1. Trang chủ
  2. » Giáo Dục - Đào Tạo

session 4 module 5

2 8 0

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 2
Dung lượng 23,11 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Which of the following statements about cryptography are true and which are false?. True B The secret key cryptography transforms the plaintext, to ciphertext, by an input secret key and

Trang 1

ACCP i10 SEMESTER 2 APJ-II – Advanced Programming in Java - II

MODULAR QUIZ

FOR Module 5 – Crytography

1. Which of the following statements about cryptography are true and which are false ?

(A) The Tamper-proofing process verifies whether the data received by the

receiver is the same data as sent by the sender

True

(B) The secret key cryptography transforms the plaintext, to ciphertext, by an

input secret key and decrypted by another output secret key False (C) Spoofing or identity interception, which means impersonating the identity of

a different user and use it in an unauthorized way

True

(D) Authentication is the process that provides tamper-proofing, while it is on the

(E) Hash functions or message digests are algorithms that use no key for data

encryption

True

2. Which of the following statements about selectors are true and which are false?

(A) The Java Cryptography Extension (JCE) defines a Java class for each service

class like HessageDigest, signature, and KeyPairGenerator

False

(B) The message digest class is used to calculate the message digest or hash

(C) The Java Cryptography Architecture (JCA) is a Java framework to access and

develop cryptographic functionality, and forms part of the Java security API

True

(D) Cryptography service provider provides implementation independence and

interoperability in order to implement the cryptographic concepts

True

(E) The Keystore class specifies the fUnctionality shared by all opaque key

objects

False

3. Can you match the properties with the corresponding descriptions?

A. Provides the classes and interfaces to perform

cryptographic operations

(1) Symmetric block encryption

B. Uses a small piece of information to authenticate

a message

(2) JCE

C. Applies an encryption key to every single bit

present in an input stream of plaintext

(3) javax.cryto

D. Divides the input stream into fixed-size chunks (4) MAC

Trang 2

and an encryption key is applied to each chunk

E. Extends the underlying architecture of JCA

framework to implement encryption and key

exchange

(5) Symmetric stream encryption

Answer : A-3; B-4; C-5; D-1; E-2

4. Which of the following statements about Cipher class and encryption are true and which are false?

(D) The method getInstance() initialises a Cipher class instance False (E) The update () method is used to encrypt and decrypt data in multiple steps True

5. Can you arrange the steps for creating a cipher for encrypting data using password (assuming appropriate variables and instances are declared already?)

(A) PBEKeySpec pbeks = new PBEKeySpec (password.toCharArray());

(B) SecretKeyFactory skf1 =

(C) SecureRandom sr = SecureRandom.getInstance(“SHA1PRNG”);

(D) PBEParaneterSpec pbeps = new PBEParanieterSpec(salt, 200);

(E) Cipher cip = Cipher.getInstance(“PBEWithMD5AndTrip1eDES”);

Answer : E-A-B-D-C

Ngày đăng: 27/10/2019, 10:12

w