0

Unix

Description: Windows Applications Security Unix/Linux and WindowsProgrammingProgramming
Number of Questions: 15
Created by:
Tags: Windows Applications Security Unix/Linux and Windows Programming
Attempted 0/15 Correct 0 Score 0

Which of the following provides a cryptography next generation implementation of the Secure Hash Algorithm?

  1. SHA1Cng

  2. SHA1

  3. SHA1CryptoService Provider

  4. ProtectedData

  5. RijndaelManaged


Correct Option: A
Explanation:

It provides a cryptography next generation implementation of the Secure Hash algorithm.

Which of the following provides a cryptography next generation implementation of the MD5 128 bit hashing algorithm?

  1. MD5

  2. MD5Cng

  3. MD5CryptoService Provider

  4. Oid

  5. ProtectedData


Correct Option: B
Explanation:

It provides a cryptography next generation implementation of the MD5 128 bit hashing algorithm.

Which of the following objects is created, when the data access objects are referenced in the language at run time?

  1. DBEngine

  2. Database object

  3. Workspace(0)

  4. Field object

  5. QueryDef object


Correct Option: C
Explanation:

This object is created when the data access objects are referenced in the language at run time.

Which of the following methods is used to decrypt the PKCS#1 key exchange data?

  1. RSAPKCS1KeyExchangeFormatter

  2. RSAPKCS1SignatureDeformatter

  3. RSAPKCS1KeyExchangeDeformatter

  4. RSA

  5. ProtectedData


Correct Option: C
Explanation:

It decrypts the PKCS#1 key exchange data.

Which of the following is a reference type that encapsulates a method with a specific signature?

  1. Class

  2. Array

  3. Object

  4. Encapsulation

  5. Delegate


Correct Option: E
Explanation:

These are reference types that encapsulate a method with a specific signature.

Which cryptographic class defines a wrapper object to access the CSP implementation of the SHA512 algorithm?

  1. SHA1CryptoServiceProvider

  2. SHA512

  3. SHA512Cng

  4. SHA512CryptoServiceProvider

  5. ProtectedMemory


Correct Option: D
Explanation:

It defines a wrapper object to access the CSP implementation of the SHA512 algorithm.

Which of the following is the quality that allows one interface to access a general class of actions?

  1. Encapsulation

  2. Inheritance

  3. Polymorphism

  4. Object

  5. Array


Correct Option: C
Explanation:

It is the quality that allows one interface access a general class of actions.

Which of the following contains most of the capabilities normally associated with the language runtime?

  1. Common language runtime

  2. Execution support

  3. .NET FCL

  4. Web form

  5. Windows form


Correct Option: B
Explanation:

It contains most of the capabilities normally associated with the language runtime.

Which of the following methods provides a cryptographic next generation implementation of the Secure Hash Algorithm for 256 bit hash value?

  1. SHA512

  2. ProtectedData

  3. SHA256

  4. SHA256Managed

  5. SHA256Cng


Correct Option: E
Explanation:

It provides a cryptography next generation implementation of the secure hash algorithm for 256 bit hash values.

Which of the following methods is used to create an RSA PKCS#1 version 1.5 signature?

  1. RSA

  2. RSAPKCS1SignatureFormatter

  3. RSAPKCS1SignatureDeformatter

  4. RSAPKCS1KeyExchangeDeformatter

  5. ProtectedData


Correct Option: B
Explanation:

It creates an RSA PKCS#1 version 1.5 signature.

Which of the following means the conversion of a value type on the stack to an object type on the heap?

  1. Boxing

  2. Unboxing

  3. Identifier

  4. Literals

  5. Array


Correct Option: A
Explanation:

It means the conversion of a value type on the stack to an object type on the heap.

Which of the following provides an analog of COM and DCOM for object brokering and interfacing, but based on internet technologies?

  1. Window forms

  2. Web forms

  3. .Net FCL

  4. Common language runtime

  5. Web services


Correct Option: E
Explanation:

They provide an analog of COM and DCOM for object brokering and interfacing.

Which of the following computes the SHA1 hash for the input data using the managed library?

  1. SHA1CryptoService Provider

  2. SHA1

  3. ProtectedMemory

  4. SHA1Managed

  5. RSA


Correct Option: D
Explanation:

It computes the SHA1 hash for the input data using the managed library.

Which of the following must perform a heap in order to free some memory?

  1. Common language runtime

  2. Garbage collector

  3. Web forms

  4. .NET FCL

  5. Windows forms


Correct Option: B
Explanation:

It must perform a heap in order to free some memory.

Which of the following defines a wrapper object to access the CSP implementation of the SHA256 algorithm?

  1. SHA256

  2. SHA256Managed

  3. SHA512

  4. SHA256CryptoServiceProvider

  5. Oid


Correct Option: D
Explanation:

It defines a wrapper objects to access the CSP implementation of the SHA256 algorithm.

- Hide questions