Criptography

Descrição

Criptography
Carlos Veliz
Quiz por Carlos Veliz, atualizado more than 1 year ago
Carlos Veliz
Criado por Carlos Veliz mais de 9 anos atrás
22
0

Resumo de Recurso

Questão 1

Questão
Check the statement that is not part of the design principles for the JCA and JCE:
Responda
  • Algorithm Independence
  • Implementation Independence
  • Algorithm Interoperability
  • Algorithm Extensibility
  • Implementation Interoperability

Questão 2

Questão
Java Cryptography Architecture Engine not includes:
Responda
  • CertStore
  • CertificateFactory
  • AlgorithmParameters
  • Key aggrement
  • Key Store

Questão 3

Questão
What is the correct order of steps to implement the methods of encryption and decryption?
Responda
  • Symetric Key Generation - Encryption - Decryption
  • Encryption - Symetric Key Generation - Decryption
  • Encryption - Decryption - Symetric Key Generation
  • Encryption - Cipher - Decryption
  • None of the above

Questão 4

Questão
In the Cipher class is a method that retrieves block size.
Responda
  • GetAlgorithm()
  • getblocksize()
  • Getparameters()
  • getblocklength()
  • Dofinal()

Questão 5

Questão
Methods: Inti, getParameter and getIV, described:
Responda
  • Creating a cipher object
  • Encrypting and Decrypting data
  • Managing Algorithm Parameters
  • Cipher Output Considerations
  • Initializing a cipher object

Questão 6

Questão
"Class supports standard socket methods to secure socket communication". This feature belongs to:
Responda
  • java.net and javax.net.ssl
  • javax.net.ssl.SSLSocket
  • java.net.socket
  • java.net.ssl.SSLSocket
  • javax.net.socket

Questão 7

Questão
Check the statement that is not part of the elements of key management system include:
Responda
  • Keys
  • Certificates
  • Server
  • identities
  • All of the above

Questão 8

Questão
Poor key Management Threats not include:
Responda
  • Mishandling of Keys
  • Unauthorized use of public or secret keys
  • Incorrect implementation of key Generation
  • Confidentiality Compromise
  • Using existing cryptographic libraries

Questão 9

Questão
Select the tool that does not belong to Java cryptographic tools:
Responda
  • jCryption
  • PrimeInk Java
  • jPdfSign
  • Cryptix
  • Jimmix

Questão 10

Questão
Not a Certification Authority:
Responda
  • www.verisign.com
  • www.comodo.com
  • www.oracle.com
  • www.entrust.net
  • www.thawte.com

Semelhante

Java Concurrency and Session Management
Carlos Veliz
Introduction to Java Security
Carlos Veliz
Java Mix Test 42p
Carlos Veliz
Authentication and Authorization
Carlos Veliz
ECSP JAVA: JAAS
Carlos Veliz
Java - Mix
Carlos Veliz
Java Application Vulnerabilities
Carlos Veliz
Java Concurrency and Session Management
Jose Luis Vasquez Galvez
Java Mix Test 42p
Jose Luis Vasquez Galvez
Princípios Administrativos (implícitos)
veleal
Sistema Reprodutor Masculino
Ana Inês Kruecck Quintas