Exam 6: Java Api-Level Security Features
Exam 1: Introduction to Security Concepts42 Questions
Exam 2: Software Engineering and Security42 Questions
Exam 3: Essential Public Key Infrastructure42 Questions
Exam 4: Trust and Threat Model42 Questions
Exam 5: Java Programming Security42 Questions
Exam 6: Java Api-Level Security Features42 Questions
Exam 7: Authentication and Authorization With Java42 Questions
Exam 8: Secure Programming With C and Openssl42 Questions
Exam 9: Secure Programming With Perl42 Questions
Exam 10: Identity Management42 Questions
Exam 11: Security Topics42 Questions
Select questions type
____ provides a framework and a Java implementation for the SSL and TLS protocols.
(Multiple Choice)
4.9/5
(33)
A ____ is the instruction that describes the set of operations to be performed on the given input in order to produce the cryptographic output.
(Multiple Choice)
4.8/5
(33)
____ provide(s) a bit pattern (the signature) that proves that a message came from a given party.
(Multiple Choice)
4.8/5
(42)
JCA provides by default a concrete implementation of the java.security package.
(True/False)
4.9/5
(25)
Technically, a ____ is a data structure used in a public key system to bind a particular, authenticated individual to a particular public key.
(Multiple Choice)
4.7/5
(35)
____ is a block cipher mode in which every plaintext block encrypted with a block cipher is first exclusive-ORed with the previous ciphertext block.
(Multiple Choice)
4.9/5
(31)
____ is a data-encoding scheme that enables binary-encoded data to be converted to printable ASCII characters.
(Multiple Choice)
4.9/5
(31)
____ cryptography enables exchange of secure messages between parties without prior arrangement to exchange keys.
(Multiple Choice)
4.8/5
(40)
A ____ is used to ensure the integrity of the message when the message is sent from one location to another.
(Multiple Choice)
4.8/5
(31)
____ API is a set of functions for building and validating a certification path.
(Multiple Choice)
4.8/5
(36)
____ is a block cipher mode in which each possible block of plaintext has a defined corresponding ciphertext value.
(Multiple Choice)
4.9/5
(36)
How is the confidentiality of a message kept using secret key cryptography?
(Essay)
4.7/5
(32)
A(n) ____ refers to a set of packages that supply a concrete implementation of a subset of the cryptography functions used by the Security API.
(Multiple Choice)
4.7/5
(34)
JCA includes a provider architecture that allows multiple and interoperable cryptography implementations.
(True/False)
5.0/5
(27)
A(n) ____________________ is a transparent representation of the key material that makes up a key.
(Short Answer)
4.8/5
(32)
Match each item with a statement below:
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(37)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)