0

System Security

Description: System security Network Security and FirewallNetwork Security and Firewall
Number of Questions: 15
Created by:
Tags: System security Network Security and Firewall
Attempted 0/15 Correct 0 Score 0

Which of the following classes represents the abstract class from which all implementations of cryptographic random number generators derive?

  1. RandomNumberGeneratorCSP

  2. Rijndael

  3. RC2

  4. Cryptographic hashes

  5. RandomNumberGenerator


Correct Option: E
Explanation:

It represents the abstract class from which all implementations of cryptographic random number generators derive.

Which of the following cryptographic classes represents a read-only set of ManifestSignatureInformation objects?

  1. ManifestSignatureInformation

  2. StrongNameSignatureInformation

  3. Cryptographic signing

  4. ManifestSignatureInformationCollection

  5. Oid


Correct Option: D
Explanation:

It represents a read-only set of ManifestSignatureInformation objects.

Which of the following encryptions uses a single shared key to encrypt and decrypt data?

  1. Asymmetric encryption

  2. Cryptographic hashes

  3. Symmetric encryption

  4. TripleDES

  5. OidCollection


Correct Option: C
Explanation:

This encryption uses a single shared key to encrypt and decrypt data.

Which of the following cryptographic classes computes a hash-based message authentication code using secure hash algorithm 512 hash function?

  1. HMACSHA1

  2. HMACMD5

  3. HMACSHA512

  4. SHA512

  5. OidCollection


Correct Option: C
Explanation:

It computes a hash-based message authentication code using the secure hash algorithm 512 hash function.

Which of the following is used by the common language runtime for implementing symmetric algorithms and hash algorithms?

  1. CryptoStream

  2. Stream-oriented design

  3. Cryptographic hashes

  4. Asymmetric encryption

  5. Oid


Correct Option: B
Explanation:

The common language runtime uses a stream-oriented design for implementing symmetric algorithms and hash algorithms.

Which of the following attributes passes information within the site's URL?

  1. Cryptographic hashes

  2. Cryptographic signing

  3. KeyedHashAlgorithm

  4. Oid

  5. QueryString parameter


Correct Option: E
Explanation:

It passes information within the site's URL.

Which of the following cryptosystem classes computes a hash-based message authentication code using the RIPEMD 160 hash function?

  1. HMACRIPEMD160

  2. HMACSHA1

  3. HMACMD5

  4. RIPEMD160

  5. Oid


Correct Option: A
Explanation:

It computes a hash-based message authentication code using the RIPEMD160 hash function.

Which of the following cryptosystem classes represents the abstract class from which all mask generator algorithms must derive?

  1. PKCS1MaskGenerationMethod

  2. MaskGeneration

  3. RandomNumberGeneratorCSP

  4. RSA

  5. Oid


Correct Option: B
Explanation:

It represents the abstract class from which all mask generator algorithms must derive.

Which of the following cryptographic classes represents the base class from which all implementations of cryptographic hash algorithms must derive?

  1. HashAlgorithm

  2. KeyedHashAlgorithm

  3. Cryptographic hashes

  4. Secure hash algorithm 1

  5. OidCollection


Correct Option: A
Explanation:

It represents the base class from which all implementations of cryptographic hash algorithms must derive.

Which of the following cryptographic classes provides methods for protecting and unprotecting data?

  1. SHA1

  2. SHA256

  3. RSA

  4. ProtectedData

  5. Cryptographic hashes


Correct Option: D
Explanation:

It provides methods for protecting and unprotecting data.

Which of the following cryptosystem classes determines the set of valid key sizes for the symmetric cryptographic algorithms?

  1. Keysizes

  2. KeyedHashAlgorithm

  3. CngKey

  4. AsymmetricKeyExchangeDeformatter

  5. RC2


Correct Option: A
Explanation:

It determines the st of valid key sizes for the symmetric cryptographic algorithms.

Which of the following cryptographic classes converts a cryptostream to base 64?

  1. FromBase64Transform

  2. ToBase64Transform

  3. CryptoStream

  4. CryptoAPITransform

  5. Cryptographic signing


Correct Option: B
Explanation:

This cryptographic class converts a cryptoStream to base 64.

Which of the following cryptographic classes provides methods for protecting and unprotecting memory?

  1. CryptoStream

  2. ProtectedMemory

  3. Asymmetric encryption

  4. CryptoConfig

  5. OidEnumerator


Correct Option: B
Explanation:

It provides methods for protecting and unprotecting memory.

Which of the following cryptographic classes represents the abstract class from which all implementations of hash based message authentication code must derive?

  1. HMACMD5

  2. HMACSHA1

  3. HMAC

  4. SHA1

  5. Cryptographic hashes


Correct Option: C
Explanation:

It represents the abstract class from which all implementations of hash based message authentication code must derive.

Which of the following authorizations checks the ACL of the .aspx handler file to determine whether a user should have access to the file?

  1. URL authorization

  2. File authorization

  3. Cryptographic hashes

  4. Asymmetric cryptography

  5. Rijndael


Correct Option: A
Explanation:

It maps users and roles to URLs in ASP.NET applications.

- Hide questions