It is part of Core Java 2 Security Architecture:
Message Authentication Codes
Class Loader
Standard Algorithms
Digital Signatures
Key Generators and key Factories
Mark the correct description that corresponds to the JCE abbreviation:
Java Cryptographic Extension
Java Secure Socket Extension
Java Characters Encoding
Java Authenticacion and Authorization Services
None of the above
Which of the following statements does not correspond to a feature of the Java Virtual Machine?
Is an interpreter that implements bytecode (.class file)
Produce the binary code according to the specific instruction lengths of the plataform, that is the reason Java programs are plataform independet
Interprets bycode and gives instructions to operatings system calls
Imitates the actual Java processor that emulates the CPU of the host machine
Provides the classes necessary to create an applet and the classes an applet uses to communicate with its applet context
JVM starts by loading classes using class loaders such as:
Bootstrap Class Loader
Extension Class Loader
system Class Loader
All of the above
A statement is not part of the 4 steps the bycode verifier:
The class file should have the basic format of a class file()
bycode verfier cannot be access by Java users or programmers
Adictional verification can be done without looking at the code array of the code attribute
Check the code array of the code attribute: bycode verifier
Perform the test delayed for efficiency reasons in pass 3
Some of the java security frameworks are:
1) JAAS
2) JCE
3) Java SASL API
4) 1 and 3
5) 2 and 3
Mainly uses kerberos protocol for token based network authentication:
JSSE
JGSS
JCE
Java SASL API
Uses various protocols such as IMAP, LDAP for authentication and providing security layer for the communications:
JAAS
JCA
GSS
Provides the Java version SSL and TLS protocols:
According to IBM, which of the following statements is the highest relative cost of fixing defects?
Testing
Design
Implementation
Maintenance