Question: A programmer is working with a project team to develop a self-service kiosk for use at retail locations. To ensure the security of the OS
A programmer is working with a project team to develop a self-service kiosk for use at retail locations. To ensure the security of the OS and associated applications, the programmer intends to configure the OS to allow only selected applications to run. Which of the following techniques is the programmer using to secure the device? Sandboxing Blacklisting Trusted computing O A O D
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
