Match each item with a statement below:

A. considered the core API set of the Java programming that is built around the java.security package and its subpackages
B. provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
C. provides interfaces and classes for key specifications and algorithm parameter specifications
D. a set of rules for encoding ASN.1 objects into a sequence of octets
E. a language for abstractly describing messages to be exchanged over a variety of networks
F. provides verification of the original content of the message
G. also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
H. additional data added to plaintext in order to make it divisible by the cipher's block size
I. provides the functionality of a cryptographic cipher for encryption and decryption


A. JCA
B. java.security.cert
C. java.security.spec
D. DER
E. ASN
F. Message digest
G. Secret key encryption
H. Padding
I. Cipher class

Computer Science & Information Technology

You might also like to view...

A set of statements must be executed an unknown number of times, and possibly not executed at all. Which loop statement should not be used to control the execution of this set of statements?

a) while b) for c) do d) repeat e) Any of these loop statements can be used.

Computer Science & Information Technology

A class contains-or, in OOP terms, it ____-all of the attributes and behaviors of the object it instantiates.

A. encapsulates B. exposes C. collapses D. implements

Computer Science & Information Technology

The _________________________ architecture avoids resource constraints that can occur when IT resources are shared by multiple cloud consumers.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

After a function has been declared as virtual, the return type and parameter list of all subsequent derived class override versions must change.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology