Carlos Veliz
Quiz by , created more than 1 year ago

Criptography

22
0
0
Carlos Veliz
Created by Carlos Veliz almost 9 years ago
Close

Criptography

Question 1 of 10

1

Check the statement that is not part of the design principles for the JCA and JCE:

Select one of the following:

  • Algorithm Independence

  • Implementation Independence

  • Algorithm Interoperability

  • Algorithm Extensibility

  • Implementation Interoperability

Explanation

Question 2 of 10

1

Java Cryptography Architecture Engine not includes:

Select one of the following:

  • CertStore

  • CertificateFactory

  • AlgorithmParameters

  • Key aggrement

  • Key Store

Explanation

Question 3 of 10

1

What is the correct order of steps to implement the methods of encryption and decryption?

Select one of the following:

  • Symetric Key Generation - Encryption - Decryption

  • Encryption - Symetric Key Generation - Decryption

  • Encryption - Decryption - Symetric Key Generation

  • Encryption - Cipher - Decryption

  • None of the above

Explanation

Question 4 of 10

1

In the Cipher class is a method that retrieves block size.

Select one of the following:

  • GetAlgorithm()

  • getblocksize()

  • Getparameters()

  • getblocklength()

  • Dofinal()

Explanation

Question 5 of 10

1

Methods: Inti, getParameter and getIV, described:

Select one of the following:

  • Creating a cipher object

  • Encrypting and Decrypting data

  • Managing Algorithm Parameters

  • Cipher Output Considerations

  • Initializing a cipher object

Explanation

Question 6 of 10

1

"Class supports standard socket methods to secure socket communication". This feature belongs to:

Select one of the following:

  • java.net and javax.net.ssl

  • javax.net.ssl.SSLSocket

  • java.net.socket

  • java.net.ssl.SSLSocket

  • javax.net.socket

Explanation

Question 7 of 10

1

Check the statement that is not part of the elements of key management system include:

Select one of the following:

  • Keys

  • Certificates

  • Server

  • identities

  • All of the above

Explanation

Question 8 of 10

1

Poor key Management Threats not include:

Select one of the following:

  • Mishandling of Keys

  • Unauthorized use of public or secret keys

  • Incorrect implementation of key Generation

  • Confidentiality Compromise

  • Using existing cryptographic libraries

Explanation

Question 9 of 10

1

Select the tool that does not belong to Java cryptographic tools:

Select one of the following:

  • jCryption

  • PrimeInk Java

  • jPdfSign

  • Cryptix

  • Jimmix

Explanation

Question 10 of 10

1

Not a Certification Authority:

Select one of the following:

  • www.verisign.com

  • www.comodo.com

  • www.oracle.com

  • www.entrust.net

  • www.thawte.com

Explanation