHardcode encryption keys in application code for easy access.
DGenerate new keys randomly on each server without sharing.
Attempts:
2 left
💡 Hint

Think about security and ease of key rotation across many servers.

tradeoff
advanced
3:00remaining
Tradeoffs Between Encryption Performance and Security

Which statement best describes a common tradeoff when implementing encryption at rest and in transit?

AStronger encryption algorithms always improve performance but reduce security.
BEncryption at rest eliminates the need for encryption in transit.
CUsing no encryption improves security by avoiding key management complexity.
DEncrypting data increases CPU usage and latency but improves data confidentiality.
Attempts:
2 left
💡 Hint

Consider how encryption affects system resources and speed.

estimation
expert
3:00remaining
Estimating Impact of Encryption on System Throughput

A web service processes 10,000 requests per second. Enabling TLS encryption adds 5ms latency per request due to handshake and encryption overhead. What is the approximate maximum throughput (requests per second) after enabling TLS?

AAbout 2,000 requests per second
BAbout 200 requests per second
CAbout 5,000 requests per second
DAbout 10,000 requests per second
Attempts:
2 left
💡 Hint

Calculate how added latency affects requests per second capacity.