0

Cryptography Security

Description: Defending the parameter from cyber attack Network Security and FirewallNetwork Security and FirewallNetwork Security and Firewall
Number of Questions: 15
Created by:
Tags: Defending the parameter from cyber attack Network Security and Firewall
Attempted 0/15 Correct 0 Score 0

Which of the cryptographic class represents the base class from which all implementations of the RC2 algorithm must derive?

  1. RC2

  2. RC2CryptoServiceProvider

  3. MD5

  4. Rijndael

  5. Cryptographic hashes


Correct Option: A
Explanation:

It represents the base class from which all implementations of the RC2 algorithm must derive.

Which of the following cryptography class encapsulates the name of a key storage provider for use with cryptography next generation objects?

  1. CngKey

  2. CngKeyBlobFormat

  3. CngProvider

  4. MD5Cng

  5. ProtectedData


Correct Option: C
Explanation:

This cryptography class encapsulates the name of a key storage provider for use with cryptography next generation objects.

Which of the following class defines a wrapper object to access the CSP version of the Triple DES algorithm?

  1. TripleDES

  2. TripleDESCryptoServiceProvider

  3. SHA512CryptoServiceProvider

  4. SHA256

  5. ProtectedMemory


Correct Option: B
Explanation:

It defines a wrapper object to access the CSP version of the TripleDES algorithm.

Which of the following cryptographic class computes makes according to PKCS#1 for use by key exchange algorithms?

  1. RSAPKCS1KeyExchangeFormatter

  2. PKCS1MaskGeneration method

  3. RSAPKCS1SignatureDeformatter

  4. RSA

  5. ProtectedData


Correct Option: B
Explanation:

It computes mask according to PKCS#1 for use by key exchange algorithms.

Which of the following cryptography class encapsulates the name of an encryption algorithm combination?

  1. CngAlgorithm

  2. CngKey

  3. CngKeyBlobFormat

  4. ProtectedData

  5. CngAlgorithmGroup


Correct Option: E
Explanation:

It encapsulates the name of an encryption algorithm combination.

Which of the following class represents the abstract base class from which all implementations of the digital signature algorithm must inherit?

  1. DSACryptoServiceProvider

  2. DSASignatureDeformatter

  3. DSA

  4. DES

  5. ProtectedMemory


Correct Option: C
Explanation:

It represents the abstract base class from which from which all implementations of the digital signature algorithm must inherit.

Which of the following cryptographic class creates a digital signature algorithm signature?

  1. DSASignatureFormatter

  2. DSASignatureDeformatter

  3. DSACryptoServiceProvider

  4. AsymmetricSignatureFormatter

  5. Oid


Correct Option: A
Explanation:

It creates a digital signature algorithm signature.

Which of the following cryptography class encapsulates optional configuration parameters for the user interface that cryptography next generation displays when you access a protected key?

  1. CngKey

  2. CngKeyBlobFormat

  3. MD5Cng

  4. ProtectedMemory

  5. CngUIPolicy


Correct Option: E
Explanation:

It encapsulates optional configuration parameters for the user interface that cryptography next generation displays when you access a protected key.

Which of the following class defines a wrapper object to access the CSP version of the data encryption standard algorithm?

  1. DES

  2. DSACryptoServiceProvider

  3. MD5

  4. DESCryptoServiceProvider

  5. ProtectedMemory


Correct Option: D
Explanation:

It defines a wrapper object to access the CSP version of the data encryption standard algorithm.

Which of the following classes supplied by the .NET framework require a key and a new initialization vector to encrypt and decrypt data?

  1. Asymmetric encryption

  2. Symmetric encryption

  3. Cryptographic signing

  4. RSA

  5. Oid


Correct Option: B
Explanation:

These classes supplied by the .NET framework require a key and a new initialization vector to encrypt and decrypt data.

Which of the following class contains a type and a collection of values associated with that type?

  1. CryptoConfig

  2. CngKey

  3. CryptographicAttributeObject

  4. Rijndael

  5. RandomNumberGenerator


Correct Option: C
Explanation:

It contains a type and a collection of values associated with that type.

Which of the following cryptographic class contains advanced properties for key creation?

  1. CngKey

  2. CngKeyCreationParameters

  3. CngKeyBlobFormat

  4. CryptoConfig

  5. ProtectedData


Correct Option: B
Explanation:

It contains advanced properties for key creation.

Which of the following class provides a cryptography next generation implementation of the elliptic curve digital signature algorithm?

  1. AsymmetricSignatureDeformatter

  2. ECDsaCng

  3. ECDsa

  4. MD5

  5. ProtectedData


Correct Option: A
Explanation:

It represents the abstract base class from which all implementations of asymmetric signature deformatters derive.

Which of the following cryptographic class provides a strong typed collection of cryptography next generation properties?

  1. CngAlgorithm

  2. CngPropertyCollection

  3. CngKey

  4. CngKeyBlobFormat

  5. ProtectedMemory


Correct Option: B
Explanation:

It provides a strongly typed collection of cryptography next generation properties.

Which of the following cryptography class provides a cryptography next generation implementation of the elliptic curve Diffie - Hellman algorithm?

  1. ECDiffieHellman

  2. MD5Cng

  3. Rijndael

  4. ECDiffieHellmanCng

  5. ProtectedMemory


Correct Option: D
Explanation:

It provides a cryptography next generation implementation of the elliptic curve diffie hellman algorithm.

- Hide questions