0

Windows Application Security

Description: Windows application security Unix/Linux and WindowsProgrammingProgramming
Number of Questions: 15
Created by:
Tags: Windows application security Unix/Linux and Windows Programming
Attempted 0/15 Correct 0 Score 0

Which of the following accesses the managed version of the Rijndael algorithm?

  1. Rijndael

  2. RijndaelManaged Transform

  3. RijndaelManaged

  4. ProtectedData

  5. RandomNumber Generator


Correct Option: C
Explanation:

It accesses the managed version of Rijndael algorithm.

Which of the following is a read only string property that holds the method that threw the exception?

  1. InnerException

  2. TargetSite

  3. XmlException

  4. DataException

  5. HelpLink


Correct Option: B
Explanation:

A read only string property that holds the method that threw threw the exception.

Which among the following represents a cryptographic object identifier?

  1. ProtectedMemory

  2. ProtectedData

  3. OIDEnumerated

  4. OidCollection

  5. Oid


Correct Option: E
Explanation:

It represents a cryptographic object identifier.

Which of the following manages the allocation and release of memory for your application?

  1. .Net Framework garbage collector

  2. .Net FCL

  3. Common language runtime

  4. Web form

  5. Windows form


Correct Option: A
Explanation:

It manages the allocation and release of memory for your application.

Which of the following computes the RIPEMD160 hash for the input data using the managed library?

  1. RandomNumber generator

  2. OidCollection

  3. ProtectedMemory

  4. RIPEMD160

  5. RIPEMD160Managed


Correct Option: E
Explanation:

It computes the RIPEMD160 hash for the input data using the managed library.

Which among the following represents the base class, from which all implementation of the RSA algorithm inherit?

  1. RSACryptoService Provider

  2. RSA

  3. Rijndael

  4. Oid

  5. ProtectedData


Correct Option: B
Explanation:

It represents the base class from which all implementations of the RSA algorithm inherit.

Which of the following is generated, when a call to an object method is inappropriate because of the object's state?

  1. DataException

  2. InvalidOperationException

  3. XmlException

  4. InnerException

  5. Helplink


Correct Option: B
Explanation:

It is generated when a call to an object method is inappropriate because of the object's state.

Which of the following implements a cryptographic random number generator using the implementation provided by the CSP?

  1. RNGCryptoService provider

  2. Random number generator

  3. OidCollection

  4. Rijndael

  5. ProtectedData


Correct Option: A
Explanation:

It implements a cryptographic random number generator using the implementation provided by the CSP.

Which of the following returns the first exception into the chain in .Net applications?

  1. InnerException

  2. DataException

  3. XmlException

  4. GetBaseException

  5. StackTrace


Correct Option: D
Explanation:

It returns the first exception in the chain in .Net applications.

Which of the following exception class properties provides a string that contains a description of errors, suitable for displaying to users in .Net?

  1. Helplink

  2. Message

  3. StackTrace

  4. TargetSite

  5. DataException


Correct Option: B
Explanation:

A string that contains a description of the error, suitable for displaying to users

Which of the following creates the PKCS#1key exchange data using RSA?

  1. RSACryptoService Provider

  2. RSAPKCS1KeyExchangeDeformatter

  3. RSAPKCS1Key ExchangeFormatter

  4. RijndaelManaged Transform

  5. ProtectedMemory


Correct Option: C
Explanation:

It creates the PKCS#1key exchange data using RSA.

Which of the following exception class properties provide a string containing the name of an object that generated the error in .Net?

  1. TargetSite

  2. InnerException

  3. HelpLink

  4. Source

  5. XmlException


Correct Option: D
Explanation:

A string containing the name of an object that generated the error

Which of the following verifies an RSA PKCS#1 version 1.5 signature in .Net security?

  1. RSAPKCS1KeyExchangeDeformatter

  2. RSAPKCS1Signature Deformatter

  3. RSAPKCS1Signature Formatter

  4. RSACryptoService Provider

  5. ProtectedData


Correct Option: B
Explanation:

It verifies an RSA PKCS#1 version 1.5 signature.

Which of the following begins a section of code, where an exception might be generated from a code error?

  1. Catch

  2. Finally

  3. Try

  4. InnerException

  5. TargetSite


Correct Option: C
Explanation:

It begins a section of code in which an exception might be generated from a code error.

Which of the following computes the SHA1 hash value for the input data using the implementation provided by the CSP?

  1. SHA1

  2. SHA1Cng

  3. SHA1CryptoService provider

  4. OidCollection

  5. RandomNumber generator


Correct Option: C
Explanation:

It computes the SHA1 hash value for the input data using the implementation provided by the CSP.

- Hide questions