Windows Application Security
Description: Windows application security Unix/Linux and WindowsProgrammingProgramming | |
Number of Questions: 15 | |
Created by: Shankara Prabhu | |
Tags: Windows application security Unix/Linux and Windows Programming |
Which of the following accesses the managed version of the Rijndael algorithm?
Which of the following is a read only string property that holds the method that threw the exception?
Which among the following represents a cryptographic object identifier?
Which of the following manages the allocation and release of memory for your application?
Which of the following computes the RIPEMD160 hash for the input data using the managed library?
Which among the following represents the base class, from which all implementation of the RSA algorithm inherit?
Which of the following is generated, when a call to an object method is inappropriate because of the object's state?
Which of the following implements a cryptographic random number generator using the implementation provided by the CSP?
Which of the following returns the first exception into the chain in .Net applications?
Which of the following exception class properties provides a string that contains a description of errors, suitable for displaying to users in .Net?
Which of the following creates the PKCS#1key exchange data using RSA?
Which of the following exception class properties provide a string containing the name of an object that generated the error in .Net?
Which of the following verifies an RSA PKCS#1 version 1.5 signature in .Net security?
Which of the following begins a section of code, where an exception might be generated from a code error?
Which of the following computes the SHA1 hash value for the input data using the implementation provided by the CSP?