File APIs for Java Developers
Manipulate DOC, XLS, PPT, PDF and many others from your application.
http://aspose.com/file-tools
The moose likes Architect Certification (SCEA/OCMJEA) and the fly likes Help required to solve two drag and drop questions Big Moose Saloon
  Search | Java FAQ | Recent Topics | Flagged Topics | Hot Topics | Zero Replies
Register / Login
JavaRanch » Java Forums » Certification » Architect Certification (SCEA/OCMJEA)
Bookmark "Help required to solve two drag and drop questions" Watch "Help required to solve two drag and drop questions" New topic
Author

Help required to solve two drag and drop questions

dinesh garg
Greenhorn

Joined: Feb 13, 2010
Posts: 3
help required to solve two drag and drop questions

Question 1:
----------------------------------------------------------
1) Verification of identity --->
2) presenting of false identity --->
3) impeding legitimate use --->
4) protection of backup tapes --->
5) improperly altering data --->


choices
A Spoofing
B Authentication
C Denial of services
D physical security
E Tampering

We need to match 1,2,3.. to A,b,c..
-----------------------------------------------------------
Answer :1 i am thinking
1-B
2-A
3-C
4-D
5-E





Question 2:
----------------------------------------------------------
1) Used for bulk encryption of data in an established channel --->
2) Encapsulate protocol negotiation , key exchange , and communication --->
3) Establish secure communication with previous unknown parties --->
4) Can attest to a principle having been associated with data --->



choices
A Digital Signature
B SSL
C Asymmetric Encryption
D Symmetric Encryption


We need to match 1,2,3.. to A,b,c..
-----------------------------------------------------------
Answer :2 i am thinking
1-A
2-B
3-C
4-D

pl send your comment /answers
Zach Cui
Greenhorn

Joined: Feb 12, 2010
Posts: 2
I believe for Question 2, the correct answers sequence should be
1-D, "symmetric encryption" is suitable for "bulk encryption"
2-B, "protocol" mentioned is "SSL"
3-C, "asymmetric encryption" used when "unknown parties" are involved
4-A, "digital signature" can attest to this


SCJP 5,SCJD,SCWCD,SCBCD,SCDJWS,SCEA 5
Pawel Piwowar
Greenhorn

Joined: Feb 12, 2010
Posts: 21
Question 1: Your answers seem to be correct.

Question 2:
1-D : Symmetric encryption could be used for data exchange after initial asymmetric key exchange, see explanation here : http://www.suse.de/~garloff/Writings/mutt_gpg/node3.html
2-B
3-C
4-A : Digital signature : message digest generated using hash algorithm (for example SHA-256) is encrypted with user private key and attached to the message. The receiver of the message will be able to decrypt this digital signature using sender public key. If he succeeded, it means, that the signature was indeed generated by a sender. Then he can generate the hash from the message and compare it with the original hash value (decrypted in previous step). If they match, it means, that the message was not changed during transmission and it was send by a sender.
Digest value is used here because asymmetric encryption is expensive and operating on short hash values instead of the whole message is much quicker.

Regards,

Pawel Piwowar


SCJP 5, SCWCD 1.4, SCBCD 5, SCEA part1
deepak adlakha
Ranch Hand

Joined: Jul 27, 2001
Posts: 325
Quick Question, in which mock exam did you get these questions ?
dinesh garg
Greenhorn

Joined: Feb 13, 2010
Posts: 3
i saw these questions orkut community .. i had some doubt that why i asked here ....in coderanch the palace where where so many java developer visits
 
I agree. Here's the link: http://aspose.com/file-tools
 
subject: Help required to solve two drag and drop questions