0

.Net Security Mechanism

Description: This test represents different firewalls, cryptographic classes etc........ related questions. This test is useful for the students who are preparing for GATE, Information technology and IT certified related exams.
Number of Questions: 15
Created by:
Tags: Dot net security mechanism Information Technology IT Certificate Programs
Attempted 0/15 Correct 0 Score 0

Which of the following .NET cryptographic classes decrypts optimal asymmetric encryption padding(OAEP) key exchange data?

  1. RSAPKCS1KeyExchangeFormatter

  2. RSAOAEPKeyExchangeFormatter

  3. RSAOAEPKeyExchangeDeformatter

  4. AsymmetricKeyExchangeDeformatter

  5. ProtectedData


Correct Option: C
Explanation:

This .NET cryptographic class decrypts optimal asymmetric encryption padding (OAEP) key exchange data.

Which of the following security mechanisms is a collection of security protocols and formats allowing consumers secure usage of the present credit card payment infrastructure over an exposed network?

  1. Secure electronic transaction

  2. Proc-Type

  3. Message integrity check

  4. Transport layer security

  5. Packet filtering gateway


Correct Option: A
Explanation:

This security mechanism is a collection of security protocols and formats allowing consumers secure usage of the present credit card payment infrastructure over an exposed network.

Which of the following .NET cryptographic classes decrypts the PKCS#1 key exchange data?

  1. RSAPKCS1KeyExchangeDeformatter

  2. RSAPKCS1SignatureDeformatter

  3. RSAPKCS1KeyExchangeFormatter

  4. AsymmetricKeyExchangeDeformatter

  5. ProtectedMemory


Correct Option: A
Explanation:

This .NET cryptographic class decrypts the PKCS#1 key exchange data.

Which of the following security techniques provides activities such as allowing text mode and simple graphics but disallows complex graphics, animation etc.?

  1. Non repudiation

  2. Transport layer security

  3. Message authentication code

  4. Guard

  5. Packet filtering gateway


Correct Option: D
Explanation:

This security technique provides activity such as allowing text mode and simple graphics but disallowing complex graphics, animation etc.

Which of the following security mechanisms provides several services on data received from the application layer?

  1. Packet filtering gateway

  2. Transport layer security

  3. Secure socket layer

  4. Message integrity check

  5. Sender authenticity


Correct Option: C
Explanation:

This security mechanism provides several services on data received from the application layer.

Which of the following .NET cryptographic classes creates an RSA PKCS#1 version 1.5 signature?

  1. ProtectedData

  2. AsymmetricSignatureFormatter

  3. RSAPKCS1KeyExchangeFormatter

  4. RSAPKCS1SignatureFormatter

  5. RSAPKCS1SignatureDeformatter


Correct Option: D
Explanation:

This .NET cryptographic class creates an RSA PKCS#1 version signature.

Which of the following .NET cryptographic classes provides a CNG implementation of the secure hash algorithm?

  1. ProtectedMemory

  2. SHA1Cng

  3. SHA1

  4. SHA256Cng

  5. SHA256


Correct Option: B
Explanation:

This .NET cryptographic class provides a CNG implementation of the secure hash algorithm.

Which of the following security standards has been adopted in commercial e-mail packages?

  1. Transport layer security

  2. Packet filtering gateway

  3. Message confidentiality

  4. Certificate scheme

  5. Secure multipurpose internet mail extension


Correct Option: E
Explanation:

This security standards has been adopted in commercial e-mail packages.

Which of the following .NET cryptographic classes computes secure hash algorithm 1 hash value for the input data using the implementation provided by the CSP?

  1. ProtectedData

  2. SHA256

  3. SHA384CryptoServiceProvider

  4. SHA1CryptoServiceProvider

  5. SHA1


Correct Option: D
Explanation:

This .NET cryptographic class computes the secure hash algorithm 1 hash value for the input data using the implementation provided by the CSP.

Which of the following .NET cryptographic classes defines a wrapper object to access the CSP implementation of the secure hash algorithm 256 algorithm?

  1. SHA256CryptoServiceProvider

  2. SHA256

  3. SHA256Cng

  4. SHA384CryptoServiceProvider

  5. ProtectedData


Correct Option: A
Explanation:

This .NET cryptographic class defines a wrapper object to access the CSP implementation of the secure hash algorithm 256 algorithm.

Which of the following .NET cryptographic classes computes the secure hash algorithm 1 hash for the input data using the managed library?

  1. SHA1

  2. SHA256

  3. SHA1Managed

  4. SHA384Managed

  5. ProtectedMemoy


Correct Option: C
Explanation:

This .NET cryptographic class computes the secure hash algorithm 1 hash for the input data using the managed library.

Which of the following security standards performs the action such as transient the message to the recipient?

  1. Transport layer security

  2. Pretty good privacy

  3. Message integrity check

  4. Packet filtering gateway

  5. DEK-Info


Correct Option: B
Explanation:

This security standard performs the action such as transient the message to the recipient.

Which of the following security techniques also called bastion host essentially intrudes in the middle of the protocol exchange seeming like a destination in communication with the sender?

  1. Transport layer security

  2. Application proxy gateway

  3. Packet filtering gateway

  4. Sender authenticity

  5. Message integrity check


Correct Option: B
Explanation:

This security technique also called bastion host essentially intrudes in the middle of this protocol exchange seeming like a destination in communication with the sender.

Which of the following .NET cryptographic classes computes the secure hash algorithm 256 hash for the input data using the managed library?

  1. SHA256Managed

  2. SHA256

  3. SHA256Cng

  4. SHA384Managed

  5. ProtectedMemory


Correct Option: A
Explanation:

This .NET cryptographic class computes the secure hash algorithm 256 hash for the input data using the managed library.

Which of the following security techniques can see full data portion of packets?

  1. Packet filtering gateway

  2. Personal firewall

  3. Message integrity check

  4. Sender authenticity

  5. Transport layer security


Correct Option: B
Explanation:

This security technique can see full data portion of packets.

- Hide questions