3
answers
1
watching
157
views
myrrcenaryLv1
24 May 2023
A developer wants to maintain integrity to each module of a program and ensure the code cannot be altered by malicious users.
Which of the following would be BEST for the developer to perform? (Choose two.)
- Utilize code signing by a trusted third party.
- Implement certificate-based authentication.
- Verify MD5 hashes.
- Compress the program with a password.
- Encrypt with 3DES.
- Make the DACL read-only.
A developer wants to maintain integrity to each module of a program and ensure the code cannot be altered by malicious users.
Which of the following would be BEST for the developer to perform? (Choose two.)
- Utilize code signing by a trusted third party.
- Implement certificate-based authentication.
- Verify MD5 hashes.
- Compress the program with a password.
- Encrypt with 3DES.
- Make the DACL read-only.
Liked by myrrcenary and 2 others
qamarmalik3098Lv10
24 May 2023
Liked by myrrcenary and 1 others
24 May 2023
Already have an account? Log in
Liked by myrrcenary and 1 others
24 May 2023
Already have an account? Log in