Unix Operating System
Description: Windows application security Unix/Linux and WindowsProgrammingProgramming | |
Number of Questions: 15 | |
Created by: Niharika Sharma | |
Tags: Windows application security Unix/Linux and Windows Programming |
Which of the following .Net cryptographic classes defines a wrapper objects to access the CSP implementation of the RC2 algorithms?
Which of the following objects populates a DataSet and resolves updates with the data source?
Which of the following cryptography classes computes the MD5 hash value for the input data using the implementation provided by the CSP?
Which of the following is a helper object that automatically generates command properties of a DataAdapter?
Which of the following provides a simple way to create and manage the contents of a connection strings used by the connection objects?
Which of the following classes implements password based key derivation functionality, PBKDF2, by using a pseudo random generator based on HMACSHA1?
Which of the following. Net Cryptographic classes computes the SHA256 hash for the input data using the managed library?
Which of the following DataAdapter methods creates a copy of the instance of DataAdapter?
Which of the following DataAdapter methods is used to add a DataTable to the specified DataSet?
Which of the following cryptographic classes computes the SHA256 hash for the input data?
Which of the following classes provides a Cryptography Next Generation implementation of the Secure Hash Algorithm for 384 bit hash values?
Which of the following methods gets the attributes set by the user, while executing an SQL SELECT statement?
Which of the following classes defines a wrapper object to access the CSP implementation of the SHA384 algorithm?
Which of the following methods releases unmanaged resources and performs other cleanup operations before the component is reclaimed by garbage collection?
Which of the following .Net cryptographic classes creates Optimal Asymmetric Encryption Padding key exchange data using RSA?