单选题You are developing a method to decrypt data that was encrypted with the Triple DES Algorithm. The method accepts the following parameters:  The byte array to be decrypted, which is named cipherMessage  The key, which is named key   An initialization vector, which is named iv  You need to decrypt the message by using the TripleDES class and place the result in a string.  Which code segment should you use?()A AB BC CD D

单选题
You are developing a method to decrypt data that was encrypted with the Triple DES Algorithm. The method accepts the following parameters:  The byte array to be decrypted, which is named cipherMessage  The key, which is named key   An initialization vector, which is named iv  You need to decrypt the message by using the TripleDES class and place the result in a string.  Which code segment should you use?()
A

A

B

B

C

C

D

D


参考解析

解析: 暂无解析

相关考题:

You are developing a client that sends several types of SOAP messages to a Windows Communication Foundation (WCF) service method named PostData. PostData is currently defined as follows:[OperationContract]void PostData(Order data);You need to modify PostData so that it can receive any SOAP message. Which code segment should you use?()A. [OperationContract(IsOneWay=true, Action=*, ReplyAction=*)] void PostData(Order data);B. [OperationContract(IsOneWay=true, Action=*, ReplyAction = *)] void PostData(BodyWriter data);C. [OperationContract] void PostData(BodyWriter data);D. [OperationContract] void PostData(Message data);

You opened the encryption wallet and then issued the following command:Then you closed the wallet. Later, you issued the following command to create the EMPLOYEES table in the SECURESPACE tablespace and you use the NO SALT option for the EMPID column.What is the outcome?()A. It creates the table and encrypts the data in it.B. It generates an error because the wallet is closed.C. It creates the table but does not encrypt the data in it.D. It generates an error because the NO SALT option cannot be used with the ENCRYPT option.

USER_DATA is a nonencrypted tablespace that contains a set of tables with data. You want to convert all existing data in the USER_DATA tablespace and the new data into the encrypted format.Which methodswould you use to achieve this?()A. Use Data Pump to transfer the existing data to a new encrypted tablespaceB. Use ALTER TABLE MOVE to transfer the existing data to a new encrypted tablespaceC. Use CREATE TABLE AS SELECT to transfer the existing data to a new encrypted tablespaceD. Enable row movement for each table to be encrypted and then use ALTER TABLESPACE to encrypt the tablespaceE. Encrypt the USER_DATA tablespace using the ALTER TABLESPACE statement so that all the data in the tablespace is automatically encrypted

You created an encrypted tablespace:You then closed the encryption wallet because you were advised that this is secure.Later in the day, you attempt to create the EMPLOYEES table in the SECURESPACE tablespace with the SALT option on the EMPLOYEE column.Which is true about the result?()A. It creates the table successfully but does not encrypt any inserted data in the EMPNAME column because the wallet must be opened to encrypt columns with SALT.B. It generates an error when creating the table because the wallet is closed.C. It creates the table successfully, and encrypts any inserted data in the EMPNAME column because the wallet needs to be open only for tablespace creation.D. It generates error when creating the table, because the salt option cannot be used with encrypted tablespaces.

You want your Catalyst switch to implement a switching method that holds a packet in its memory until the data portion of the respected packet reaches the switch.Which method should you employ on your Catalyst switch?()A、Fast ForwardB、Store and forwardC、Frag-freeD、None of the above

USER_DATA is a nonencrypted tablespace that contains a set of tables with data. You want to convert all existing data in the USER_DATA tablespace and the new data into the encrypted format. Which methodswould you use to achieve this?()A、Use Data Pump to transfer the existing data to a new encrypted tablespaceB、Use ALTER TABLE MOVE to transfer the existing data to a new encrypted tablespaceC、Use CREATE TABLE AS SELECT to transfer the existing data to a new encrypted tablespaceD、Enable row movement for each table to be encrypted and then use ALTER TABLESPACE to encrypt the tablespaceE、Encrypt the USER_DATA tablespace using the ALTER TABLESPACE statement so that all the data in the tablespace is automatically encrypted

You are developing a client that sends several types of SOAP messages to a Windows Communication Foundation (WCF) service method named PostData. PostData is currently defined as follows:[OperationContract]void PostData(Order data);You need to modify PostData so that it can receive any SOAP message. Which code segment should you use?()A、[OperationContract(IsOneWay=true, Action="*", ReplyAction="*")] void PostData(Order data);B、[OperationContract(IsOneWay=true, Action="*", ReplyAction = "*")] void PostData(BodyWriter data);C、[OperationContract] void PostData(BodyWriter data);D、[OperationContract] void PostData(Message data);

You are developing a WCF service. The service includes an operation names GetProduct. You need to ensure that GetProduct will accept a POST request and will indicate that the returned data is XML.   Which two actions should you perform?()A、Add the WebGet attribute to the service contract.B、Set WebOperationContext.Current.OutgoingRequest.ContentType to "text/xml" in the GetProduct method.C、Add the WebInvoke attribute to the service contract.D、Set WebOperationContext.Current.OutgoingResponse.ContentType to "text/xml" in the GetProduct method.

You are developing a custom-collection class.You need to create a method in your class. You need to ensure that the method you create in your class returns a type that is compatible with the Foreach statement. Which criterion should the method meet?()A、The method must return a type of either IEnumerator or IEnumerable.B、The method must return a type of IComparable.C、The method must explicitly contain a collection.D、The method must be the only iterator in the class.

Your Windows 2000 Professionally computer belongs to the contoso.com domain. You need to encrypt a compressed file named C:/data. You successfully encrypt the file but discover that it is no longer compressed.   What is the most likely cause of this problem?()A、Group Policy is preventing the compression of encrypted files.B、The file is stored on a FAT32 partition.C、Only members of the Administrators and the Power Users groups can compress and encrypt files.D、Encrypted files cannot be compressed.

You are developing a Windows Communication Foundation (WCF) service. You write a method named Submit that accepts messages of the type System.ServiceModel.Channels.Message. You need to process the body of the incoming messages multiple times in the method. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)()A、Use the GetBody method of the Message class to read the content of the messages.B、Use the CreateBufferedCopy method of the Message class to load the messages into memory.C、Use the WriteBodyContents method of the BodyWriter class to make a copy of the messages.D、Use the CreateMessage method of the MessageBuffer class to make a copy of the messages.

You need to recommend a BitLocker recovery method that meets the company’s technical requirements.   Which recovery method should you recommend?()A、a data recovery agentB、a recovery keyC、a recovery password printed and stored in a secure locationD、a recovery password stored in Active Directory

You are developing an ASP.NET Web page that will display the median value from a sequence of integer values. You need to create an extension method to compute the median value. Which interface should you add the extension method to?()A、 IComparerTB、 IEnumerableTC、 IEnumeratorT  D、 IEqualityComparerT

You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()A、Encrypt customer information when it is stored and when it is being transmittedB、Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter networkC、Encrypt all marketing information on file servers and client computersD、Require encrypted connections to all file servers

单选题You are developing a data contract for a Windows Communication Foundation (WCF) service. The data in the data contract must participate in round trips. Strict schema validity is not required. You need to ensure that the contract is forward-compatible and allows new data members to be added to it. Which interface should you implement in the data contract class?()AICommunicationObjectBIExtensionCIExtensibleObjectDIExtensibleDataObject

单选题You need to recommend a BitLocker recovery method that meets the company’s technical requirements.   Which recovery method should you recommend?()Aa data recovery agentBa recovery keyCa recovery password printed and stored in a secure locationDa recovery password stored in Active Directory

单选题You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()AEncrypt customer information when it is stored and when it is being transmittedBRequire encrypted connections to the public Web site, which is hosted on the Web server on the perimeter networkCEncrypt all marketing information on file servers and client computersDRequire encrypted connections to all file servers

单选题You manage a computer running Windows 2000 Professional that belongs to a workgroup. You create a new user account (Tony) on that computer that is not a member of the Administrators group. You log on using the new account. You create a file with notepad in a folder that is on a volume formatted with NTFS. You encrypt the file. You give another user account defined on that computer, Luis the permission to take ownership of the file. Luis logs on using the account and takes ownership. However, she receives an error message reporting that access is denied when she tries to open the file. What can you do to allow Luis to open the file?()AInstruct Luis to decrypt the file before she tries to open it.BLog on with the account Tony and decrypt the file.CMove the file to a folder that is not encrypted on a different volume that is formatted with NTFS.DMove the file to a folder that is not encrypted on the same volume.

单选题You are developing an ASP.NET Web page that will display the median value from a sequence of integer values. You need to create an extension method to compute the median value. Which interface should you add the extension method to?()A IComparerTB IEnumerableTC IEnumeratorT  D IEqualityComparerT

单选题You work as an application developer at Certkiller .com. You are developing an application that makes use of a Queue class object named MyQueue. This Queue class object will be used to store messages sent by the user during application run time. The application that you are developing provides an interface for administrators and an interface for users to create message reports.You want to ensure that all user messages stored in the MyQueue object are removed when an administrator selects the reset option.What should you do?()A Use the Enqueue method of the MyQueue object.B Use the Clear method of the MyQueue object.C Use the Dequeue method of the MyQueue object.D Use the TrimToSize method of the MyQueue object.

单选题You are developing an ASP.NET Dynamic Data Web application. Boolean fields must display as Yes or No instead of as a check box. You replace the markup in the default Boolean field template with the following markup.You need to implement the code that displays Yes or No. Which method of the FieldTemplateUserControl class should you override in the BooleanField class?()AOnLoadBConstructCOnDataBindingDSaveControlState

单选题You opened the encryption wallet and then issued the following command:   SQLCREATE TABLESPACE securespace DATAFILE ’/home/user/oradata/secure01.dbf’ SIZE 150M  ENCRYPTION USING ’3DES168’ DEFAULT STORAGE(ENCRYPT);   Then you closed the wallet. Later, you issued the following command to create theEMPLOYEES table in the SECURESPACE tablespace and you use the NO SALT option for the EMPID column.  What is the outcome?()A It creates the table and encrypts the data in it.B It generates an error because the wallet is closed.C It creates the table but does not encrypt the data in it.D It generates an error because the NO SALT option cannot be used with the ENCRYPT option.

单选题You are developing an ASP.NET MVC 2 Web application. A page makes an AJAX request and expects a list of company names in the following format. ["Adventure Works","Contoso"] You need to write an action method that returns the response in the correct format. Which type should you return from the action method?()AAjaxHelperBXDocumentCJsonResultDDataContractJsonSerializer

单选题You are using flat files as the data source for one of your data warehousing applications. You plan to move the data from the flat file structures to an Oracle database to optimize the application performance. In your database you have clustered tables.  While migrating the data, you want to have minimal impact on the database performance and optimize the data load operation. Which method would you use to load data into Oracle database?()Ause the external table populationBuse the Oracle Data Pump export and import utilityCuse the conventional path data load of SQL*Loader utilityDuse the direct path data load of Oracle export and import utility

单选题You work as an application developer at Certkiller .com. You are developing an application that makes use of a Queue class object named MyQueue. This Queue class object will be used to store messages sent by the user during application run time.You would like to access the message at the beginning of the queue, prior to processing the user messages, without removing it. What should you do?()A Use the Enqueue method of the MyQueue object.B Use the Contains method of the MyQueue object.C Use the Dequeue method of the MyQueue object.D Use the Peek method of the MyQueue object.

单选题You are developing a custom-collection class.You need to create a method in your class. You need to ensure that the method you create in your class returns a type that is compatible with the Foreach statement. Which criterion should the method meet?()AThe method must return a type of either IEnumerator or IEnumerable.BThe method must return a type of IComparable.CThe method must explicitly contain a collection.DThe method must be the only iterator in the class.

多选题USER_DATA is a nonencrypted tablespace that contains a set of tables with data. You want to convert all existing data in the USER_DATA tablespace and the new data into the encrypted format. Which methodswould you use to achieve this?()AUse Data Pump to transfer the existing data to a new encrypted tablespaceBUse ALTER TABLE MOVE to transfer the existing data to a new encrypted tablespaceCUse CREATE TABLE AS SELECT to transfer the existing data to a new encrypted tablespaceDEnable row movement for each table to be encrypted and then use ALTER TABLESPACE to encrypt the tablespaceEEncrypt the USER_DATA tablespace using the ALTER TABLESPACE statement so that all the data in the tablespace is automatically encrypted