Deck 6: Java Api-Level Security Features
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 6: Java Api-Level Security Features
1
8)The ____ package is composed of mostly abstract classes and interfaces that encapsulate security concepts to provide a configurable, fine-grained access-control security architecture.
A) java.security.provider
B) java.jca
C) java.security.jca
D) java.security
A) java.security.provider
B) java.jca
C) java.security.jca
D) java.security
D
2
10)____ implements Java technology version of secure sockets layer (SSL) and transport layer security (TLS) protocols.
A) JSSE
B) java.pkcs
C) java.security.spec
D) java.security.cert
A) JSSE
B) java.pkcs
C) java.security.spec
D) java.security.cert
A
3
18)A ____ is the instruction that describes the set of operations to be performed on the given input in order to produce the cryptographic output.
A) mode
B) transformation
C) provider
D) control
A) mode
B) transformation
C) provider
D) control
B
4
3)Before JDK 1.4, certification path validation was done implicitly in signature and signed JAR file verification.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
17)____ is a block cipher mode in which every plaintext block encrypted with a block cipher is first exclusive-ORed with the previous ciphertext block.
A) CBC
B) ECB
C) OFB
D) CFB
A) CBC
B) ECB
C) OFB
D) CFB
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
20)The basic security in ____ comes from the fact it is relatively easy to multiply two huge prime numbers together to obtain their product, but it is computationally difficult to go the reverse direction.
A) ElGamal
B) DES
C) IDEA
D) RSA
A) ElGamal
B) DES
C) IDEA
D) RSA
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
16)____ is a block cipher mode in which each possible block of plaintext has a defined corresponding ciphertext value.
A) CBC
B) CFB
C) OFB
D) ECB
A) CBC
B) CFB
C) OFB
D) ECB
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
6)Java cryptography architecture ( JCA) is first introduced in ____.
A) JDK 1.0
B) JDK 1.1
C) JDK 1.4
D) JDK 5.0
A) JDK 1.0
B) JDK 1.1
C) JDK 1.4
D) JDK 5.0
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
4)Message digests such as MD2 and MD5 can ensure integrity and confidentiality of a message.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
5)PK enables secure communication between strangers.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
2)JCA provides by default a concrete implementation of the java.security package.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
15)____ allow a user to control how encryption will work in a given cipher.
A) Padding
B) Modes
C) Message digests
D) MACs
A) Padding
B) Modes
C) Message digests
D) MACs
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
12)A ____ is used to ensure the integrity of the message when the message is sent from one location to another.
A) certificate path
B) digital signature
C) digital certificate
D) message digest
A) certificate path
B) digital signature
C) digital certificate
D) message digest
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
19)____ cryptography enables exchange of secure messages between parties without prior arrangement to exchange keys.
A) Public key
B) Secret key
C) Symmetric
D) Private key
A) Public key
B) Secret key
C) Symmetric
D) Private key
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
7)A(n) ____ refers to a set of packages that supply a concrete implementation of a subset of the cryptography functions used by the Security API.
A) provider
B) extensible access control
C) cryptographic service control
D) consumer
A) provider
B) extensible access control
C) cryptographic service control
D) consumer
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
1)JCA includes a provider architecture that allows multiple and interoperable cryptography implementations.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
14)If randomness is needed to enhance security in generating a message digest, a key can be used as part of the message digest generation. This key using algorithm is known as a(n) ____.
A) HCRC
B) MD
C) MAC
D) CRC
A) HCRC
B) MD
C) MAC
D) CRC
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
11)____ API is a set of functions for building and validating a certification path.
A) java.security.cert
B) JSSE
C) CertPath
D) java.security
A) java.security.cert
B) JSSE
C) CertPath
D) java.security
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
9)____ is a data-encoding scheme that enables binary-encoded data to be converted to printable ASCII characters.
A) PKCS #8
B) PKCS #11
C) Base64
D) DER
A) PKCS #8
B) PKCS #11
C) Base64
D) DER
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
13)The ____ class provides the functionality of a message digest algorithm.
A) SHA-1
B) MessageDigest
C) java.CRC
D) java.security.MD5
A) SHA-1
B) MessageDigest
C) java.CRC
D) java.security.MD5
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
31)____________________ is the fixed-length result of a one-way hash of the contents in the message, similar to a cryptographic checksum or cyclic redundancy check (CRC).
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
35)Briefly describe the java.security.cert class.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
25)____ is a protocol for establishing a secure communication channel between a client and a server.
A) HTTP
B) SHA
C) RSA
D) SSL
A) HTTP
B) SHA
C) RSA
D) SSL
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
29)A(n) ____________________ is a transparent representation of the key material that makes up a key.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
23)The ____ command line tool is a built-in application for keys and certificates management in Java.
A) keytool
B) certtool
C) keystore
D) keygen
A) keytool
B) certtool
C) keystore
D) keygen
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
34)Briefly describe the java.security.acl class.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
24)A ____, also called certificate chain, is an ordered list of certificates that is used to securely establish the mapping between a public key and a subject.
A) self-signed path
B) certificate verification
C) certification path
D) CA's path
A) self-signed path
B) certificate verification
C) certification path
D) CA's path
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
33)Briefly describe the Java security API.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
36)Briefly describe the java.security.interfaces.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
39)How is the confidentiality of a message kept using secret key cryptography?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
22)Technically, a ____ is a data structure used in a public key system to bind a particular, authenticated individual to a particular public key.
A) digital certificate
B) digital signature
C) message digest
D) MAC
A) digital certificate
B) digital signature
C) message digest
D) MAC
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
37)Compare the Base64 and DER encoding formats.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
28)____________________ is the core package that provides the classes and interfaces for the security framework.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
40)What are the symmetric encryption modes supported by J2SE 5?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
26)____ provides a framework and a Java implementation for the SSL and TLS protocols.
A) java.security.spec
B) JSSE
C) Java Cipher class
D) java.security.cert
A) java.security.spec
B) JSSE
C) Java Cipher class
D) java.security.cert
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
21)____ provide(s) a bit pattern (the signature) that proves that a message came from a given party.
A) Message digests
B) Digital certificates
C) Digital signatures
D) RSA
A) Message digests
B) Digital certificates
C) Digital signatures
D) RSA
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
27)____________________ is a framework for accessing and developing cryptographic functionality for the Java platform.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
30)____________________ are an encoding method for a data object such as an X.509 certificate.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
38)What are the message digest algorithms supported by the Java MessageDigest class?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
41)What are the padding methods supported by J2SE 5?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
42)How does public key cryptography work?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck