Network Security
Description: Network Security Test contains questions on Information Technology topics, IT certificate programs | |
Number of Questions: 15 | |
Created by: Girish Devgan | |
Tags: Network access control security programming test SQL test IT practice test Network Security and Firewall |
Which of the following .NET cryptographic classes provides additional information about a cryptographic key pair?
In .NET cryptographic classes, which of the following exceptions is thrown when an unexpected operation occurs during a cryptographic operation?
Which of the following .NET cryptographic classes defines a wrapper object to access the CSP implementation of the digital signature algorithm?
Which of the following .NET cryptographic classes contains a group of CryptographicAttributeObject objects?
In which of following the security mechanisms, the hash used in the CertificateVerify message is the two-step hash of the hand-shake messages plus a pad and the master secret?
Which of the following security techniques can provide the degree of contol is limited only by what is computable?
Which of the following security standard encrypts the session key under the recipient's public key depending on confidentiality, integrity, etc?
Which of the following security mechanisms encompasses the dealings between the credit card holders, vendors, card issuing bank, etc?
Which of the following .NET cryptographic classes accesses the cryptographic configuration information?
Which of the following .NET cryptographic classes verifies a digital signature algorithm (DSA) PKCS#1v1.5 signature?
Which of the following .NET cryptographic classes represents the base class from which all classes that derive byte sequences of a specified length inherit?
Which of the following security standards works with a variety of cryptographic algorithms such as DES, RC2, etc?
Just as network firewall screens incoming and outgoing traffic for that network, which of the following security techniques screens incoming and outgoing traffic on a single workstation?
Which of the following .NET cryptographic classes provides a CNG implementation of the ECDH algorithm?
Which of the following security techniques, also called a bastion host simulates the proper effects of an application so that the application will receive only requests to act properly?