Introduction to Java Security

Description

Introduction to Java Security
Carlos Veliz
Quiz by Carlos Veliz, updated more than 1 year ago
Carlos Veliz
Created by Carlos Veliz almost 10 years ago
224
0
1 2 3 4 5 (0)

Resource summary

Question 1

Question
It is part of Core Java 2 Security Architecture:
Answer
  • Message Authentication Codes
  • Class Loader
  • Standard Algorithms
  • Digital Signatures
  • Key Generators and key Factories

Question 2

Question
Mark the correct description that corresponds to the JCE abbreviation:
Answer
  • Java Cryptographic Extension
  • Java Secure Socket Extension
  • Java Characters Encoding
  • Java Authenticacion and Authorization Services
  • None of the above

Question 3

Question
Which of the following statements does not correspond to a feature of the Java Virtual Machine?
Answer
  • Is an interpreter that implements bytecode (.class file)
  • Produce the binary code according to the specific instruction lengths of the plataform, that is the reason Java programs are plataform independet
  • Interprets bycode and gives instructions to operatings system calls
  • Imitates the actual Java processor that emulates the CPU of the host machine
  • Provides the classes necessary to create an applet and the classes an applet uses to communicate with its applet context

Question 4

Question
JVM starts by loading classes using class loaders such as:
Answer
  • Bootstrap Class Loader
  • Extension Class Loader
  • system Class Loader
  • All of the above
  • None of the above

Question 5

Question
A statement is not part of the 4 steps the bycode verifier:
Answer
  • The class file should have the basic format of a class file()
  • bycode verfier cannot be access by Java users or programmers
  • Adictional verification can be done without looking at the code array of the code attribute
  • Check the code array of the code attribute: bycode verifier
  • Perform the test delayed for efficiency reasons in pass 3

Question 6

Question
Some of the java security frameworks are:
Answer
  • 1) JAAS
  • 2) JCE
  • 3) Java SASL API
  • 4) 1 and 3
  • 5) 2 and 3

Question 7

Question
Mainly uses kerberos protocol for token based network authentication:
Answer
  • JSSE
  • JGSS
  • JCE
  • Java SASL API
  • None of the above

Question 8

Question
Uses various protocols such as IMAP, LDAP for authentication and providing security layer for the communications:
Answer
  • JCE
  • JAAS
  • Java SASL API
  • JCA
  • GSS

Question 9

Question
Provides the Java version SSL and TLS protocols:
Answer
  • JSSE
  • JCE
  • Java SASL API
  • JGSS
  • All of the above

Question 10

Question
According to IBM, which of the following statements is the highest relative cost of fixing defects?
Answer
  • Testing
  • Design
  • Implementation
  • Maintenance
  • None of the above
Show full summary Hide full summary

0 comments

There are no comments, be the first and leave one below:

Similar

Java Mix Test 42p
Carlos Veliz
Authentication and Authorization
Carlos Veliz
ECSP JAVA: JAAS
Carlos Veliz
Java Application Vulnerabilities
Carlos Veliz
Criptography
Carlos Veliz
Java - Mix
Carlos Veliz
Java Concurrency and Session Management
Jose Luis Vasquez Galvez
Java Mix Test 42p
Jose Luis Vasquez Galvez
Unit 1: Business Studies GCSE
Libby Rose
Memory: AS Psychology
rae_olamide_xo