Criptography

Descrição

Criptography
Carlos Veliz
Quiz por Carlos Veliz, atualizado more than 1 year ago
Carlos Veliz
Criado por Carlos Veliz mais de 10 anos atrás
26
0

Resumo de Recurso

Questão 1

Questão
Check the statement that is not part of the design principles for the JCA and JCE:
Responda
  • Algorithm Independence
  • Implementation Independence
  • Algorithm Interoperability
  • Algorithm Extensibility
  • Implementation Interoperability

Questão 2

Questão
Java Cryptography Architecture Engine not includes:
Responda
  • CertStore
  • CertificateFactory
  • AlgorithmParameters
  • Key aggrement
  • Key Store

Questão 3

Questão
What is the correct order of steps to implement the methods of encryption and decryption?
Responda
  • Symetric Key Generation - Encryption - Decryption
  • Encryption - Symetric Key Generation - Decryption
  • Encryption - Decryption - Symetric Key Generation
  • Encryption - Cipher - Decryption
  • None of the above

Questão 4

Questão
In the Cipher class is a method that retrieves block size.
Responda
  • GetAlgorithm()
  • getblocksize()
  • Getparameters()
  • getblocklength()
  • Dofinal()

Questão 5

Questão
Methods: Inti, getParameter and getIV, described:
Responda
  • Creating a cipher object
  • Encrypting and Decrypting data
  • Managing Algorithm Parameters
  • Cipher Output Considerations
  • Initializing a cipher object

Questão 6

Questão
"Class supports standard socket methods to secure socket communication". This feature belongs to:
Responda
  • java.net and javax.net.ssl
  • javax.net.ssl.SSLSocket
  • java.net.socket
  • java.net.ssl.SSLSocket
  • javax.net.socket

Questão 7

Questão
Check the statement that is not part of the elements of key management system include:
Responda
  • Keys
  • Certificates
  • Server
  • identities
  • All of the above

Questão 8

Questão
Poor key Management Threats not include:
Responda
  • Mishandling of Keys
  • Unauthorized use of public or secret keys
  • Incorrect implementation of key Generation
  • Confidentiality Compromise
  • Using existing cryptographic libraries

Questão 9

Questão
Select the tool that does not belong to Java cryptographic tools:
Responda
  • jCryption
  • PrimeInk Java
  • jPdfSign
  • Cryptix
  • Jimmix

Questão 10

Questão
Not a Certification Authority:
Responda
  • www.verisign.com
  • www.comodo.com
  • www.oracle.com
  • www.entrust.net
  • www.thawte.com

Semelhante

Java Concurrency and Session Management
Carlos Veliz
Introduction to Java Security
Carlos Veliz
Java Mix Test 42p
Carlos Veliz
Authentication and Authorization
Carlos Veliz
ECSP JAVA: JAAS
Carlos Veliz
Java - Mix
Carlos Veliz
Java Application Vulnerabilities
Carlos Veliz
Java Concurrency and Session Management
Jose Luis Vasquez Galvez
Java Mix Test 42p
Jose Luis Vasquez Galvez