Which of the following would be BEST for the developer to perform?

A developer wants to maintain integrity to each module of a program and ensure the code cannot be altered by malicious users.

Which of the following would be BEST for the developer to perform? (Choose two.)
A . Utilize code signing by a trusted third party.
B . Implement certificate-based authentication.
C . Verify MD5 hashes.
D . Compress the program with a password.
E . Encrypt with 3DE
G . Make the DACL read-only.

Answer: A,C

Latest CAS-004 Dumps Valid Version with 128 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments