0

Cryptosystem Security

Description: gate
Number of Questions: 15
Created by:
Tags: gate Network Security and Firewall
Attempted 0/15 Correct 0 Score 0

Which of the following cryptographic classes represents a group of object identifier objects?

  1. Oid

  2. OidCollection

  3. CngPropertyCollection

  4. OidEnumerator

  5. QueryString parameter


Correct Option: B
Explanation:

 It represents a group of object identifier objects.

In which of the following authorisations are ACL permissions verified for the user's window's identity?

  1. AesManaged

  2. URL authorisation

  3. File authorisation

  4. ProtectedMemory

  5. Symmetric cryptography


Correct Option: C
Explanation:

 In file authorisation, ACL permissions are verified for the user's window's identity.

Which of the following cryptographic classes creates a digital signature algorithm signature?

  1. Oid

  2. AsymmetricSignatureFormatter

  3. DSASignatureDeformatter

  4. DSACryptoServiceProvider

  5. DSASignatureFormatter


Correct Option: E
Explanation:

 It creates a digital signature algorithm signature.

Which of the following classes represents the abstract base class from which all implementations of the digital signature algorithm must inherit?

  1. DSASignatureDeformatter

  2. DES

  3. DSACryptoServiceProvider

  4. DSA

  5. ProtectedMemory


Correct Option: D
Explanation:

 It represents the abstract base class from which all implementations of the digital signature algorithm must inherit.

Which of the following cryptographic classes accesses the cryptography configuration information?

  1. CngProvider

  2. ProtectedMemory

  3. CryptoConfig

  4. CryptographicAttributeObject

  5. MD5Cng


Correct Option: C
Explanation:

 It accesses the cryptography configuration information.

Which of the following cryptographic classes provides an abstract base class that elliptic curve Diffie-Hellman algorithm implementations can derive from?

  1. ECDsaCng

  2. ECDiffieHellmanCng

  3. ProtectedData

  4. ECDiffieHellman

  5. Rijndael


Correct Option: D
Explanation:

 It provides an abstract base class that elliptic curve Diffie-Hellman algorithm implementations can derive from.

Which of the following cryptography classes represents abstract syntax one (ASN.1)-encoded data?

  1. Aes

  2. AsnEncodedDataCollection

  3. Oid

  4. AsnEncodedData

  5. ProtectedData


Correct Option: D
Explanation:

 It represents abstract syntax notation one(ASN.1)-encoded data.

Which of the following map(s) data from any length to a fixed length byte sequence?

  1. SHA256

  2. ProtectedData

  3. Cryptographic hashes

  4. Symmetric cryptography

  5. SHA512


Correct Option: C
Explanation:

They map data from any length to a fixed length byte sequence.

Which of the following cryptography classes verifies a digital signature algorithm PKCS#1 v1.5 signature?

  1. DSASignatureFormatter

  2. ProtectedMemory

  3. DSASignatureDeformatter

  4. RSAPKCS1SignatureFormatter

  5. DSA


Correct Option: C
Explanation:

 It verifies a digital signature algorithm PKCS#1 v1.5 signature.

Which of the following .NET cryptographic classes specifies an ECDH public key for use with the ECDiffieHellmanCng class?

  1. ECDiffieHellmanCng

  2. ProtectedData

  3. ECDiffieHellmanPublicKey

  4. ECDiffieHellmanCngPublicKey

  5. ECDsa


Correct Option: D
Explanation:

 This .NET cryptographic class specifies an ECDH public key for use with the ECDiffieHellmanCng class.

Abnormal conditions are reported by

  1. continuing attentions

  2. record protocol

  3. change cipherspec protocol

  4. alert protocol

  5. interception


Correct Option: D
Explanation:

SSL uses the alert protocol for reporting errors and abnormal conditions.

Which of the following cryptography classes computes the secure hash algorithm 384 hash for the input data?

  1. SHA256

  2. SHA384Cng

  3. SHA384

  4. QueryString parameter

  5. SHA384Managed


Correct Option: C
Explanation:

It computes the secure hash algorithm 384 hash for the input data.

Which of the following security mechanisms encompasses the dealing between credit card holders, payment processing establishments, public key certificate authorities, etc.?

  1. Message authentication code

  2. Stateful inspection firewall

  3. Secure electronic transaction

  4. Transport layer security

  5. ProtectedData


Correct Option: C
Explanation:

 This security mechanism encompasses the dealing between the credit card holders, payment processing establishments, the public key certificate authorities, etc.

Which of the following uses hierarchically validated certificates, usually represented in X.509 format for key exchange?

  1. DEK-info

  2. Key-info

  3. Digital signature

  4. Record protocol

  5. Secure multipurpose internet mail extension


Correct Option: E
Explanation:

 It uses hierarchically validated certificates, usually represented in X.509 format for key exchange.

In which of the following characteristics of security policy should the policy either apply to or explicitly exclude all possible situations?

  1. Understandable

  2. Coverage

  3. Correct

  4. Realism

  5. Complete


Correct Option: B
Explanation:

 Here, it must either apply to or explicitly exclude all possible situations.

- Hide questions