Question 41

A developer is creating a new mobile application for a company. The application uses REST API and TLS 1.2 to communicate securely with the external back-end server. Due to this configuration, the company is concerned about HTTPS interception attacks.
Which of the following would be the BEST solution against this type of attack?
  • Question 42

    Which of the following agreements includes no penalties and can be signed by two entities that are working together toward the same goal?
  • Question 43

    Which of the following technologies allows CSPs to add encryption across multiple data storages?
  • Question 44

    Which of the following allows computation and analysis of data within a ciphertext without knowledge of the plaintext?
  • Question 45

    A security analyst is investigating a possible buffer overflow attack. The following output was found on a user's workstation:
    graphic.linux_randomization.prg
    Which of the following technologies would mitigate the manipulation of memory segments?