Introduction to Java Security

Beschreibung

Introduction to Java Security
Carlos Veliz
Quiz von Carlos Veliz, aktualisiert more than 1 year ago
Carlos Veliz
Erstellt von Carlos Veliz vor etwa 9 Jahre
220
0

Zusammenfassung der Ressource

Frage 1

Frage
It is part of Core Java 2 Security Architecture:
Antworten
  • Message Authentication Codes
  • Class Loader
  • Standard Algorithms
  • Digital Signatures
  • Key Generators and key Factories

Frage 2

Frage
Mark the correct description that corresponds to the JCE abbreviation:
Antworten
  • Java Cryptographic Extension
  • Java Secure Socket Extension
  • Java Characters Encoding
  • Java Authenticacion and Authorization Services
  • None of the above

Frage 3

Frage
Which of the following statements does not correspond to a feature of the Java Virtual Machine?
Antworten
  • Is an interpreter that implements bytecode (.class file)
  • Produce the binary code according to the specific instruction lengths of the plataform, that is the reason Java programs are plataform independet
  • Interprets bycode and gives instructions to operatings system calls
  • Imitates the actual Java processor that emulates the CPU of the host machine
  • Provides the classes necessary to create an applet and the classes an applet uses to communicate with its applet context

Frage 4

Frage
JVM starts by loading classes using class loaders such as:
Antworten
  • Bootstrap Class Loader
  • Extension Class Loader
  • system Class Loader
  • All of the above
  • None of the above

Frage 5

Frage
A statement is not part of the 4 steps the bycode verifier:
Antworten
  • The class file should have the basic format of a class file()
  • bycode verfier cannot be access by Java users or programmers
  • Adictional verification can be done without looking at the code array of the code attribute
  • Check the code array of the code attribute: bycode verifier
  • Perform the test delayed for efficiency reasons in pass 3

Frage 6

Frage
Some of the java security frameworks are:
Antworten
  • 1) JAAS
  • 2) JCE
  • 3) Java SASL API
  • 4) 1 and 3
  • 5) 2 and 3

Frage 7

Frage
Mainly uses kerberos protocol for token based network authentication:
Antworten
  • JSSE
  • JGSS
  • JCE
  • Java SASL API
  • None of the above

Frage 8

Frage
Uses various protocols such as IMAP, LDAP for authentication and providing security layer for the communications:
Antworten
  • JCE
  • JAAS
  • Java SASL API
  • JCA
  • GSS

Frage 9

Frage
Provides the Java version SSL and TLS protocols:
Antworten
  • JSSE
  • JCE
  • Java SASL API
  • JGSS
  • All of the above

Frage 10

Frage
According to IBM, which of the following statements is the highest relative cost of fixing defects?
Antworten
  • Testing
  • Design
  • Implementation
  • Maintenance
  • None of the above
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

Java Concurrency and Session Management
Carlos Veliz
Java Mix Test 42p
Carlos Veliz
Authentication and Authorization
Carlos Veliz
ECSP JAVA: JAAS
Carlos Veliz
Java Application Vulnerabilities
Carlos Veliz
Criptography
Carlos Veliz
Java - Mix
Carlos Veliz
Java Concurrency and Session Management
Jose Luis Vasquez Galvez
Java Mix Test 42p
Jose Luis Vasquez Galvez
Können Sie die Flosse der Airline zuordnen?
B G
THEO: VO PSYCH - Medienpsychologie
Adrienne Tschaudi