Criptography

Descripción

Criptography
Carlos Veliz
Test por Carlos Veliz, actualizado hace más de 1 año
Carlos Veliz
Creado por Carlos Veliz hace casi 9 años
22
0

Resumen del Recurso

Pregunta 1

Pregunta
Check the statement that is not part of the design principles for the JCA and JCE:
Respuesta
  • Algorithm Independence
  • Implementation Independence
  • Algorithm Interoperability
  • Algorithm Extensibility
  • Implementation Interoperability

Pregunta 2

Pregunta
Java Cryptography Architecture Engine not includes:
Respuesta
  • CertStore
  • CertificateFactory
  • AlgorithmParameters
  • Key aggrement
  • Key Store

Pregunta 3

Pregunta
What is the correct order of steps to implement the methods of encryption and decryption?
Respuesta
  • Symetric Key Generation - Encryption - Decryption
  • Encryption - Symetric Key Generation - Decryption
  • Encryption - Decryption - Symetric Key Generation
  • Encryption - Cipher - Decryption
  • None of the above

Pregunta 4

Pregunta
In the Cipher class is a method that retrieves block size.
Respuesta
  • GetAlgorithm()
  • getblocksize()
  • Getparameters()
  • getblocklength()
  • Dofinal()

Pregunta 5

Pregunta
Methods: Inti, getParameter and getIV, described:
Respuesta
  • Creating a cipher object
  • Encrypting and Decrypting data
  • Managing Algorithm Parameters
  • Cipher Output Considerations
  • Initializing a cipher object

Pregunta 6

Pregunta
"Class supports standard socket methods to secure socket communication". This feature belongs to:
Respuesta
  • java.net and javax.net.ssl
  • javax.net.ssl.SSLSocket
  • java.net.socket
  • java.net.ssl.SSLSocket
  • javax.net.socket

Pregunta 7

Pregunta
Check the statement that is not part of the elements of key management system include:
Respuesta
  • Keys
  • Certificates
  • Server
  • identities
  • All of the above

Pregunta 8

Pregunta
Poor key Management Threats not include:
Respuesta
  • Mishandling of Keys
  • Unauthorized use of public or secret keys
  • Incorrect implementation of key Generation
  • Confidentiality Compromise
  • Using existing cryptographic libraries

Pregunta 9

Pregunta
Select the tool that does not belong to Java cryptographic tools:
Respuesta
  • jCryption
  • PrimeInk Java
  • jPdfSign
  • Cryptix
  • Jimmix

Pregunta 10

Pregunta
Not a Certification Authority:
Respuesta
  • www.verisign.com
  • www.comodo.com
  • www.oracle.com
  • www.entrust.net
  • www.thawte.com
Mostrar resumen completo Ocultar resumen completo

Similar

Java Concurrency and Session Management
Carlos Veliz
Introduction to Java Security
Carlos Veliz
Java Mix Test 42p
Carlos Veliz
Authentication and Authorization
Carlos Veliz
ECSP JAVA: JAAS
Carlos Veliz
Java - Mix
Carlos Veliz
Java Application Vulnerabilities
Carlos Veliz
Java Concurrency and Session Management
Jose Luis Vasquez Galvez
Java Mix Test 42p
Jose Luis Vasquez Galvez
Capitales Europeas
Diego Santos
PROCESADORES DE TEXTO
rm-asociados