Question: A developer wants to maintain integrity to each module of a program and ensure controls are in place to detect unauthorized code modification. Which of
A developer wants to maintain integrity to each module of a program and ensure controls are in place to detect unauthorized code modification. Which of the following would be BEST for the developer to perform? Choose two.
A Utilize code signing by a trusted third party.
B Implement certificatebased authentication.
C Verify MD hashes.
D Compress the program with a password.
E Encrypt with DES.
F Make the DACL readonly.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
