Exam 6: Java Api-Level Security Features

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____ provides a framework and a Java implementation for the SSL and TLS protocols.

(Multiple Choice)
4.9/5
(33)

A ____ is the instruction that describes the set of operations to be performed on the given input in order to produce the cryptographic output.

(Multiple Choice)
4.8/5
(33)

____ provide(s) a bit pattern (the signature) that proves that a message came from a given party.

(Multiple Choice)
4.8/5
(42)

JCA provides by default a concrete implementation of the java.security package.

(True/False)
4.9/5
(25)

Technically, a ____ is a data structure used in a public key system to bind a particular, authenticated individual to a particular public key.

(Multiple Choice)
4.7/5
(35)

____ is a block cipher mode in which every plaintext block encrypted with a block cipher is first exclusive-ORed with the previous ciphertext block.

(Multiple Choice)
4.9/5
(31)

____ is a data-encoding scheme that enables binary-encoded data to be converted to printable ASCII characters.

(Multiple Choice)
4.9/5
(31)

What are the padding methods supported by J2SE 5?

(Essay)
4.8/5
(24)

____ cryptography enables exchange of secure messages between parties without prior arrangement to exchange keys.

(Multiple Choice)
4.8/5
(40)

A ____ is used to ensure the integrity of the message when the message is sent from one location to another.

(Multiple Choice)
4.8/5
(31)

Briefly describe the java.security.cert class.

(Essay)
4.7/5
(36)

____ API is a set of functions for building and validating a certification path.

(Multiple Choice)
4.8/5
(36)

Briefly describe the java.security.interfaces.

(Essay)
4.7/5
(40)

____ is a block cipher mode in which each possible block of plaintext has a defined corresponding ciphertext value.

(Multiple Choice)
4.9/5
(36)

How is the confidentiality of a message kept using secret key cryptography?

(Essay)
4.7/5
(32)

How does public key cryptography work?

(Essay)
4.9/5
(31)

A(n) ____ refers to a set of packages that supply a concrete implementation of a subset of the cryptography functions used by the Security API.

(Multiple Choice)
4.7/5
(34)

JCA includes a provider architecture that allows multiple and interoperable cryptography implementations.

(True/False)
5.0/5
(27)

A(n) ____________________ is a transparent representation of the key material that makes up a key.

(Short Answer)
4.8/5
(32)
Match each item with a statement below:
a set of rules for encoding ASN.1 objects into a sequence of octets
Padding
provides interfaces and classes for key specifications and algorithm parameter specifications
Secret key encryption
a language for abstractly describing messages to be exchanged over a variety of networks
java.security.cert
Correct Answer:
Verified
Premises:
Responses:
a set of rules for encoding ASN.1 objects into a sequence of octets
Padding
provides interfaces and classes for key specifications and algorithm parameter specifications
Secret key encryption
a language for abstractly describing messages to be exchanged over a variety of networks
java.security.cert
provides verification of the original content of the message
Message digest
provides the functionality of a cryptographic cipher for encryption and decryption
JCA
provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
ASN
also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
Cipher class
additional data added to plaintext in order to make it divisible by the cipher's block size
java.security.spec
considered the core API set of the Java programming that is built around the java.security package and its subpackages
DER
(Matching)
4.8/5
(37)
Showing 21 - 40 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)