Cryptosystem Security
Description: gate | |
Number of Questions: 15 | |
Created by: Naresh Verma | |
Tags: gate Network Security and Firewall |
Which of the following cryptographic classes represents a group of object identifier objects?
In which of the following authorisations are ACL permissions verified for the user's window's identity?
Which of the following cryptographic classes creates a digital signature algorithm signature?
Which of the following classes represents the abstract base class from which all implementations of the digital signature algorithm must inherit?
Which of the following cryptographic classes accesses the cryptography configuration information?
Which of the following cryptographic classes provides an abstract base class that elliptic curve Diffie-Hellman algorithm implementations can derive from?
Which of the following cryptography classes represents abstract syntax one (ASN.1)-encoded data?
Which of the following map(s) data from any length to a fixed length byte sequence?
Which of the following cryptography classes verifies a digital signature algorithm PKCS#1 v1.5 signature?
Which of the following .NET cryptographic classes specifies an ECDH public key for use with the ECDiffieHellmanCng class?
Abnormal conditions are reported by
Which of the following cryptography classes computes the secure hash algorithm 384 hash for the input data?
Which of the following security mechanisms encompasses the dealing between credit card holders, payment processing establishments, public key certificate authorities, etc.?
Which of the following uses hierarchically validated certificates, usually represented in X.509 format for key exchange?
In which of the following characteristics of security policy should the policy either apply to or explicitly exclude all possible situations?