0

Cryptosystem and Security

Description: System and network security Network Security and FirewallNetwork Security and Firewall
Number of Questions: 15
Created by:
Tags: System and network security Network Security and Firewall
Attempted 0/15 Correct 0 Score 0

Which of the following cryptographic classes represents the base class for the data encryption standard algorithm from which all data implementations must derive?

  1. DESCryptoServiceProvider

  2. MD5

  3. DES

  4. RC2

  5. ProtectedData


Correct Option: C
Explanation:

It represents the base class for the data encryption standard algorithm from which all data encryption standard implementations must derive.

Which of the following classes represents the abstract base class from which all implementations of the digital signature algorithm must inherit?

  1. DSACryptoServiceProvider

  2. DSA

  3. AsymmetricSignatureFormatter

  4. Rijndael

  5. ProtectedMemory


Correct Option: B
Explanation:

It represents the abstract base class from which all implementations of the digital signature algorithm must inherit.

Which of the following cryptographic classes represents the base class for triple data encryption standard algorithm from which all TripleDES implementations must derive?

  1. TripleDES

  2. TripleDESCryptoServiceProvider

  3. DESCryptoServiceProvider

  4. Rijndael

  5. QueryString parameter


Correct Option: A
Explanation:

It represents the base class for Triple data encryption standard algorithms from which all TripleDES implementations must derive.

Which of the following cryptographic classes provides an abstract base class that encapsulates the elliptic curve digital signature algorithm?

  1. ECDsaCng

  2. DSACryptoServiceProvider

  3. AsymmetricSignatureFormatter

  4. ECDsa

  5. ProtectedData


Correct Option: D
Explanation:

It provides an abstract base class that encapsulates the elliptic curve digital signature algorithm.

Which of the following cryptographic classes encapsulates the name of a cryptographic next generation encryption algorithm?

  1. CngAlgorithGroup

  2. CngKey

  3. MD5Cng

  4. ProtectedMemory

  5. CngAlgorithm


Correct Option: E
Explanation:

It encapsulates the name of a cryptographic next generation encryption algorithm.

Which of the following cryptographic classes accesses the cryptography configuration information?

  1. CryptoConfig

  2. CryptographicAttributeObject

  3. CngProvider

  4. MD5Cng

  5. ProtectedMemory


Correct Option: A
Explanation:

It accesses the cryptography configuration information.

Which of the following cryptographic classes provides an abstract base class that elliptic curve diffie hellman algorithm implementations can derive from?

  1. ECDiffieHellmanCng

  2. ECDiffieHellman

  3. ECDsaCng

  4. Rijndael

  5. ProtectedData


Correct Option: B
Explanation:

It provides an abstract base class that elliptic curve diffie hellman algorithm implementations can derive from.

Which of the following classes contains a set of CryptographicAttributeObject objects?

  1. CngKey

  2. CryptographicAttributeObject

  3. CryptographicAttributeObjectCollection

  4. AesCryptoServiceProvider

  5. RandomNumberGenerator


Correct Option: C
Explanation:

It contains a set of CryptographicAttributeObject objects.

Which of the following classes specifies an elliptic curve diffie hellman public key for use with the elliptic curve diffie hellman cryptography next generation class?

  1. ECDsaCng

  2. ECDiffieHellmanCng

  3. Cngkey

  4. ECDiffieHellmanCngPublicKey

  5. ProtectedMemory


Correct Option: D
Explanation:

It specifies an elliptic curve diffie hellman public key for use with the elliptic curve diffie hellman cryptography next generation class.

Which of the following cryptographic classes provides an abstract base class from which all elliptic curve diffie hellman cryptography next generation public key implementations must inherit?

  1. ECDiffieHellmanPublicKey

  2. ECDsaCng

  3. ECDiffieHellmanCng

  4. CngKeyBlobFormat

  5. Cryptographic signing


Correct Option: A
Explanation:

It provides an abstract base class from which all elliptic curve diffie hellman cryptography next generation public key implementations must inherit.

Which of the following cryptographic classes provides enumeration functionality for the cryptographic AttributeObjectCollection collection?

  1. CryptographicAttributeObjectEnumerator

  2. CryptographicAttributeObject

  3. CngKey

  4. OidEnumerator

  5. ProtectedData


Correct Option: A
Explanation:

It provides enumeration functionality for the CryptographicAttributeObjectCollection collection.

In which of the following classes is the exception thrown when an error occurs during a cryptographic operation?

  1. CryptographicUnexpectedOperationException

  2. CryptographicException

  3. CryptographicAttributeObject

  4. CngKey

  5. ProtectedData


Correct Option: B
Explanation:

The exception is thrown when an error occurs during a cryptographic operation.

Which of the following cryptographic classes computes a message authentication code using TripleDes for the input data CryptoStream?

  1. TripleDESCryptoServiceProvider

  2. DESCryptoServiceProvider

  3. MACTripleDES

  4. DSACryptoServiceProvider

  5. ProtectedMemory


Correct Option: C
Explanation:

It computes a message authentication code using TripleDES for the input data CryptoStream.

Which of the following cryptographic classes contains attributes that are passed to the cryptographic service provider that performs cryptographic computations?

  1. CspKeyContainerInfo

  2. CspParameters

  3. CryptographicAttributeObject

  4. CngKey

  5. ProtectedData


Correct Option: B
Explanation:

It contains attributes that are passed to the cryptographic service provider that performs cryptographic computations.

Which of the following classes defines a stream that links data streams to cryptographic transformations?

  1. CryptoAPITransform

  2. CryptoStream

  3. CryptographicAttributeObject

  4. CngAlgorithmGroup

  5. QueryString parameter


Correct Option: A
Explanation:

It performs a cryptographic transformation of data.

- Hide questions