6
answers
2
watching
323
views

A developer wants to maintain integrity to each module of a program and ensure the code cannot be altered by malicious users.

Which of the following would be BEST for the developer to perform? (Choose two.)

Options:

A Utilize code signing by a trusted third party.
B Implement certificate-based authentication.
C Verify MD5 hashes.
D Compress the program with a password.
E Encrypt with 3DES.
F Make the DACL read-only.

For unlimited access to Homework Help, a Homework+ subscription is required.

Avatar image
Read by 1 person

Unlock all answers

Get 1 free homework help answer.
Already have an account? Log in
Avatar image
Read by 4 people
Already have an account? Log in
Avatar image
Read by 4 people
Already have an account? Log in
Avatar image
Read by 4 people
Already have an account? Log in
Avatar image
Read by 4 people
Already have an account? Log in
Avatar image
Read by 5 people
Already have an account? Log in

Related Documents

Weekly leaderboard

Start filling in the gaps now
Log in