Carlos Veliz
Quiz by , created more than 1 year ago

Introduction to Java Security

221
0
0
Carlos Veliz
Created by Carlos Veliz over 9 years ago
Close

Introduction to Java Security

Question 1 of 10

1

It is part of Core Java 2 Security Architecture:

Select one of the following:

  • Message Authentication Codes

  • Class Loader

  • Standard Algorithms

  • Digital Signatures

  • Key Generators and key Factories

Explanation

Question 2 of 10

1

Mark the correct description that corresponds to the JCE abbreviation:

Select one of the following:

  • Java Cryptographic Extension

  • Java Secure Socket Extension

  • Java Characters Encoding

  • Java Authenticacion and Authorization Services

  • None of the above

Explanation

Question 3 of 10

1

Which of the following statements does not correspond to a feature of the Java Virtual Machine?

Select one of the following:

  • Is an interpreter that implements bytecode (.class file)

  • Produce the binary code according to the specific instruction lengths of the plataform, that is the reason Java programs are plataform independet

  • Interprets bycode and gives instructions to operatings system calls

  • Imitates the actual Java processor that emulates the CPU of the host machine

  • Provides the classes necessary to create an applet and the classes an applet uses to communicate with its applet context

Explanation

Question 4 of 10

1

JVM starts by loading classes using class loaders such as:

Select one of the following:

  • Bootstrap Class Loader

  • Extension Class Loader

  • system Class Loader

  • All of the above

  • None of the above

Explanation

Question 5 of 10

1

A statement is not part of the 4 steps the bycode verifier:

Select one of the following:

  • The class file should have the basic format of a class file()

  • bycode verfier cannot be access by Java users or programmers

  • Adictional verification can be done without looking at the code array of the code attribute

  • Check the code array of the code attribute: bycode verifier

  • Perform the test delayed for efficiency reasons in pass 3

Explanation

Question 6 of 10

1

Some of the java security frameworks are:

Select one of the following:

  • 1) JAAS

  • 2) JCE

  • 3) Java SASL API

  • 4) 1 and 3

  • 5) 2 and 3

Explanation

Question 7 of 10

1

Mainly uses kerberos protocol for token based network authentication:

Select one of the following:

  • JSSE

  • JGSS

  • JCE

  • Java SASL API

  • None of the above

Explanation

Question 8 of 10

1

Uses various protocols such as IMAP, LDAP for authentication and providing security layer for the communications:

Select one of the following:

  • JCE

  • JAAS

  • Java SASL API

  • JCA

  • GSS

Explanation

Question 9 of 10

1

Provides the Java version SSL and TLS protocols:

Select one of the following:

  • JSSE

  • JCE

  • Java SASL API

  • JGSS

  • All of the above

Explanation

Question 10 of 10

1

According to IBM, which of the following statements is the highest relative cost of fixing defects?

Select one of the following:

  • Testing

  • Design

  • Implementation

  • Maintenance

  • None of the above

Explanation