Defending the Perimeter from Cyber Attacks
Description: This test is useful for the students who are preparing for GATE, Information technology and IT Certified programs related exams. This test represents cyber security. | |
Number of Questions: 15 | |
Created by: Rani Rajan | |
Tags: Defending the perimeter from cyber attacks IT questions Perimeter questions Network Security and Firewall |
Which of the following .NET cryptographic classes defines a wrapper object to access the CSP version of the TripleDES algorithm?
Which of the following .NET cryptographic classes represents a set of cryptographic object identifier objects?
Which of the following security standards does not mandate a policy for establishing trust rather each user is free to decide how much to trust each key received?
Which of the following .NET cryptographic classes provides information for a manifest signature?
A university wants to allow its students to use e-mail up to a limit of so many messages, this activity is achieved by using which of the following security techniques?
Which of the following .NET cryptographic classes represents the abstract class from which all implementations of the message digest 5 hash algorithm inherit?
Which of the following security standards works with a variety of cryptographic algorithms such as DES, AES and RC2 for encryption?
Which of the following security mechanisms is a collection of security protocols and format allowing consumers secure usage the present credit card payment infrastructure?
Which of the following .NET cryptographic classes derives a key from a password using an extension of the PBKDF1 algorithm?
Which of the following .NET cryptographic classes provides the ability to navigate through an OidCollection object?
Which of the following security techniques also called bastion host runs pseudo applications?
Which of the following .NET cryptographic classes computes masks according to PKCS#1 for use by key exchange algorithms?
By using which of the following security techniques may the user decide that certain sites such as computers on the company network are highly trustworthy but most other sites are not?
Which of the following .NET cryptographic classes represents the super class for Triple data encryption standard algorithms from which all TripleDES implementations must derive?
In which of the following security mechanisms is the data passed to a reliable transport layer protocol such as TCP?