A software development company wants to ensure that users can confirm the software is legitimate when installing it. Which of the following is the best way for the company to achieve this security objective?
o Code Signing: This process involves digitally signing the software with a cryptographic key. When users install the software, the digital signature can be verified to ensure that the software has not been tampered with and is indeed from the legitimate source. This provides assurance of the software's authenticity and integrity.
o Non-repudiation (Option B): This ensures that a party cannot deny the authenticity of their signature on a document or a message, but it doesn't specifically address software legitimacy.
o Key Escrow (Option C): This involves storing cryptographic keys with a third party, which is useful for key recovery but not for verifying software legitimacy.
o Private Keys (Option D): These are used in cryptographic processes, including code signing, but on their own, they don't provide a mechanism for users to verify software legitimacy
upvoted 1 times
...
...
This section is not available anymore. Please use the main Exam Page.CAS-004 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Steel16
1 month, 2 weeks agoSteel16
1 month, 2 weeks ago