Beruflich Dokumente
Kultur Dokumente
Lesson 22
2013 P. Janson
1 of 25
IT Security
GSS-API provides
A. Cryptographic device services B. Authentication, confidentiality, and integrity services across a plain network protocol stack C. Authentication, confidentiality, and integrity services as part of an extended network protocol stack
36% 36%
21%
8% 0%
Cr yp to gr ap hi Au cd th ev en ice tic se at rv io Au ... n, th co en nf tic id at en i o ti. Co n, .. m c on pr f id eh en en siv ti. Ce .. e nt w ra eb liz ap ed pl cr ... yp to gr ap hi c.. .
2013 P. Janson 3 of 25
IT Security
PKCS#11 provides
A. Cryptographic device services B. Authentication, confidentiality, and integrity services across a plain network protocol stack C. Authentication, confidentiality, and integrity services as part of an extended network protocol stack
52%
29% 17% 0% 2%
2013 P. Janson
Cr yp to gr ap hi Au cd th ev en ice tic se at rv io Au ... n, th co en nf tic id at en i o ti. Co n, .. m c on pr f id eh en en siv ti. Ce .. e nt w ra eb liz ap ed pl cr ... yp to gr ap hi c.. .
4 of 25
IT Security
KMIP provides
A. Cryptographic device services B. Authentication, confidentiality, and integrity services across a plain network protocol stack C. Authentication, confidentiality, and integrity services as part of an extended network protocol stack
78%
12% 2% 0%
8%
2013 P. Janson
Cr yp to gr ap hi Au cd th ev en ice tic se at rv io Au ... n, th co en nf tic id at en i o ti. Co n, .. m c on pr f id eh en en siv ti. Ce .. e nt w ra eb liz ap ed pl cr ... yp to gr ap hi c.. .
5 of 25
IT Security
ESAPI provides
A. Cryptographic device services B. Authentication, confidentiality, and integrity services across a plain network protocol stack C. Authentication, confidentiality, and integrity services as part of an extended network protocol stack
70%
26%
2%
2%
0%
2013 P. Janson
Cr yp to gr ap hi Au cd th ev en ice tic se at rv io Au ... n, th co en nf tic id at en i o ti. Co n, .. m c on pr f id eh en en siv ti. Ce .. e nt w ra eb liz ap ed pl cr ... yp to gr ap hi c.. .
6 of 25
IT Security
SASL provides
A. Cryptographic device services B. Authentication, confidentiality, and integrity services across a plain network protocol stack C. Authentication, confidentiality, and integrity services as part of an extended network protocol stack
87%
2%
9% 0%
2%
2013 P. Janson
Cr yp to gr ap hi Au cd th ev en ice tic se at rv io Au ... n, th co en nf tic id at en i o ti. Co n, .. m c on pr f id eh en en siv ti. Ce .. e nt w ra eb liz ap ed pl cr ... yp to gr ap hi c.. .
7 of 25
IT Security
JCA provides
A. Cryptographic library services B. Authentication, confidentiality, and integrity services across a plain network protocol stack C. Authentication, confidentiality, and integrity services as part of an extended network protocol stack
60%
21% 13% 4% 2%
2013 P. Janson
IT Security
JSSE provides
A. Cryptographic library services B. Java security services C. Secure socket services D. JPEG secure signature encapsulation E. None of the above
46% 46%
2%
er v. ..
4%
2%
2013 P. Janson
ib Cr yp to gr ap hi cl
Ja
va se cu
ra ry s