Check the statement that is not part of the design principles for the JCA and JCE:
Algorithm Independence
Implementation Independence
Algorithm Interoperability
Algorithm Extensibility
Implementation Interoperability
Java Cryptography Architecture Engine not includes:
CertStore
CertificateFactory
AlgorithmParameters
Key aggrement
Key Store
What is the correct order of steps to implement the methods of encryption and decryption?
Symetric Key Generation - Encryption - Decryption
Encryption - Symetric Key Generation - Decryption
Encryption - Decryption - Symetric Key Generation
Encryption - Cipher - Decryption
None of the above
In the Cipher class is a method that retrieves block size.
GetAlgorithm()
getblocksize()
Getparameters()
getblocklength()
Dofinal()
Methods: Inti, getParameter and getIV, described:
Creating a cipher object
Encrypting and Decrypting data
Managing Algorithm Parameters
Cipher Output Considerations
Initializing a cipher object
"Class supports standard socket methods to secure socket communication". This feature belongs to:
java.net and javax.net.ssl
javax.net.ssl.SSLSocket
java.net.socket
java.net.ssl.SSLSocket
javax.net.socket
Check the statement that is not part of the elements of key management system include:
Keys
Certificates
Server
identities
All of the above
Poor key Management Threats not include:
Mishandling of Keys
Unauthorized use of public or secret keys
Incorrect implementation of key Generation
Confidentiality Compromise
Using existing cryptographic libraries
Select the tool that does not belong to Java cryptographic tools:
jCryption
PrimeInk Java
jPdfSign
Cryptix
Jimmix
Not a Certification Authority:
www.verisign.com
www.comodo.com
www.oracle.com
www.entrust.net
www.thawte.com