3
answers
1
watching
157
views

A developer wants to maintain integrity to each module of a program and ensure the code cannot be altered by malicious users.

Which of the following would be BEST for the developer to perform? (Choose two.)

  1. Utilize code signing by a trusted third party.
  2. Implement certificate-based authentication.
  3. Verify MD5 hashes.
  4. Compress the program with a password.
  5. Encrypt with 3DES.
  6. Make the DACL read-only.

For unlimited access to Homework Help, a Homework+ subscription is required.

Avatar image
Liked by myrrcenary and 2 others

Unlock all answers

Get 1 free homework help answer.
Already have an account? Log in
Avatar image
Liked by myrrcenary and 1 others
Already have an account? Log in
Avatar image
Liked by myrrcenary and 1 others
Already have an account? Log in
Start filling in the gaps now
Log in