Match each item with a statement below:
A. considered the core API set of the Java programming that is built around the java.security package and its subpackages
B. provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths
C. provides interfaces and classes for key specifications and algorithm parameter specifications
D. a set of rules for encoding ASN.1 objects into a sequence of octets
E. a language for abstractly describing messages to be exchanged over a variety of networks
F. provides verification of the original content of the message
G. also called symmetric key encryption, since the sender and recipient use the same key for encryption/decryption
H. additional data added to plaintext in order to make it divisible by the cipher's block size
I. provides the functionality of a cryptographic cipher for encryption and decryption
A. JCA
B. java.security.cert
C. java.security.spec
D. DER
E. ASN
F. Message digest
G. Secret key encryption
H. Padding
I. Cipher class
You might also like to view...
The Index group used for marking index entries and creating indexes is located on the ________ tab
A) Insert B) Page Layout C) Design D) References
__________ anomaly watches for unusual traffic activities, such as a flood of UDP packets or a new service appearing on the network.
Fill in the blank(s) with the appropriate word(s).