13A: Recognize Web Vulnerabilities Flashcards
3.3 Given a scenario, research attack vectors and perform application-based attacks. 3.5 Explain common attacks and vulnerabilities against specialized systems.
1
Q
The method of using a digital signature to ensure the source and integrity of programming code.
A
code signing