Introduction to Java Security

Descrição

Introduction to Java Security
Carlos Veliz
Quiz por Carlos Veliz, atualizado more than 1 year ago
Carlos Veliz
Criado por Carlos Veliz mais de 9 anos atrás
221
0

Resumo de Recurso

Questão 1

Questão
It is part of Core Java 2 Security Architecture:
Responda
  • Message Authentication Codes
  • Class Loader
  • Standard Algorithms
  • Digital Signatures
  • Key Generators and key Factories

Questão 2

Questão
Mark the correct description that corresponds to the JCE abbreviation:
Responda
  • Java Cryptographic Extension
  • Java Secure Socket Extension
  • Java Characters Encoding
  • Java Authenticacion and Authorization Services
  • None of the above

Questão 3

Questão
Which of the following statements does not correspond to a feature of the Java Virtual Machine?
Responda
  • Is an interpreter that implements bytecode (.class file)
  • Produce the binary code according to the specific instruction lengths of the plataform, that is the reason Java programs are plataform independet
  • Interprets bycode and gives instructions to operatings system calls
  • Imitates the actual Java processor that emulates the CPU of the host machine
  • Provides the classes necessary to create an applet and the classes an applet uses to communicate with its applet context

Questão 4

Questão
JVM starts by loading classes using class loaders such as:
Responda
  • Bootstrap Class Loader
  • Extension Class Loader
  • system Class Loader
  • All of the above
  • None of the above

Questão 5

Questão
A statement is not part of the 4 steps the bycode verifier:
Responda
  • The class file should have the basic format of a class file()
  • bycode verfier cannot be access by Java users or programmers
  • Adictional verification can be done without looking at the code array of the code attribute
  • Check the code array of the code attribute: bycode verifier
  • Perform the test delayed for efficiency reasons in pass 3

Questão 6

Questão
Some of the java security frameworks are:
Responda
  • 1) JAAS
  • 2) JCE
  • 3) Java SASL API
  • 4) 1 and 3
  • 5) 2 and 3

Questão 7

Questão
Mainly uses kerberos protocol for token based network authentication:
Responda
  • JSSE
  • JGSS
  • JCE
  • Java SASL API
  • None of the above

Questão 8

Questão
Uses various protocols such as IMAP, LDAP for authentication and providing security layer for the communications:
Responda
  • JCE
  • JAAS
  • Java SASL API
  • JCA
  • GSS

Questão 9

Questão
Provides the Java version SSL and TLS protocols:
Responda
  • JSSE
  • JCE
  • Java SASL API
  • JGSS
  • All of the above

Questão 10

Questão
According to IBM, which of the following statements is the highest relative cost of fixing defects?
Responda
  • Testing
  • Design
  • Implementation
  • Maintenance
  • None of the above

Semelhante

Java Concurrency and Session Management
Carlos Veliz
Java Mix Test 42p
Carlos Veliz
Authentication and Authorization
Carlos Veliz
ECSP JAVA: JAAS
Carlos Veliz
Java Application Vulnerabilities
Carlos Veliz
Criptography
Carlos Veliz
Java - Mix
Carlos Veliz
Java Concurrency and Session Management
Jose Luis Vasquez Galvez
Java Mix Test 42p
Jose Luis Vasquez Galvez
Redação Oficial
Lavs Agah
Contextualização Aula 03 - Desenvolvimento e Sustentabilidade Ambiental - Medicina
Jéssica Meireles