Exam4Training

Which of the following would be BEST for the developer to perform?

A developer wants to maintain integrity to each module of a program and ensure the code cannot be altered by malicious users.

Which of the following would be BEST for the developer to perform? (Choose two.)
A . Utilize code signing by a trusted third party.
B . Implement certificate-based authentication.
C . Verify MD5 hashes.
D . Compress the program with a password.
E . Encrypt with 3DE
G . Make the DACL read-only.

Answer: A,C

Latest CAS-004 Dumps Valid Version with 128 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Exit mobile version