0

Cryptosystem Security

Description: Cryptosystem security Test contains questions on Security system.
Number of Questions: 15
Created by:
Tags: Cryptosystem security IT questions Networking questions Network Security and Firewall
Attempted 0/15 Correct 0 Score 0

Which of the following security techniques can generate logs of accesses?

  1. Stateful inspection firewall

  2. Personal firewall

  3. Message integrity check

  4. Transport layer security

  5. Sender authenticity


Correct Option: B
Explanation:

This security technique can generate logs of accesses.

Which of the following .NET cryptographic classes converts a CryptoStream from base sixty four?

  1. ToBase64Transform

  2. CryptoAPITransform

  3. CryptoStream

  4. FromBase64Transform

  5. ProtectedMemory


Correct Option: D
Explanation:

This .NET cryptographic class converts a CryptoStream from base sixty four.

Which of the following .NET cryptographic classes provides a base class that ECDH algorithm implementations can be derived from?

  1. ECDiffieHellman

  2. ECDiffieHellmanPublicKey

  3. ECDiffieHellmanCng

  4. ECDSA

  5. ProtectedData


Correct Option: A
Explanation:

It provides a CNG implementation of the ECDH algorithm implementation can derive form.

Which of the following security mechanisms is designed to provide security and compression services to data generated from the application layer?

  1. Transport layer security

  2. Message authentication code

  3. Non repudiation

  4. Stateful inspection firewall

  5. Secure socket layer


Correct Option: E
Explanation:

This security mechanism is designed to provide security and compression services to data generated from the application layer.

Which of the following security standards handles all sorts of attachments, such as presentation, movies, etc?

  1. Key info

  2. Secure multipurpose internet mail extension

  3. Message integrity check

  4. Non repudiation

  5. Transport layer security


Correct Option: B
Explanation:

This security standard handles all sorts of attachment such as presentation, movies etc...

Which of the following security techniques receives protocol data units, interprets them and passes the same protocol data units that archieves the same result?

  1. Transport layer security

  2. Sender authenticity

  3. Message integrity check

  4. Stateful inspection firewall

  5. Guard


Correct Option: E
Explanation:

This security technique receives protocol data units, interprets them and passes through the same protocol data units that achieve the same result.

Which of the following .NET cryptographic classes contains information about the properties of a digital signature?

  1. RandomNumberGenerator

  2. DSASignatureDeformatter

  3. SignatureDescription

  4. AsymmetricSignatureFromatter

  5. AsymmetricSignatureDeformatter


Correct Option: C
Explanation:

This .NET cryptographic class contains information about the properties of a digital signature.

Which of the following .NET cryptographic classes represents the super class from which all implementations of cryptographic hash algorithms must derive?

  1. HashAlgorithm

  2. KeyedHashAlgorithm

  3. CngAlgorithm

  4. CngKey

  5. ProtectedData


Correct Option: A
Explanation:

This .NET cryptographic class represents the super class from which all implementations of cryptographic hash algorithms must derive.

Which of the following security standards generates a message digest or hash of the message depending on whether authenticity, integrity, etc?

  1. Stateful inspection firewall

  2. The certificate scheme

  3. Pretty good privacy

  4. DEK-Info

  5. Transport layer security


Correct Option: C
Explanation:

This security standard generates a message digest or hash of the message depending on whether authenticity, integrity, etc.

Which of the following .NET cryptographic classes creates a DSA signature?

  1. DSASignatureFormatter

  2. DSASignatureDeformatter

  3. DSACryptoServiceProvider

  4. AsymmetricSignatureFormatter

  5. ProtectedMemory


Correct Option: A
Explanation:

This .NET cryptographic class creates a DSA signature.

Which of the following .NET cryptographic classes provides a CNG implementation of the ECDSA?

  1. RandomNumberGenerator

  2. ECDsa

  3. ECDiffieHellmanCng

  4. ECDsaCng

  5. CngKey


Correct Option: D
Explanation:

This .NET cryptographic class provides a CNG implementation of the ECDSA.

Which of the following .NET cryptographic classes computes a HMAC using the message digest 5 hash function?

  1. HMACMD5

  2. HMAC

  3. KeyedHashAlgorithm

  4. MD5

  5. ProtectedMemory


Correct Option: A
Explanation:

This .NET cryptographic class computes a HMAC using the message digest 5 hash function.

Which of the following security techniques blocks access from or to addresses, in the network?

  1. Stateful inspection firewall

  2. Packet filtering gateway

  3. The certificate scheme

  4. Non repudiation

  5. Transport layer security


Correct Option: B
Explanation:

This security technique blocks access from or to addresses, in the network.

Which of the following .NET cryptographic classes specifies an ECDH public key for use with the ECDiffieHellmanCng class?

  1. ECDiffieHellmanPublicKey

  2. ECDiffieHellmanCngPublicKey

  3. ECDiffieHellmanCng

  4. ECDsa

  5. ProtectedData


Correct Option: B
Explanation:

This .NET cryptographic class specifies an ECDH public key for use with the ECDiffieHellmanCng class.

Which of the following security mechanisms encompasses the dealing between the credit card holders, payment processing establishments, the public key certificate authorities, etc?

  1. Secure electronic transaction

  2. Transport layer security

  3. Message authentication code

  4. Proc-Type

  5. Stateful inspection firewall


Correct Option: A
Explanation:

This security mechanism encompasses the dealing between the credit card holders, payment processing establishments, the public key certificate authorities, etc.

- Hide questions