null
US
Entrar
Registre-se gratuitamente
Registre-se
Detectamos que o JavaScript não está habilitado no teu navegador. Habilite o Javascript para o funcionamento correto do nosso site. Por favor, leia os
Termos e Condições
para mais informações.
Próximo
Copiar e Editar
Você deve estar logado para concluir esta ação!
Inscreva-se gratuitamente
3001468
Introduction to Java Security
Descrição
Introduction to Java Security
Sem etiquetas
ecsp java
java security
test 8
Quiz por
Carlos Veliz
, atualizado more than 1 year ago
Mais
Menos
Criado por
Carlos Veliz
mais de 9 anos atrás
221
0
0
Resumo de Recurso
Questão 1
Questão
It is part of Core Java 2 Security Architecture:
Responda
Message Authentication Codes
Class Loader
Standard Algorithms
Digital Signatures
Key Generators and key Factories
Questão 2
Questão
Mark the correct description that corresponds to the JCE abbreviation:
Responda
Java Cryptographic Extension
Java Secure Socket Extension
Java Characters Encoding
Java Authenticacion and Authorization Services
None of the above
Questão 3
Questão
Which of the following statements does not correspond to a feature of the Java Virtual Machine?
Responda
Is an interpreter that implements bytecode (.class file)
Produce the binary code according to the specific instruction lengths of the plataform, that is the reason Java programs are plataform independet
Interprets bycode and gives instructions to operatings system calls
Imitates the actual Java processor that emulates the CPU of the host machine
Provides the classes necessary to create an applet and the classes an applet uses to communicate with its applet context
Questão 4
Questão
JVM starts by loading classes using class loaders such as:
Responda
Bootstrap Class Loader
Extension Class Loader
system Class Loader
All of the above
None of the above
Questão 5
Questão
A statement is not part of the 4 steps the bycode verifier:
Responda
The class file should have the basic format of a class file()
bycode verfier cannot be access by Java users or programmers
Adictional verification can be done without looking at the code array of the code attribute
Check the code array of the code attribute: bycode verifier
Perform the test delayed for efficiency reasons in pass 3
Questão 6
Questão
Some of the java security frameworks are:
Responda
1) JAAS
2) JCE
3) Java SASL API
4) 1 and 3
5) 2 and 3
Questão 7
Questão
Mainly uses kerberos protocol for token based network authentication:
Responda
JSSE
JGSS
JCE
Java SASL API
None of the above
Questão 8
Questão
Uses various protocols such as IMAP, LDAP for authentication and providing security layer for the communications:
Responda
JCE
JAAS
Java SASL API
JCA
GSS
Questão 9
Questão
Provides the Java version SSL and TLS protocols:
Responda
JSSE
JCE
Java SASL API
JGSS
All of the above
Questão 10
Questão
According to IBM, which of the following statements is the highest relative cost of fixing defects?
Responda
Testing
Design
Implementation
Maintenance
None of the above
Quer criar seus próprios
Quizzes
gratuitos
com a GoConqr?
Saiba mais
.
Semelhante
Java Concurrency and Session Management
Carlos Veliz
Java Mix Test 42p
Carlos Veliz
Authentication and Authorization
Carlos Veliz
ECSP JAVA: JAAS
Carlos Veliz
Java Application Vulnerabilities
Carlos Veliz
Criptography
Carlos Veliz
Java - Mix
Carlos Veliz
Java Concurrency and Session Management
Jose Luis Vasquez Galvez
Java Mix Test 42p
Jose Luis Vasquez Galvez
Redação Oficial
Lavs Agah
Contextualização Aula 03 - Desenvolvimento e Sustentabilidade Ambiental - Medicina
Jéssica Meireles
Explore a Biblioteca