Quizzes Index
Security Programming Quiz
by Monica Pawlan
(December 1998)
This short quiz tests your knowledge of the Java® 2 security features. If you do not know an answer, take your best guess.
What does the
java.security.manager
option do?
A.
Starts an applet in a restricted environment.
B.
Starts a security tool in a restricted environment.
C.
Starts an application in a restricted environment.
D.
Signs an applet.
What is Key Tool?
A.
Command-line script for managing key pairs.
B.
Graphical User Interface for managing key pairs.
C.
Command-line script for assigning permissions to programs.
D.
Graphical user interface for assigning permissions to programs.
What is Policy Tool?
A.
Command-line script for managing key pairs.
B.
Graphical User Interface for managing key pairs.
C.
Command-line script for assigning permissions to programs.
D.
Graphical user interface for assigning permissions to programs.
What is a message digest?
A.
A secret value for encrypting and decrypting messages.
B.
A unique and reliable hash that lets the receiver know the message received is the message sent.
C.
A way to control who receives a message.
D.
A cryptographic service implementation from a specific vendor.
What do you use to encrypt a message?
A.
A message digest with an encryption key.
B.
A digital signature with a message digest.
C.
A cipher with an encryption key.
D.
An encryption key with a digital signature.
What does a certificate do?
A.
Guards against the possibility that an encryption key has been illicitly changed.
B.
Certifies the accuracy of a message digest.
C.
Authorizes the user of a digital signature.
D.
Certifies that a provider is in full compliance with all United States export regulations.
Why are the encryption and decryption APIs a standard extension to Java 2?
A.
To separate encryption and decryption from key generation.
B.
To prevent illicit signatures.
C.
To keep software not exportable outside the United States and Canada separate from software that is exportable.
D.
To confuse secret agents, traitors, and spies.
What is symmetric key encryption?
A.
Encrypting a message on the sending and receiving sides.
B.
Decrypting a message on the sending and receiving sides.
C.
Using a public and private key pair.
D.
Using a single key to encrypt and decrypt a message.
What is a Key Agreement?
A.
A way for several parties to agree on a shared secret without exchanging any secret information.
B.
A way to encrypt a serialized object with a key.
C.
Using the same key to encrypt and decrypt a message.
D.
Another word for plain text.
What is asymmetric key encryption?
A.
Encrypting a message on the sending and receiving sides.
B.
Decrypting a message on the sending and receiving sides.
C.
Using a public and private key pair.
D.
Using a single key to encrypt and decrypt a message.
[ This page was updated: 27-Sep-2000 ]
Products & APIs
|
Developer Connection
|
Docs & Training
|
Online Support
Community Discussion
|
Industry News
|
Solutions Marketplace
|
Case Studies
Glossary
|
Feedback
|
A-Z Index
For more information on Java technology
and other software from Sun Microsystems, call:
(800) 786-7638
Outside the U.S. and Canada, dial your country's
AT&T Direct Access Number
first.
Copyright © 1995-2000
Sun Microsystems, Inc.
All Rights Reserved.
Terms of Use
.
Privacy Policy
.