Unix
Description: Windows Applications Security Unix/Linux and WindowsProgrammingProgramming | |
Number of Questions: 15 | |
Created by: Girish Goud | |
Tags: Windows Applications Security Unix/Linux and Windows Programming |
Which of the following provides a cryptography next generation implementation of the Secure Hash Algorithm?
Which of the following provides a cryptography next generation implementation of the MD5 128 bit hashing algorithm?
Which of the following objects is created, when the data access objects are referenced in the language at run time?
Which of the following methods is used to decrypt the PKCS#1 key exchange data?
Which of the following is a reference type that encapsulates a method with a specific signature?
Which cryptographic class defines a wrapper object to access the CSP implementation of the SHA512 algorithm?
Which of the following is the quality that allows one interface to access a general class of actions?
Which of the following contains most of the capabilities normally associated with the language runtime?
Which of the following methods provides a cryptographic next generation implementation of the Secure Hash Algorithm for 256 bit hash value?
Which of the following methods is used to create an RSA PKCS#1 version 1.5 signature?
Which of the following means the conversion of a value type on the stack to an object type on the heap?
Which of the following provides an analog of COM and DCOM for object brokering and interfacing, but based on internet technologies?
Which of the following computes the SHA1 hash for the input data using the managed library?
Which of the following must perform a heap in order to free some memory?
Which of the following defines a wrapper object to access the CSP implementation of the SHA256 algorithm?