List of questions
Related questions
Question 32 - CAS-004 discussion
A developer wants to maintain integrity to each module of a program and ensure the code cannot be altered by malicious users.
Which of the following would be BEST for the developer to perform? (Choose two.)
A.
Utilize code signing by a trusted third party.
B.
Implement certificate-based authentication.
C.
Verify MD5 hashes.
D.
Compress the program with a password.
E.
Encrypt with 3DES.
F.
Make the DACL read-only.
Your answer:
0 comments
Sorted by
Leave a comment first