0

Cryptosystem Security

Description: Endpoint Security Network Security and FirewallNetwork Security and Firewall
Number of Questions: 15
Created by:
Tags: Endpoint Security Network Security and Firewall
Attempted 0/15 Correct 0 Score 0

Which of the following cryptographic classes performs cryptographic transformation of data?

  1. CryptoStream

  2. CryptoConfig

  3. CryptoAPITransform

  4. CryptographicAttributeObject

  5. ProtectedData


Correct Option: C
Explanation:

It performs a cryptographic transformation of data.

In which of the following cryptographic classes an exception is thrown when an unexpected operation occurs during a cryptographic operation?

  1. CryptographicException

  2. CryptographicUnexpectedOperationException

  3. CryptographicAttributeObjectEnumerator

  4. CngProvider

  5. QueryString parameter


Correct Option: B
Explanation:

In this cryptography class, the exception that is thrown when an unexpected operation occurs during a cryptographic operation.

Which of the following cryptosystem classes converts a CryotoStream from base 64?

  1. FromBase64Transform

  2. ToBase64Transform

  3. CryptoStream

  4. CryptoConfig

  5. ProtectedMemory


Correct Option: A
Explanation:

It coverts a CryptoStream from base 64.

Which of the following classes represents the abstract base class from which all classes that derive byte sequences of a specified length inherit?

  1. PasswordDeriveBytes

  2. AsymmetricSignatureFormatter

  3. CngKey

  4. Cryptographic signing

  5. DeriveBytes


Correct Option: E
Explanation:

It represents the abstract base class from which all classes that derive byte sequences of a specified length inherit.

Which of the cryptographic classes contains information about the properties of a digital signature?

  1. Cryptographic signing

  2. AsymmetricSignatureFormatter

  3. AsymmetricSignatureDeformatter

  4. ProtectedData

  5. SignatureDescription


Correct Option: E
Explanation:

It contains information about the properties of a digital signature.

Which of the following cryptographic classes represents a group of object identifier objects?

  1. OidCollection

  2. OidEnumerator

  3. Oid

  4. CngPropertyCollection

  5. QueryString parameter


Correct Option: A
Explanation:

It represents a group of object identifier objects.

In which of the following authorizations, ACL permissions are verified for the user's window's identity?

  1. URL authorization

  2. File authorization

  3. Symmetric cryptography

  4. AesManaged

  5. ProtectedMemory


Correct Option: B
Explanation:

In the file authorization, ACL permissions are verified for the user's window's identity.

Which of the cryptographic classes computes a hash-based message authentication code using the secure hash algorithm 1 hash function?

  1. HMAC

  2. SHA1

  3. HMACSHA1

  4. Cryptographic hashes

  5. ProtectedData


Correct Option: C
Explanation:

It computes a hash-based message authentication code using the secure hash algorithm 1 hash functions.

In which of the following modules are the access control list permissions verified for the windows identity of the ASP.NET process?

  1. Asymmetric cryptography

  2. DSACryptoServiceProvider

  3. UrlAuthorizationModule

  4. FileAuthorizationModule

  5. QueryString parameter


Correct Option: D
Explanation:

In this module, access control list permissions are verified for the windows identity of the ASP.NET process.

Which of the following cryptosystem classes computes a hash-based message authentication code using the MD5 hash function?

  1. MD5

  2. HMAC

  3. MD5CryptoServiceProvider

  4. ProtectedData

  5. HMACMD5


Correct Option: E
Explanation:

It computes a hash-based message authentication code using the MD5 hash function.

Which of the following classes computes a hash-based message authentication code using the secure hash algorithm 256 hash function?

  1. SHA256

  2. SHA256Managed

  3. HMACSHA256

  4. HMAC

  5. ProtectedMemory


Correct Option: C
Explanation:

It computes a hash-based message authentication code using the secure hash algorithm 256 hash function.

Which of the following cryptographic classes holds the strong name signature information for a manifest?

  1. Cryptographic signing

  2. StrongNameSignatureInformation

  3. AsymmetricSignatureFormatter

  4. DSASignatureFormatter

  5. ProtectedData


Correct Option: B
Explanation:

It holds the strong name signature information for a manifest.

Which of the following cryptographic classes represents the abstract class from which all implementations of keyed hash algorithms must derive?

  1. KeyedHashAlgorithm

  2. HashAlgorithm

  3. CngKey

  4. SHA1

  5. URL authorization


Correct Option: A
Explanation:

It represents the abstract class from which all implementations of keyed hash algorithms must derive.

Which of the following cryptosystem classes compotes a hash-based message authentication code using the secure hash algorithm 384 hash function?

  1. SHA384

  2. HMACSHA384

  3. HMAC

  4. HashAlgorithm

  5. ProtectedMemory


Correct Option: A
Explanation:

It computes the secure hash algorithm 384 hash for the input data.

Which of the following classes represents the abstract class from which all implementations of cryptographic random number generators derive?

  1. PKCS1MaskGeneration method

  2. CryptoStream

  3. RandomNumberGenerator

  4. RC2

  5. ProtectedData


Correct Option: C
Explanation:

It represents the abstract class from which all implementations of cryptographic random number generators derive.

- Hide questions