Sie sind auf Seite 1von 8

IT Security

Lesson 22

Assurance quick quiz

2013 P. Janson

1 of 25

IT Security

GSS-API provides

A. Cryptographic device services B. Authentication, confidentiality, and integrity services across a plain network protocol stack C. Authentication, confidentiality, and integrity services as part of an extended network protocol stack

36% 36%

D. Comprehensive web application security services


E. Centralized cryptographic key lifecycle management services

21%

8% 0%
Cr yp to gr ap hi Au cd th ev en ice tic se at rv io Au ... n, th co en nf tic id at en i o ti. Co n, .. m c on pr f id eh en en siv ti. Ce .. e nt w ra eb liz ap ed pl cr ... yp to gr ap hi c.. .
2013 P. Janson 3 of 25

IT Security

PKCS#11 provides

A. Cryptographic device services B. Authentication, confidentiality, and integrity services across a plain network protocol stack C. Authentication, confidentiality, and integrity services as part of an extended network protocol stack

52%

D. Comprehensive web application security services


E. Centralized cryptographic key lifecycle management services

29% 17% 0% 2%

2013 P. Janson

Cr yp to gr ap hi Au cd th ev en ice tic se at rv io Au ... n, th co en nf tic id at en i o ti. Co n, .. m c on pr f id eh en en siv ti. Ce .. e nt w ra eb liz ap ed pl cr ... yp to gr ap hi c.. .
4 of 25

IT Security

KMIP provides

A. Cryptographic device services B. Authentication, confidentiality, and integrity services across a plain network protocol stack C. Authentication, confidentiality, and integrity services as part of an extended network protocol stack

78%

D. Comprehensive web application security services


E. Centralized cryptographic key lifecycle management services

12% 2% 0%

8%

2013 P. Janson

Cr yp to gr ap hi Au cd th ev en ice tic se at rv io Au ... n, th co en nf tic id at en i o ti. Co n, .. m c on pr f id eh en en siv ti. Ce .. e nt w ra eb liz ap ed pl cr ... yp to gr ap hi c.. .
5 of 25

IT Security

ESAPI provides

A. Cryptographic device services B. Authentication, confidentiality, and integrity services across a plain network protocol stack C. Authentication, confidentiality, and integrity services as part of an extended network protocol stack

70%

D. Comprehensive web application security services


E. Centralized cryptographic key lifecycle management services

26%

2%

2%

0%

2013 P. Janson

Cr yp to gr ap hi Au cd th ev en ice tic se at rv io Au ... n, th co en nf tic id at en i o ti. Co n, .. m c on pr f id eh en en siv ti. Ce .. e nt w ra eb liz ap ed pl cr ... yp to gr ap hi c.. .
6 of 25

IT Security

SASL provides

A. Cryptographic device services B. Authentication, confidentiality, and integrity services across a plain network protocol stack C. Authentication, confidentiality, and integrity services as part of an extended network protocol stack

87%

D. Comprehensive web application security services


E. Centralized cryptographic key lifecycle management services

2%

9% 0%

2%

2013 P. Janson

Cr yp to gr ap hi Au cd th ev en ice tic se at rv io Au ... n, th co en nf tic id at en i o ti. Co n, .. m c on pr f id eh en en siv ti. Ce .. e nt w ra eb liz ap ed pl cr ... yp to gr ap hi c.. .
7 of 25

IT Security

JCA provides

A. Cryptographic library services B. Authentication, confidentiality, and integrity services across a plain network protocol stack C. Authentication, confidentiality, and integrity services as part of an extended network protocol stack

60%

D. Comprehensive web application security services


E. Centralized cryptographic key lifecycle management services

21% 13% 4% 2%

2013 P. Janson

Cr yp to gr ap hi Au cl th ib ra en ry tic se at rv io Au ... n, th co en nf tic id at en i o ti. Co n, .. m c on pr f id eh en en siv ti. Ce .. e nt w ra eb liz ap ed pl cr ... yp to gr ap hi c.. .


8 of 25

IT Security

JSSE provides

A. Cryptographic library services B. Java security services C. Secure socket services D. JPEG secure signature encapsulation E. None of the above

46% 46%

2%
er v. ..

4%

2%

2013 P. Janson

rit ys Se cu er vic re JP so es EG ck se et cu se re rv sig ic e na s tu re en No ... ne of th ea bo ve


9 of 25

ib Cr yp to gr ap hi cl

Ja

va se cu

ra ry s

Das könnte Ihnen auch gefallen