Cryptography Security
Description: Defending the parameter from cyber attack Network Security and FirewallNetwork Security and FirewallNetwork Security and Firewall | |
Number of Questions: 15 | |
Created by: Saurabh Mittal | |
Tags: Defending the parameter from cyber attack Network Security and Firewall |
Which of the cryptographic class represents the base class from which all implementations of the RC2 algorithm must derive?
Which of the following cryptography class encapsulates the name of a key storage provider for use with cryptography next generation objects?
Which of the following class defines a wrapper object to access the CSP version of the Triple DES algorithm?
Which of the following cryptographic class computes makes according to PKCS#1 for use by key exchange algorithms?
Which of the following cryptography class encapsulates the name of an encryption algorithm combination?
Which of the following class represents the abstract base class from which all implementations of the digital signature algorithm must inherit?
Which of the following cryptographic class creates a digital signature algorithm signature?
Which of the following cryptography class encapsulates optional configuration parameters for the user interface that cryptography next generation displays when you access a protected key?
Which of the following class defines a wrapper object to access the CSP version of the data encryption standard algorithm?
Which of the following classes supplied by the .NET framework require a key and a new initialization vector to encrypt and decrypt data?
Which of the following class contains a type and a collection of values associated with that type?
Which of the following cryptographic class contains advanced properties for key creation?
Which of the following class provides a cryptography next generation implementation of the elliptic curve digital signature algorithm?
Which of the following cryptographic class provides a strong typed collection of cryptography next generation properties?
Which of the following cryptography class provides a cryptography next generation implementation of the elliptic curve Diffie - Hellman algorithm?