Exam 6: Java Api-Level Security Features
Exam 1: Introduction to Security Concepts42 Questions
Exam 2: Software Engineering and Security42 Questions
Exam 3: Essential Public Key Infrastructure42 Questions
Exam 4: Trust and Threat Model42 Questions
Exam 5: Java Programming Security42 Questions
Exam 6: Java Api-Level Security Features42 Questions
Exam 7: Authentication and Authorization With Java42 Questions
Exam 8: Secure Programming With C and Openssl42 Questions
Exam 9: Secure Programming With Perl42 Questions
Exam 10: Identity Management42 Questions
Exam 11: Security Topics42 Questions
Select questions type
____ implements Java technology version of secure sockets layer (SSL) and transport layer security (TLS) protocols.
Free
(Multiple Choice)
5.0/5
(32)
Correct Answer:
A
PK enables secure communication between strangers.
Free
(True/False)
4.8/5
(39)
Correct Answer:
True
Briefly describe the java.security.acl class.
Free
(Essay)
4.7/5
(40)
Correct Answer:
This is a superseded package. In other words, the classes and interfaces in this package have been superseded and replaced by classes in the java.security package and the functionality from java.security.Permission.
What are the message digest algorithms supported by the Java MessageDigest class?
(Essay)
4.9/5
(34)
Java cryptography architecture ( JCA) is first introduced in ____.
(Multiple Choice)
4.7/5
(30)
____________________ are an encoding method for a data object such as an X.509 certificate.
(Short Answer)
4.8/5
(31)
____ is a protocol for establishing a secure communication channel between a client and a server.
(Multiple Choice)
4.8/5
(35)
If randomness is needed to enhance security in generating a message digest, a key can be used as part of the message digest generation. This key using algorithm is known as a(n) ____.
(Multiple Choice)
4.9/5
(31)
Message digests such as MD2 and MD5 can ensure integrity and confidentiality of a message.
(True/False)
4.9/5
(32)
The ____ package is composed of mostly abstract classes and interfaces that encapsulate security concepts to provide a configurable, fine-grained access-control security architecture.
(Multiple Choice)
4.8/5
(24)
A ____, also called certificate chain, is an ordered list of certificates that is used to securely establish the mapping between a public key and a subject.
(Multiple Choice)
4.7/5
(47)
The ____ command line tool is a built-in application for keys and certificates management in Java.
(Multiple Choice)
4.8/5
(36)
____________________ is the fixed-length result of a one-way hash of the contents in the message, similar to a cryptographic checksum or cyclic redundancy check (CRC).
(Short Answer)
4.8/5
(30)
____ allow a user to control how encryption will work in a given cipher.
(Multiple Choice)
4.9/5
(38)
The ____ class provides the functionality of a message digest algorithm.
(Multiple Choice)
4.8/5
(29)
____________________ is the core package that provides the classes and interfaces for the security framework.
(Short Answer)
4.9/5
(25)
The basic security in ____ comes from the fact it is relatively easy to multiply two huge prime numbers together to obtain their product, but it is computationally difficult to go the reverse direction.
(Multiple Choice)
4.8/5
(38)
____________________ is a framework for accessing and developing cryptographic functionality for the Java platform.
(Short Answer)
4.9/5
(28)
Showing 1 - 20 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)