C. Hashing
Explanation:
Hashing creates a unique fixed-size output (hash value) from the script. By calculating the hash of the original script and comparing it with the hash of the script before launch, the engineer can confirm whether the script has been modified. If the hashes match, the script is unchanged; if they differ, the script has been altered.
Breakdown of the other options:
A. Masking: Typically used to hide sensitive data, like credit card numbers, rather than ensuring the integrity of a script.
B. Obfuscation: Involves making code difficult to understand or read, but does not guarantee that the script has not been modified.
D. Encryption: Protects data confidentiality but does not inherently check for modifications; it focuses on securing data from unauthorized access.
upvoted 2 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
test_arrow
1 day, 13 hours ago