ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 354 - CAS-004 discussion

Report
Export

A mobile application developer is creating a global, highly scalable, secure chat application. The developer would like to ensure the application is not susceptible to on-path attacks while the user is traveling in potentially hostile regions. Which of the following would BEST achieve that goal?

A.
Utilize the SAN certificate to enable a single certificate for all regions.
Answers
A.
Utilize the SAN certificate to enable a single certificate for all regions.
B.
Deploy client certificates to all devices in the network.
Answers
B.
Deploy client certificates to all devices in the network.
C.
Configure certificate pinning inside the application.
Answers
C.
Configure certificate pinning inside the application.
D.
Enable HSTS on the application's server side for all communication.
Answers
D.
Enable HSTS on the application's server side for all communication.
Suggested answer: C

Explanation:

Certificate pinning is a technique that embeds one or more trusted certificates or public keys inside an application, and verifies that any certificate presented by a server matches one of those certificates or public keys. Certificate pinning can prevent on-path attacks, such as man-in-themiddle (MITM) attacks, which intercept and modify the communication between a client and a server.

Configuring certificate pinning inside the application would allow the mobile application developer to create a global, highly scalable, secure chat application that is not susceptible to on-path attacks while the user is traveling in potentially hostile regions, because it would:

Ensure that only trusted servers can communicate with the application, by rejecting any server certificate that does not match one of the pinned certificates or public keys.

Protect the confidentiality, integrity, and authenticity of the chat messages, by preventing any attacker from intercepting, modifying, or impersonating them.

Enhance the security of the application by reducing its reliance on external factors, such as certificate authorities (CAs), certificate revocation lists (CRLs), or online certificate status protocol (OCSP).

asked 02/10/2024
Ayanda Zwane
32 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first