0

Network Security

Description: Network Security Test contains questions on Information Technology topics, IT certificate programs
Number of Questions: 15
Created by:
Tags: Network access control security programming test SQL test IT practice test Network Security and Firewall
Attempted 0/15 Correct 0 Score 0

Which of the following .NET cryptographic classes provides additional information about a cryptographic key pair?

  1. CspParameters

  2. RandomNumberGenerator

  3. AesCryptoServiceProvider

  4. CspKeyConatinerInfo

  5. CngKey


Correct Option: D
Explanation:

This .NET cryptographic class provides additional information about a cryptographic key pair.

In .NET cryptographic classes, which of the following exceptions is thrown when an unexpected operation occurs during a cryptographic operation?

  1. CryptographicException

  2. CryptographicAttributeObject

  3. CryptographicUnexpectedOperationException

  4. CngKey

  5. ProtectedData


Correct Option: C
Explanation:

In this .NET cryptographic class, this exception  is thrown when an unexpected operation occurs during a cryptographic operation.

Which of the following .NET cryptographic classes defines a wrapper object to access the CSP implementation of the digital signature algorithm?

  1. DSACryptoServiceProvider

  2. DSA

  3. AesCryptoServiceProvider

  4. SignatureDescription

  5. ProtectedMemory


Correct Option: A
Explanation:

This .NET cryptographic class defines a wrapper object to access the CSP implementation of the digital signature algorithm.

Which of the following .NET cryptographic classes contains a group of CryptographicAttributeObject objects?

  1. CryptographicAttributeObject

  2. CryptographicAttributeObjectCollection

  3. CryptographicAttributeObjectEnumerator

  4. ProtectedData

  5. CngKeyBlobFormat


Correct Option: B
Explanation:

This .NET cryptographic class contains a group of CryptographicAttributeObject objects.

In which of following the security mechanisms, the hash used in the CertificateVerify message is the two-step hash of the hand-shake messages plus a pad and the master secret?

  1. Transport layer security

  2. Message authentication code

  3. Non repudiation

  4. Stateful inspection firewall

  5. Secure socket layer


Correct Option: E
Explanation:

In this security mechanism, the hash used in the Certificate Verify message is the two-step hash of the hand-shake messages plus a pad and the master secret.

Which of the following security techniques can provide the degree of contol is limited only by what is computable?

  1. Message integrity check

  2. Stateful inspection firewall

  3. Guard

  4. Transport layer security

  5. Sender authenticity


Correct Option: C
Explanation:

This security technique can provide the degree of control is limited only by what is computable.

Which of the following security standard encrypts the session key under the recipient's public key depending on confidentiality, integrity, etc?

  1. Pretty good privacy

  2. The certificate scheme

  3. Proc-Type

  4. Transport layer security

  5. Stateful inspection firewall


Correct Option: A
Explanation:

This security standard encrypts the session key under the recipient's public key depending on confidentiality, integrity, etc.

Which of the following security mechanisms encompasses the dealings between the credit card holders, vendors, card issuing bank, etc?

  1. Message authentication code

  2. Transport layer security

  3. The certificate scheme

  4. DEK-Info

  5. Secure electronic transaction


Correct Option: E
Explanation:

SET encompasses the dealings between the credit card holders, vendors, card issuing bank, etc.

Which of the following .NET cryptographic classes accesses the cryptographic configuration information?

  1. ProtectedMemory

  2. CryptoAPITransform

  3. CryptographicAttributeObject

  4. CryptoConfig

  5. CngProvider


Correct Option: D
Explanation:

This .NET cryptographic class accesses the cryptographic configuration information.

Which of the following .NET cryptographic classes verifies a digital signature algorithm (DSA) PKCS#1v1.5 signature?

  1. DSASignatureDeformatter

  2. DSASignatureFormatter

  3. DSA

  4. ProtectedData

  5. SignatureDescription


Correct Option: A
Explanation:

This .NET cryptographic class verifies a digital signature algorithm (DSA) PKCS#1v1.5 signature.

Which of the following .NET cryptographic classes represents the base class from which all classes that derive byte sequences of a specified length inherit?

  1. PasswordDeriveBytes

  2. RandomNumberGenerator

  3. DeriveBytes

  4. CSP Parameters

  5. CngKeyBlobFormat


Correct Option: C
Explanation:

This .NET cryptographic class represents the abstract base class from which all classes that derive byte sequences of a specified length inherit.

Which of the following security standards works with a variety of cryptographic algorithms such as DES, RC2, etc?

  1. Key-Info

  2. Secure multipurpose internet mail extension

  3. The certificate scheme

  4. Stateful inspection firewall

  5. Transport layer security


Correct Option: B
Explanation:

S/MIME works with a variety of cryptographic algorithms such as DES, RC2, etc.

Just as network firewall screens incoming and outgoing traffic for that network, which of the following security techniques screens incoming and outgoing traffic on a single workstation?

  1. Stateful inspection firewall

  2. Personal firewall

  3. Transport layer security

  4. Message integrity check

  5. Sender authenticity


Correct Option: B
Explanation:

Just as a network firewall screens incoming an outgoing traffic for that network, this security technique screens traffic on a single workstation.

Which of the following .NET cryptographic classes provides a CNG implementation of the ECDH algorithm?

  1. ECDiffieHellmanCng

  2. ECDiffieHellman

  3. ECDiffieHellamanCngPublicKey

  4. CngKey

  5. ProtectedMemory


Correct Option: A
Explanation:

This .NET cryptographic class provides a CNG implementation of the ECDH algorithm.

Which of the following security techniques, also called a bastion host simulates the proper effects of an application so that the application will receive only requests to act properly?

  1. Stateful inspection firewall

  2. Application proxy gateway

  3. Message integrity check

  4. Transport layer security

  5. Sender authenticity


Correct Option: B
Explanation:

This security technique, also called a bastion host simulates the proper effects of an application so that the application will receive only requests to act properly.

- Hide questions