0

Cryptography and Network Security

Description: Network security Network Security and FirewallNetwork Security and Firewall
Number of Questions: 15
Created by:
Tags: Network security Network Security and Firewall
Attempted 0/15 Correct 0 Score 0

Which of the following types of encryption uses a single shared secret key to encrypt and decrypt data?

  1. Asymmetric cryptography

  2. Symmetric cryptography

  3. RC2CryptoService provider

  4. Rijndael

  5. ProtectedMemory


Correct Option: B
Explanation:

This type of encryption uses a single shared secret key to encrypt and decrypt data.

Which of the following cryptography classes represents abstract syntax one (ASN.1)- encoded data?

  1. AsnEncodedDataCollection

  2. AsnEncodedData

  3. Aes

  4. ProtectedData

  5. Oid


Correct Option: B
Explanation:

It represents abstract syntax notation one(ASN.1)- encoded data.

Which of the following classes performs asymmetric encryption and decryption using the CAPI implementation of the advanced encryption standard algorithm?

  1. Aes

  2. MD5Cng

  3. AesCryptoService provider

  4. SHA1

  5. ProtectedData


Correct Option: C
Explanation:

It performs asymmetric encryption and decryption using the CAPI implementation of the advance encryption standard algorithm.

Which of the following cryptography classes provides the ability to navigate through an AsnEncodedDataCollection object?

  1. AsnEncodedDataEnumerator

  2. AsnEncodedDataCollection

  3. Aes

  4. Oid

  5. ProtectedData


Correct Option: A
Explanation:

It provides the ability to navigate through an AsnEncodedDataCollection object.

Which of the following map(s) data from any length to a fixed length byte sequence?

  1. Cryptographic hashes

  2. Symmetric cryptography

  3. SHA256

  4. SHA512

  5. ProtectedData


Correct Option: A
Explanation:

It maps data from any length to a fixed length byte sequence.

Which of the following classes provides a managed implementation of the advanced encryption symmetric algorithm?

  1. Aes

  2. AsnEncodedDataCollection

  3. RijndaelManaged

  4. AesManaged

  5. SHA1Managed


Correct Option: D
Explanation:

It provides a managed implementation of the advanced encryption standard symmetric algorithm.

Which of the following checks the access control list of the .aspx or .asmx handler file to determine whether a user should have access to the file or not?

  1. QueryString parameter

  2. Password file

  3. File authorization

  4. OidEnumerator

  5. ProtectedData


Correct Option: C
Explanation:

It checks the access control list of the .aspx or .asmx handler file to determine whether a user should have access to the file.

Which of the following helps verify that data originates from a specific party by creating a digital signature that is unique to that party?

  1. Asymmetric cryptography

  2. PasswordDeriveBytes

  3. MD5CryptoServiceProvider

  4. Oid

  5. Cryptographic signing


Correct Option: E
Explanation:

It helps verify that data originates from a specific party by creating a digital signature that is unique to that party.

Which of the following cryptography classes provides a cryptography next generation implementation of the secure hash algorithm for 512 bit hash value?

  1. SHA512CrptoServiceProvider

  2. SHA256Cng

  3. SHA1

  4. SHA512Cng

  5. ProtectedMemory


Correct Option: D
Explanation:

It provides a cryptography next generation implementation of the secure hash algorithm for 512 bit hash values.

Which of the following cryptography clasess represents the abstract class, from which all implementations of the MD5 hash algorithm inherit?

  1. MD5Cng

  2. MD5CryptoServiceProvider

  3. Oid

  4. RandomNumberGenerator

  5. MD5


Correct Option: E
Explanation:

It represents the abstract class from which all implementations of the MD5 hash algorithm inherit.

Which of the following computes the SHA512 hash algorithm for the input data using the managed library?

  1. SHA512CryptoServiceProvider

  2. SHA256Managed

  3. SHA512Managed

  4. SHA1Managed

  5. ProtectedData


Correct Option: C
Explanation:

It computes the SHA512 hash algorithm for the input data using the managed library.

Which of the following cryptographic classes represents the base class from which all implementations of asymmetric signature formatters derive?

  1. AsymmetricSignatureDeformatter

  2. AsymmetricSignatureFormatter

  3. AsymmetricKeyExchangeFormatter

  4. Rijndael

  5. ProtectedMemory


Correct Option: B
Explanation:

It represents the base class from which all implementations of asymmetric signature formatters derive.

Which of the following computes the SHA384 hash for the input data using the managed library?

  1. SHA1Managed

  2. SHA256Managed

  3. SHA512Managed

  4. SHA512

  5. ProtectedData


Correct Option: D
Explanation:

It computes the SHA512 hash for the input data.

Which of the following represents the base class from which all asymmetric key exchange deformatters derive?

  1. AsymmetricKeyExchangeFormatter

  2. AsymmetricSignatureDeformatter

  3. Rijndael

  4. AsymmetricKeyExchangeDeformatter

  5. ProtectedMemory


Correct Option: D
Explanation:

It represents the base class from which all asymmetric key exchange deformatters derive.

Which of the following map(s) users and roles to uniform resource locators in ASP.NET applications?

  1. Proxy archived log backups

  2. Growing phase

  3. QueryString parameter

  4. ProtectedData

  5. URL authorization


Correct Option: E
Explanation:

It maps users and roles to uniform resource locators in ASP.NET applications.

- Hide questions