6
answers
2
watching
323
views
aminul2005Lv1
20 Feb 2022
A developer wants to maintain integrity to each module of a program and ensure the code cannot be altered by malicious users.
Which of the following would be BEST for the developer to perform? (Choose two.)
Options:
A Utilize code signing by a trusted third party.
B Implement certificate-based authentication.
C Verify MD5 hashes.
D Compress the program with a password.
E Encrypt with 3DES.
F Make the DACL read-only.
A developer wants to maintain integrity to each module of a program and ensure the code cannot be altered by malicious users.
Which of the following would be BEST for the developer to perform? (Choose two.)
Options:
A Utilize code signing by a trusted third party.
B Implement certificate-based authentication.
C Verify MD5 hashes.
D Compress the program with a password.
E Encrypt with 3DES.
F Make the DACL read-only.
Read by 1 person
14 Feb 2023
Read by 4 people
Read by 4 people
Read by 4 people
teacherrecoLv10
20 Feb 2022
Already have an account? Log in
Read by 4 people
Read by 5 people