File APIs for Java Developers
Manipulate DOC, XLS, PPT, PDF and many others from your application.
http://aspose.com/file-tools
Win a copy of Clojure in Action this week in the Clojure forum!
  • Post Reply
  • Bookmark Topic Watch Topic
  • New Topic

Help required to solve two drag and drop questions

 
dinesh garg
Greenhorn
Posts: 3
  • 0
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
help required to solve two drag and drop questions

Question 1:
----------------------------------------------------------
1) Verification of identity --->
2) presenting of false identity --->
3) impeding legitimate use --->
4) protection of backup tapes --->
5) improperly altering data --->


choices
A Spoofing
B Authentication
C Denial of services
D physical security
E Tampering

We need to match 1,2,3.. to A,b,c..
-----------------------------------------------------------
Answer :1 i am thinking
1-B
2-A
3-C
4-D
5-E





Question 2:
----------------------------------------------------------
1) Used for bulk encryption of data in an established channel --->
2) Encapsulate protocol negotiation , key exchange , and communication --->
3) Establish secure communication with previous unknown parties --->
4) Can attest to a principle having been associated with data --->



choices
A Digital Signature
B SSL
C Asymmetric Encryption
D Symmetric Encryption


We need to match 1,2,3.. to A,b,c..
-----------------------------------------------------------
Answer :2 i am thinking
1-A
2-B
3-C
4-D

pl send your comment /answers
 
Zach Cui
Greenhorn
Posts: 2
  • 0
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
I believe for Question 2, the correct answers sequence should be
1-D, "symmetric encryption" is suitable for "bulk encryption"
2-B, "protocol" mentioned is "SSL"
3-C, "asymmetric encryption" used when "unknown parties" are involved
4-A, "digital signature" can attest to this
 
Pawel Piwowar
Greenhorn
Posts: 21
  • 0
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Question 1: Your answers seem to be correct.

Question 2:
1-D : Symmetric encryption could be used for data exchange after initial asymmetric key exchange, see explanation here : http://www.suse.de/~garloff/Writings/mutt_gpg/node3.html
2-B
3-C
4-A : Digital signature : message digest generated using hash algorithm (for example SHA-256) is encrypted with user private key and attached to the message. The receiver of the message will be able to decrypt this digital signature using sender public key. If he succeeded, it means, that the signature was indeed generated by a sender. Then he can generate the hash from the message and compare it with the original hash value (decrypted in previous step). If they match, it means, that the message was not changed during transmission and it was send by a sender.
Digest value is used here because asymmetric encryption is expensive and operating on short hash values instead of the whole message is much quicker.

Regards,

Pawel Piwowar
 
deepak adlakha
Ranch Hand
Posts: 325
  • 0
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Quick Question, in which mock exam did you get these questions ?
 
dinesh garg
Greenhorn
Posts: 3
  • 0
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
i saw these questions orkut community .. i had some doubt that why i asked here ....in coderanch the palace where where so many java developer visits
 
It is sorta covered in the JavaRanch Style Guide.
  • Post Reply
  • Bookmark Topic Watch Topic
  • New Topic