A new mobile banking application is being developed and uses SSL / TLS certificates but penetration tests show that it is still vulnerable to man-in-the-middle attacks, such as DNS hijacking. Which of the following would mitigate this attack?

A. Certificate revocation
B. Key escrow
C. Public key infrastructure
D. Certificate pinning


Answer: D. Certificate pinning

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. In a function with call-by-reference parameters, the values of the actual arguments are passed to the function. 2. In a function with call-by-reference parameters, any changes to the formal parameters will change the actual arguments passed to the function. 3. It is acceptable to have both call-by-value and call-by-reference parameters in the same function declaration. 4. It is illegal to call other functions from inside a function definition. 5. A stub is a function that is completely defined and well tested FALSE

Computer Science & Information Technology

MC A________is a field for which every entry has a unique value in another table and where the field in the other table is the primary key for that table.

a) relational key. b) standard key. c) foreign key. d) None of the above.

Computer Science & Information Technology

An incident management ____ is typically taken at the point in time where the organization was last known to be secure.

A. recovery B. process C. snapshot D. benchmark

Computer Science & Information Technology

__________ methods enable a program to view a portion of a collection.

a. Focus-view. b. Range-view. c. Delimiter-view. d. Subset-view.

Computer Science & Information Technology