Java Technology Home Page
A-Z Index

Java Developer Connection(SM)
Quizzes

Downloads, APIs, Documentation
Java Developer Connection
Tutorials, Tech Articles, Training
Online Support
Community Discussion
News & Events from Everywhere
Products from Everywhere
How Java Technology is Used Worldwide
Print Button
 
Quizzes Index

Security Programming Quiz

by Monica Pawlan

(December 1998)

Swinging Duke This short quiz tests your knowledge of the Java® 2 security features. If you do not know an answer, take your best guess.


  1. What does the java.security.manager option do?
     A. Starts an applet in a restricted environment.
     B. Starts a security tool in a restricted environment.
     C. Starts an application in a restricted environment.
     D. Signs an applet.

  2. What is Key Tool?
     A. Command-line script for managing key pairs.
     B. Graphical User Interface for managing key pairs.
     C. Command-line script for assigning permissions to programs.
     D. Graphical user interface for assigning permissions to programs.

  3. What is Policy Tool?
     A. Command-line script for managing key pairs.
     B. Graphical User Interface for managing key pairs.
     C. Command-line script for assigning permissions to programs.
     D. Graphical user interface for assigning permissions to programs.

  4. What is a message digest?
     A. A secret value for encrypting and decrypting messages.
     B. A unique and reliable hash that lets the receiver know the message received is the message sent.
     C. A way to control who receives a message.
     D. A cryptographic service implementation from a specific vendor.

  5. What do you use to encrypt a message?
     A. A message digest with an encryption key.
     B. A digital signature with a message digest.
     C. A cipher with an encryption key.
     D. An encryption key with a digital signature.

  6. What does a certificate do?
     A. Guards against the possibility that an encryption key has been illicitly changed.
     B. Certifies the accuracy of a message digest.
     C. Authorizes the user of a digital signature.
     D. Certifies that a provider is in full compliance with all United States export regulations.

  7. Why are the encryption and decryption APIs a standard extension to Java 2?
     A. To separate encryption and decryption from key generation.
     B. To prevent illicit signatures.
     C. To keep software not exportable outside the United States and Canada separate from software that is exportable.
     D. To confuse secret agents, traitors, and spies.

  8. What is symmetric key encryption?
     A. Encrypting a message on the sending and receiving sides.
     B. Decrypting a message on the sending and receiving sides.
     C. Using a public and private key pair.
     D. Using a single key to encrypt and decrypt a message.

  9. What is a Key Agreement?
     A. A way for several parties to agree on a shared secret without exchanging any secret information.
     B. A way to encrypt a serialized object with a key.
     C. Using the same key to encrypt and decrypt a message.
     D. Another word for plain text.

  10. What is asymmetric key encryption?
     A. Encrypting a message on the sending and receiving sides.
     B. Decrypting a message on the sending and receiving sides.
     C. Using a public and private key pair.
     D. Using a single key to encrypt and decrypt a message.


Print Button
[ This page was updated: 27-Sep-2000 ]
Products & APIs | Developer Connection | Docs & Training | Online Support
Community Discussion | Industry News | Solutions Marketplace | Case Studies
Glossary | Feedback | A-Z Index
For more information on Java technology
and other software from Sun Microsystems, call:
(800) 786-7638
Outside the U.S. and Canada, dial your country's AT&T Direct Access Number first.
Sun Microsystems, Inc.
Copyright © 1995-2000 Sun Microsystems, Inc.
All Rights Reserved. Terms of Use. Privacy Policy.