0

Defending the Perimeter from Cyber Attacks

Description: This test is useful for the students who are preparing for GATE, Information technology and IT Certified programs related exams. This test represents cyber security.
Number of Questions: 15
Created by:
Tags: Defending the perimeter from cyber attacks IT questions Perimeter questions Network Security and Firewall
Attempted 0/15 Correct 0 Score 0

Which of the following .NET cryptographic classes defines a wrapper object to access the CSP version of the TripleDES algorithm?

  1. RandomNumberGenerator

  2. DES

  3. DESCryptoServiceProvider

  4. TripleDESCryptoServiceProvider

  5. MACTripleDES


Correct Option: D
Explanation:

This .NET cryptographic class defines a wrapper object to access the CSP version of the TripleDES algorithm.

Which of the following .NET cryptographic classes represents a set of cryptographic object identifier objects?

  1. ProtectedMemory

  2. Oid

  3. CryptographicAttributeObjectCollection

  4. OidCollection

  5. CryptographicAttributeObject


Correct Option: D
Explanation:

This .NET cryptographic class represents a set of cryptographic object identifier objects.

Which of the following security standards does not mandate a policy for establishing trust rather each user is free to decide how much to trust each key received?

  1. Pretty good privacy

  2. Certificate scheme

  3. Proc-Type

  4. Transport layer security

  5. Stateful inspection firewall


Correct Option: A
Explanation:

This security standard does not mandate a policy for establishing trust rather each user is free to decide how much to trust each key received.

Which of the following .NET cryptographic classes provides information for a manifest signature?

  1. ManifestSignatureInformationCollection

  2. SignatureDescription

  3. ManifestSignatureInformation

  4. AsymmetricSignatureFormatter

  5. ProtectedData


Correct Option: C
Explanation:

This .NET cryptographic class provides information for a manifest signature.

A university wants to allow its students to use e-mail up to a limit of so many messages, this activity is achieved by using which of the following security techniques?

  1. Transport layer security

  2. Sender authentication

  3. Guard

  4. Stateful inspection firewall

  5. Message integrity check


Correct Option: C
Explanation:

A university wants to allow its students to use e-mail up to a limit of so many messages, this activity is achieved by this security standard.

Which of the following .NET cryptographic classes represents the abstract class from which all implementations of the message digest 5 hash algorithm inherit?

  1. MD5Cng

  2. MD5

  3. MD5CryptoServiceProvider

  4. HMACMD5

  5. ProtectedData


Correct Option: B
Explanation:

This .NET cryptographic class represents the abstract class from which all implementations of the message digest 5 hash algorithm inherit.

Which of the following security standards works with a variety of cryptographic algorithms such as DES, AES and RC2 for encryption?

  1. Certificate scheme

  2. DEK-Info

  3. Stateful inspection firewall

  4. Transport layer security

  5. Secure multipurpose internet mail extension


Correct Option: E
Explanation:

This security standard works with a variety of cryptographic algorithms such as DES, AES and RC2 for encryption.

Which of the following security mechanisms is a collection of security protocols and format allowing consumers secure usage the present credit card payment infrastructure?

  1. Message authentication code

  2. Transport layer security

  3. Non repudiation

  4. Stateful inspection firewall

  5. Secure electronic transaction


Correct Option: E
Explanation:

This security mechanism is a collection of security protocols and format allowing consumers secure usage the present credit card payment infrastructure.

Which of the following .NET cryptographic classes derives a key from a password using an extension of the PBKDF1 algorithm?

  1. PasswordDeriveBytes

  2. ProtectedData

  3. DeriveBytes

  4. CngKey

  5. CryptographicException


Correct Option: A
Explanation:

This .NET cryptographic class derives a key from a password using an extension of the PBKDF1 algorithm.

Which of the following .NET cryptographic classes provides the ability to navigate through an OidCollection object?

  1. Oid

  2. RandomNumberGenerator

  3. OidEnumerator

  4. CryptographicAttributeObjectEnumerator

  5. CryptographicAttributeObject


Correct Option: C
Explanation:

This .NET cryptographic class provides the ability to navigate through an OidCollection object.

Which of the following security techniques also called bastion host runs pseudo applications?

  1. Stateful inspection firewall

  2. Application proxy

  3. Non repudiation

  4. Message integrity check

  5. Transport layer security


Correct Option: B
Explanation:

An application proxy also called as bastion host run pseudo applications.

Which of the following .NET cryptographic classes computes masks according to PKCS#1 for use by key exchange algorithms?

  1. PKCS1MaskGeneration method

  2. MaskGeneration

  3. RandomNumberGenertor

  4. ProtectedMemory

  5. RSAPKCS1KeyExchangeDeformatter


Correct Option: A
Explanation:

This .NET cryptographic class computes masks according to PKCS#1 for use by key exchange algorithms.

By using which of the following security techniques may the user decide that certain sites such as computers on the company network are highly trustworthy but most other sites are not?

  1. Stateful inspection firewall

  2. Personal firewalls

  3. Transport layer security

  4. Sender authentication

  5. Message integrity check


Correct Option: B
Explanation:

By using this security technique, the user may decide that certain sites such as computers on the company network are highly trustworthy but most other sites are not.

Which of the following .NET cryptographic classes represents the super class for Triple data encryption standard algorithms from which all TripleDES implementations must derive?

  1. TripleDES

  2. MACTripleDES

  3. DES

  4. DESCryptoServiceProvider

  5. ProtectedMemory


Correct Option: A
Explanation:

This .NET cryptographic class represents the super class for Triple data encryption standard algorithms from which all TripleDES implementations must derive.

In which of the following security mechanisms is the data passed to a reliable transport layer protocol such as TCP?

  1. Transport layer security

  2. Secure socket layer

  3. Sender authenticity

  4. Message integrity check

  5. Stateful inspection firewall


Correct Option: B
Explanation:

In this security mechanism, the data is passed to a reliable transport layer protocol such as TCP.

- Hide questions