Introduction to Java Security

Descripción

Introduction to Java Security
Carlos Veliz
Test por Carlos Veliz, actualizado hace más de 1 año
Carlos Veliz
Creado por Carlos Veliz hace más de 9 años
221
0

Resumen del Recurso

Pregunta 1

Pregunta
It is part of Core Java 2 Security Architecture:
Respuesta
  • Message Authentication Codes
  • Class Loader
  • Standard Algorithms
  • Digital Signatures
  • Key Generators and key Factories

Pregunta 2

Pregunta
Mark the correct description that corresponds to the JCE abbreviation:
Respuesta
  • Java Cryptographic Extension
  • Java Secure Socket Extension
  • Java Characters Encoding
  • Java Authenticacion and Authorization Services
  • None of the above

Pregunta 3

Pregunta
Which of the following statements does not correspond to a feature of the Java Virtual Machine?
Respuesta
  • Is an interpreter that implements bytecode (.class file)
  • Produce the binary code according to the specific instruction lengths of the plataform, that is the reason Java programs are plataform independet
  • Interprets bycode and gives instructions to operatings system calls
  • Imitates the actual Java processor that emulates the CPU of the host machine
  • Provides the classes necessary to create an applet and the classes an applet uses to communicate with its applet context

Pregunta 4

Pregunta
JVM starts by loading classes using class loaders such as:
Respuesta
  • Bootstrap Class Loader
  • Extension Class Loader
  • system Class Loader
  • All of the above
  • None of the above

Pregunta 5

Pregunta
A statement is not part of the 4 steps the bycode verifier:
Respuesta
  • The class file should have the basic format of a class file()
  • bycode verfier cannot be access by Java users or programmers
  • Adictional verification can be done without looking at the code array of the code attribute
  • Check the code array of the code attribute: bycode verifier
  • Perform the test delayed for efficiency reasons in pass 3

Pregunta 6

Pregunta
Some of the java security frameworks are:
Respuesta
  • 1) JAAS
  • 2) JCE
  • 3) Java SASL API
  • 4) 1 and 3
  • 5) 2 and 3

Pregunta 7

Pregunta
Mainly uses kerberos protocol for token based network authentication:
Respuesta
  • JSSE
  • JGSS
  • JCE
  • Java SASL API
  • None of the above

Pregunta 8

Pregunta
Uses various protocols such as IMAP, LDAP for authentication and providing security layer for the communications:
Respuesta
  • JCE
  • JAAS
  • Java SASL API
  • JCA
  • GSS

Pregunta 9

Pregunta
Provides the Java version SSL and TLS protocols:
Respuesta
  • JSSE
  • JCE
  • Java SASL API
  • JGSS
  • All of the above

Pregunta 10

Pregunta
According to IBM, which of the following statements is the highest relative cost of fixing defects?
Respuesta
  • Testing
  • Design
  • Implementation
  • Maintenance
  • None of the above
Mostrar resumen completo Ocultar resumen completo

Similar

Java Concurrency and Session Management
Carlos Veliz
Java Mix Test 42p
Carlos Veliz
Authentication and Authorization
Carlos Veliz
ECSP JAVA: JAAS
Carlos Veliz
Java Application Vulnerabilities
Carlos Veliz
Criptography
Carlos Veliz
Java - Mix
Carlos Veliz
Java Concurrency and Session Management
Jose Luis Vasquez Galvez
Java Mix Test 42p
Jose Luis Vasquez Galvez
Freud: Pasión Secreta
Cesar_Adolfo
ORGANIGRAMA
Sebastian Valencia