0

Unix Operating System

Description: Windows application security Unix/Linux and WindowsProgrammingProgramming
Number of Questions: 15
Created by:
Tags: Windows application security Unix/Linux and Windows Programming
Attempted 0/15 Correct 0 Score 0

Which of the following .Net cryptographic classes defines a wrapper objects to access the CSP implementation of the RC2 algorithms?

  1. RC2CryptoServiceProvider

  2. RC2

  3. RSACryptoServiceProvider

  4. ProtectedMemory

  5. Oid


Correct Option: A
Explanation:

It defines a wrapper object to access the CSP implementation of the RC2 algorithms.

Which of the following objects populates a DataSet and resolves updates with the data source?

  1. DataReader

  2. DataAdapter

  3. Command

  4. Connection

  5. Transaction


Correct Option: B
Explanation:

It populates a DataSet and resolves updates with the data source.

Which of the following cryptography classes computes the MD5 hash value for the input data using the implementation provided by the CSP?

  1. MD5

  2. MD5Cng

  3. MD5CryptoServiceProvider

  4. Oid

  5. ProtectedData


Correct Option: C
Explanation:

It computes the MD5 hash value for the input data using the implementation provided by the CSP.

Which of the following is a helper object that automatically generates command properties of a DataAdapter?

  1. Command

  2. Connection

  3. Transaction

  4. CommandBuilder

  5. DataReader


Correct Option: D
Explanation:

A helper object that automatically generates command properties of a DataAdapter.

Which of the following provides a simple way to create and manage the contents of a connection strings used by the connection objects?

  1. Transaction

  2. Connection

  3. DataReader

  4. Command

  5. ConnectionStringBuilder


Correct Option: E
Explanation:

It provides a simple way to create and manage the contents of connection strings used by the connection objects.

Which of the following classes implements password based key derivation functionality, PBKDF2, by using a pseudo random generator based on HMACSHA1?

  1. PasswordDeriveBytes

  2. Rfc2898DerivesBytes

  3. RandomNumberGenerator

  4. ProtectedData

  5. ProtectingMemory


Correct Option: B
Explanation:

It implements password based key derivation functionality, PBKDF2, by using a pseudo random number generator based on HMACSHA1.

Which of the following. Net Cryptographic classes computes the SHA256 hash for the input data using the managed library?

  1. SHA256Cng

  2. SHA256CryptoServiceProvider

  3. SHA256Mananged

  4. SHA1Managed

  5. RijndaelManaged


Correct Option: C
Explanation:

It computes the SHA256 hash for the input data using the managed library.

Which of the following DataAdapter methods creates a copy of the instance of DataAdapter?

  1. CreateObjRef

  2. CloneInternals

  3. CreateTableMappings

  4. Equals

  5. ConnectionString


Correct Option: B
Explanation:

It creates a copy of the instance of DataAdapter.

Which of the following DataAdapter methods is used to add a DataTable to the specified DataSet?

  1. CreateTableMappings

  2. Fill

  3. FillSchema

  4. Equals

  5. ConnectionString


Correct Option: C
Explanation:

It adds a DataTable to the specified DataSet.

Which of the following cryptographic classes computes the SHA256 hash for the input data?

  1. SHA1

  2. SHA256

  3. ShA256Cng

  4. SHA256CryptoServiceProvider

  5. ProtectedData


Correct Option: B
Explanation:

It computes the SHA256 hash for the input data.

Which of the following classes provides a Cryptography Next Generation implementation of the Secure Hash Algorithm for 384 bit hash values?

  1. SHA384

  2. SHA384Manged

  3. SHA256Cng

  4. SHA384Cng

  5. SHA1Cng


Correct Option: D
Explanation:

It provides a Cryptography Next Generation implementation of the Secure Hash Algorithm for 384 bit hash values.

Which of the following methods gets the attributes set by the user, while executing an SQL SELECT statement?

  1. Fill

  2. GetFillParameters

  3. GetHashCode

  4. Equals

  5. GetType


Correct Option: B
Explanation:

It gets the attributes set by the user when executing an SQL SELECT statement.

Which of the following classes defines a wrapper object to access the CSP implementation of the SHA384 algorithm?

  1. SHA384

  2. SHA384CryptoServiceProvider

  3. SHA384Managed

  4. SHA256CryptoServiceProvider

  5. SHA1CryptoServiceProvider


Correct Option: B
Explanation:

It defines a wrapper object to access the CSP implementation of the SHA384 algorithm.

Which of the following methods releases unmanaged resources and performs other cleanup operations before the component is reclaimed by garbage collection?

  1. Finalize

  2. GetHashCode

  3. Fill

  4. CreateObjRef

  5. DataSource


Correct Option: A
Explanation:

It releases unmanaged resources and performs other clean up operations before the component is reclaimed by garbage collection.

Which of the following .Net cryptographic classes creates Optimal Asymmetric Encryption Padding key exchange data using RSA?

  1. RSA

  2. RSAOAEPKeyExchangeDeformatter

  3. RSAOAEPKeyExchangeFormatter

  4. RSAPKCS1KeyExchangeFormatter

  5. ProtectedData


Correct Option: C
Explanation:

It creates Optimal Asymmetric Encryption Padding key exchange data using RSA.

- Hide questions