Question 41
A developer is creating a new mobile application for a company. The application uses REST API and TLS 1.2 to communicate securely with the external back-end server. Due to this configuration, the company is concerned about HTTPS interception attacks.
Which of the following would be the BEST solution against this type of attack?
Which of the following would be the BEST solution against this type of attack?
Question 42
Which of the following agreements includes no penalties and can be signed by two entities that are working together toward the same goal?
Question 43
Which of the following technologies allows CSPs to add encryption across multiple data storages?
Question 44
Which of the following allows computation and analysis of data within a ciphertext without knowledge of the plaintext?
Question 45
A security analyst is investigating a possible buffer overflow attack. The following output was found on a user's workstation:
graphic.linux_randomization.prg
Which of the following technologies would mitigate the manipulation of memory segments?
graphic.linux_randomization.prg
Which of the following technologies would mitigate the manipulation of memory segments?