Question: A developer is writing a new mobile application that employees will use to connect to an Internet-facing sensitive system. The security team is concerned with
A developer is writing a new mobile application that employees will use to connect to an Internet-facing sensitive system. The security team is concerned with MITM against the encrypted application traffic aimed at intercepting and decrypting sensitive information from the server to the mobile client. Which of the following should then developer implement to address the security teams concerns? (Select TWO)
- HSTS
- TLS1,4
- OCSP
- Certificate pinning
- Key stretching
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
