13A: Recognize Web Vulnerabilities Flashcards

3.3 Given a scenario, research attack vectors and perform application-based attacks. 3.5 Explain common attacks and vulnerabilities against specialized systems.

1
Q

The method of using a digital signature to ensure the source and integrity of programming code.

A

code signing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly