null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
2997230
Criptography
Description
Criptography
No tags specified
ecsp java
criptography
test 6
Quiz by
Carlos Veliz
, updated more than 1 year ago
More
Less
Created by
Carlos Veliz
over 9 years ago
22
0
0
Resource summary
Question 1
Question
Check the statement that is not part of the design principles for the JCA and JCE:
Answer
Algorithm Independence
Implementation Independence
Algorithm Interoperability
Algorithm Extensibility
Implementation Interoperability
Question 2
Question
Java Cryptography Architecture Engine not includes:
Answer
CertStore
CertificateFactory
AlgorithmParameters
Key aggrement
Key Store
Question 3
Question
What is the correct order of steps to implement the methods of encryption and decryption?
Answer
Symetric Key Generation - Encryption - Decryption
Encryption - Symetric Key Generation - Decryption
Encryption - Decryption - Symetric Key Generation
Encryption - Cipher - Decryption
None of the above
Question 4
Question
In the Cipher class is a method that retrieves block size.
Answer
GetAlgorithm()
getblocksize()
Getparameters()
getblocklength()
Dofinal()
Question 5
Question
Methods: Inti, getParameter and getIV, described:
Answer
Creating a cipher object
Encrypting and Decrypting data
Managing Algorithm Parameters
Cipher Output Considerations
Initializing a cipher object
Question 6
Question
"Class supports standard socket methods to secure socket communication". This feature belongs to:
Answer
java.net and javax.net.ssl
javax.net.ssl.SSLSocket
java.net.socket
java.net.ssl.SSLSocket
javax.net.socket
Question 7
Question
Check the statement that is not part of the elements of key management system include:
Answer
Keys
Certificates
Server
identities
All of the above
Question 8
Question
Poor key Management Threats not include:
Answer
Mishandling of Keys
Unauthorized use of public or secret keys
Incorrect implementation of key Generation
Confidentiality Compromise
Using existing cryptographic libraries
Question 9
Question
Select the tool that does not belong to Java cryptographic tools:
Answer
jCryption
PrimeInk Java
jPdfSign
Cryptix
Jimmix
Question 10
Question
Not a Certification Authority:
Answer
www.verisign.com
www.comodo.com
www.oracle.com
www.entrust.net
www.thawte.com
Show full summary
Hide full summary
Want to create your own
Quizzes
for
free
with GoConqr?
Learn more
.
Similar
Java Concurrency and Session Management
Carlos Veliz
Introduction to Java Security
Carlos Veliz
Java Mix Test 42p
Carlos Veliz
Authentication and Authorization
Carlos Veliz
ECSP JAVA: JAAS
Carlos Veliz
Java - Mix
Carlos Veliz
Java Application Vulnerabilities
Carlos Veliz
Java Concurrency and Session Management
Jose Luis Vasquez Galvez
Java Mix Test 42p
Jose Luis Vasquez Galvez
Conferences of the Cold War
Alina A
Historia matematyki II
Tomasz Kacperek
Browse Library