Loading [MathJax]/jax/output/HTML-CSS/fonts/TeX/fontdata.js

Introduction to Java Security

Descripción

Introduction to Java Security
Carlos Veliz
Test por Carlos Veliz, actualizado hace más de 1 año
Carlos Veliz
Creado por Carlos Veliz hace alrededor de 10 años
228
0
1 2 3 4 5 (0)

Resumen del Recurso

Pregunta 1

Pregunta
It is part of Core Java 2 Security Architecture:
Respuesta
  • Message Authentication Codes
  • Class Loader
  • Standard Algorithms
  • Digital Signatures
  • Key Generators and key Factories

Pregunta 2

Pregunta
Mark the correct description that corresponds to the JCE abbreviation:
Respuesta
  • Java Cryptographic Extension
  • Java Secure Socket Extension
  • Java Characters Encoding
  • Java Authenticacion and Authorization Services
  • None of the above

Pregunta 3

Pregunta
Which of the following statements does not correspond to a feature of the Java Virtual Machine?
Respuesta
  • Is an interpreter that implements bytecode (.class file)
  • Produce the binary code according to the specific instruction lengths of the plataform, that is the reason Java programs are plataform independet
  • Interprets bycode and gives instructions to operatings system calls
  • Imitates the actual Java processor that emulates the CPU of the host machine
  • Provides the classes necessary to create an applet and the classes an applet uses to communicate with its applet context

Pregunta 4

Pregunta
JVM starts by loading classes using class loaders such as:
Respuesta
  • Bootstrap Class Loader
  • Extension Class Loader
  • system Class Loader
  • All of the above
  • None of the above

Pregunta 5

Pregunta
A statement is not part of the 4 steps the bycode verifier:
Respuesta
  • The class file should have the basic format of a class file()
  • bycode verfier cannot be access by Java users or programmers
  • Adictional verification can be done without looking at the code array of the code attribute
  • Check the code array of the code attribute: bycode verifier
  • Perform the test delayed for efficiency reasons in pass 3

Pregunta 6

Pregunta
Some of the java security frameworks are:
Respuesta
  • 1) JAAS
  • 2) JCE
  • 3) Java SASL API
  • 4) 1 and 3
  • 5) 2 and 3

Pregunta 7

Pregunta
Mainly uses kerberos protocol for token based network authentication:
Respuesta
  • JSSE
  • JGSS
  • JCE
  • Java SASL API
  • None of the above

Pregunta 8

Pregunta
Uses various protocols such as IMAP, LDAP for authentication and providing security layer for the communications:
Respuesta
  • JCE
  • JAAS
  • Java SASL API
  • JCA
  • GSS

Pregunta 9

Pregunta
Provides the Java version SSL and TLS protocols:
Respuesta
  • JSSE
  • JCE
  • Java SASL API
  • JGSS
  • All of the above

Pregunta 10

Pregunta
According to IBM, which of the following statements is the highest relative cost of fixing defects?
Respuesta
  • Testing
  • Design
  • Implementation
  • Maintenance
  • None of the above
Mostrar resumen completo Ocultar resumen completo

0 comentarios

There are no comments, be the first and leave one below:

Similar

Java Mix Test 42p
Carlos Veliz
Authentication and Authorization
Carlos Veliz
ECSP JAVA: JAAS
Carlos Veliz
Java Application Vulnerabilities
Carlos Veliz
Criptography
Carlos Veliz
Java - Mix
Carlos Veliz
Java Concurrency and Session Management
Jose Luis Vasquez Galvez
Java Mix Test 42p
Jose Luis Vasquez Galvez
TERMODINÁMICA
jonathan.estevez
Bioquimica
Nadim Bissar