Cryptosystem Security
Description: Endpoint Security Network Security and FirewallNetwork Security and Firewall | |
Number of Questions: 15 | |
Created by: Vinaya Modi | |
Tags: Endpoint Security Network Security and Firewall |
Which of the following cryptographic classes performs cryptographic transformation of data?
In which of the following cryptographic classes an exception is thrown when an unexpected operation occurs during a cryptographic operation?
Which of the following cryptosystem classes converts a CryotoStream from base 64?
Which of the following classes represents the abstract base class from which all classes that derive byte sequences of a specified length inherit?
Which of the cryptographic classes contains information about the properties of a digital signature?
Which of the following cryptographic classes represents a group of object identifier objects?
In which of the following authorizations, ACL permissions are verified for the user's window's identity?
Which of the cryptographic classes computes a hash-based message authentication code using the secure hash algorithm 1 hash function?
In which of the following modules are the access control list permissions verified for the windows identity of the ASP.NET process?
Which of the following cryptosystem classes computes a hash-based message authentication code using the MD5 hash function?
Which of the following classes computes a hash-based message authentication code using the secure hash algorithm 256 hash function?
Which of the following cryptographic classes holds the strong name signature information for a manifest?
Which of the following cryptographic classes represents the abstract class from which all implementations of keyed hash algorithms must derive?
Which of the following cryptosystem classes compotes a hash-based message authentication code using the secure hash algorithm 384 hash function?
Which of the following classes represents the abstract class from which all implementations of cryptographic random number generators derive?