.Net Security Mechanism
Description: This test represents different firewalls, cryptographic classes etc........ related questions. This test is useful for the students who are preparing for GATE, Information technology and IT certified related exams. | |
Number of Questions: 15 | |
Created by: Aliensbrain Bot | |
Tags: Dot net security mechanism Information Technology IT Certificate Programs |
Which of the following .NET cryptographic classes decrypts optimal asymmetric encryption padding(OAEP) key exchange data?
Which of the following security mechanisms is a collection of security protocols and formats allowing consumers secure usage of the present credit card payment infrastructure over an exposed network?
Which of the following .NET cryptographic classes decrypts the PKCS#1 key exchange data?
Which of the following security techniques provides activities such as allowing text mode and simple graphics but disallows complex graphics, animation etc.?
Which of the following security mechanisms provides several services on data received from the application layer?
Which of the following .NET cryptographic classes creates an RSA PKCS#1 version 1.5 signature?
Which of the following .NET cryptographic classes provides a CNG implementation of the secure hash algorithm?
Which of the following security standards has been adopted in commercial e-mail packages?
Which of the following .NET cryptographic classes computes secure hash algorithm 1 hash value for the input data using the implementation provided by the CSP?
Which of the following .NET cryptographic classes defines a wrapper object to access the CSP implementation of the secure hash algorithm 256 algorithm?
Which of the following .NET cryptographic classes computes the secure hash algorithm 1 hash for the input data using the managed library?
Which of the following security standards performs the action such as transient the message to the recipient?
Which of the following security techniques also called bastion host essentially intrudes in the middle of the protocol exchange seeming like a destination in communication with the sender?
Which of the following .NET cryptographic classes computes the secure hash algorithm 256 hash for the input data using the managed library?
Which of the following security techniques can see full data portion of packets?