System Security
Description: System security Network Security and FirewallNetwork Security and Firewall | |
Number of Questions: 15 | |
Created by: Sangita Pandit | |
Tags: System security Network Security and Firewall |
Which of the following classes represents the abstract class from which all implementations of cryptographic random number generators derive?
Which of the following cryptographic classes represents a read-only set of ManifestSignatureInformation objects?
Which of the following encryptions uses a single shared key to encrypt and decrypt data?
Which of the following cryptographic classes computes a hash-based message authentication code using secure hash algorithm 512 hash function?
Which of the following is used by the common language runtime for implementing symmetric algorithms and hash algorithms?
Which of the following attributes passes information within the site's URL?
Which of the following cryptosystem classes computes a hash-based message authentication code using the RIPEMD 160 hash function?
Which of the following cryptosystem classes represents the abstract class from which all mask generator algorithms must derive?
Which of the following cryptographic classes represents the base class from which all implementations of cryptographic hash algorithms must derive?
Which of the following cryptographic classes provides methods for protecting and unprotecting data?
Which of the following cryptosystem classes determines the set of valid key sizes for the symmetric cryptographic algorithms?
Which of the following cryptographic classes converts a cryptostream to base 64?
Which of the following cryptographic classes provides methods for protecting and unprotecting memory?
Which of the following cryptographic classes represents the abstract class from which all implementations of hash based message authentication code must derive?
Which of the following authorizations checks the ACL of the .aspx handler file to determine whether a user should have access to the file?