Criptography

Description

Criptography
Carlos Veliz
Quiz by Carlos Veliz, updated more than 1 year ago
Carlos Veliz
Created by Carlos Veliz over 9 years ago
22
0

Resource summary

Question 1

Question
Check the statement that is not part of the design principles for the JCA and JCE:
Answer
  • Algorithm Independence
  • Implementation Independence
  • Algorithm Interoperability
  • Algorithm Extensibility
  • Implementation Interoperability

Question 2

Question
Java Cryptography Architecture Engine not includes:
Answer
  • CertStore
  • CertificateFactory
  • AlgorithmParameters
  • Key aggrement
  • Key Store

Question 3

Question
What is the correct order of steps to implement the methods of encryption and decryption?
Answer
  • Symetric Key Generation - Encryption - Decryption
  • Encryption - Symetric Key Generation - Decryption
  • Encryption - Decryption - Symetric Key Generation
  • Encryption - Cipher - Decryption
  • None of the above

Question 4

Question
In the Cipher class is a method that retrieves block size.
Answer
  • GetAlgorithm()
  • getblocksize()
  • Getparameters()
  • getblocklength()
  • Dofinal()

Question 5

Question
Methods: Inti, getParameter and getIV, described:
Answer
  • Creating a cipher object
  • Encrypting and Decrypting data
  • Managing Algorithm Parameters
  • Cipher Output Considerations
  • Initializing a cipher object

Question 6

Question
"Class supports standard socket methods to secure socket communication". This feature belongs to:
Answer
  • java.net and javax.net.ssl
  • javax.net.ssl.SSLSocket
  • java.net.socket
  • java.net.ssl.SSLSocket
  • javax.net.socket

Question 7

Question
Check the statement that is not part of the elements of key management system include:
Answer
  • Keys
  • Certificates
  • Server
  • identities
  • All of the above

Question 8

Question
Poor key Management Threats not include:
Answer
  • Mishandling of Keys
  • Unauthorized use of public or secret keys
  • Incorrect implementation of key Generation
  • Confidentiality Compromise
  • Using existing cryptographic libraries

Question 9

Question
Select the tool that does not belong to Java cryptographic tools:
Answer
  • jCryption
  • PrimeInk Java
  • jPdfSign
  • Cryptix
  • Jimmix

Question 10

Question
Not a Certification Authority:
Answer
  • www.verisign.com
  • www.comodo.com
  • www.oracle.com
  • www.entrust.net
  • www.thawte.com
Show full summary Hide full summary

Similar

Java Concurrency and Session Management
Carlos Veliz
Introduction to Java Security
Carlos Veliz
Java Mix Test 42p
Carlos Veliz
Authentication and Authorization
Carlos Veliz
ECSP JAVA: JAAS
Carlos Veliz
Java - Mix
Carlos Veliz
Java Application Vulnerabilities
Carlos Veliz
Java Concurrency and Session Management
Jose Luis Vasquez Galvez
Java Mix Test 42p
Jose Luis Vasquez Galvez
Conferences of the Cold War
Alina A
Historia matematyki II
Tomasz Kacperek