1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brums [2.3K]
2 years ago
13

An independent penetration testing company is invited to test a company's legacy banking application developed for Android phone

s. It uses Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates. Penetration tests reveal the connections with clients were vulnerable to a Man-in-the-Middle (MITM) attack. How does the company prevent this from happening in the public Internet?
Computers and Technology
1 answer:
LenaWriter [7]2 years ago
4 0

In the case above, the company can prevent this from happening in the public Internet through the Use certificate pinning.

<h3>Should a person use certificate pinning?</h3>

Mobile applications are known to be one that often make use of   certificate or also public key pinning so that they can be able to make sure that communications are secure.

Hence it is one that  is often implemented if  the developer of the application is said to be require to validate the remote host's identity or if operating in a harsh environment.

Hence, Certificate pinning hinders which certificates are considered valid for a any kind of website,  and as such, In the case above, the company can prevent this from happening in the public Internet through the Use certificate pinning.

Learn more about certificate from

brainly.com/question/1874937

#SPJ1

You might be interested in
Electric Bill Problem 3.0 (20 Points) What is the total cost of using the following at /kWh? a. 1600 W air conditioner for 6h b.
gulaghasi [49]

Answer:

The total const is 13025 KWh

Explanation:

These are the steps to solve this problem:

  1. Convert all the powers from W to KW dividing by 1000.
  2. Convert all the times on minutes to hours dividing by 60.
  3. Then you can apply energy consumption formula Energy = Power*Time for any of the appliances. the results will be at KWh.
  4. Sum all the consumtions and you will have the total cost.

Attached you will have a spreadsheet as a guidance. Any  questions, just let me know.

Download xlsx
7 0
3 years ago
What stores all software and files on your computer and reads and writes data onto a spinning magnetic or optical disk?
stiv31 [10]

Answer:

Depends. could be an external opticial drive, a scuzi drive, a real to real tape system, or just a simple electromagnetic hard drive with speeds of 1000 rpm or more

8 0
3 years ago
If userA wants to send a secure message to userB using an asymmetric cryptographic algorithm, which key does userB use to decryp
ANTONII [103]

Answer:

userB will use his/her private key.

Explanation:

The steps involved in using asymmetric cryptographic algorithm are as follow:

1. Each user generates a pair of keys to be used for the encryption and decryption of messages.

2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.

3. If UserA wishes to send a confidential message to UserB, UserA encrypts the message using UserB's public key.

4. When UserB receives the message, she decrypts it using her private key.

4 0
3 years ago
What are some ways you can use the Effect Options dialog box to customize animations in a presentation? Check all
aliina [53]
The first and the 3 ones
4 0
3 years ago
Read 2 more answers
TODAYS ATTENDANCE QUESTION: Why do you think it is important to be able to measure using a ruler in Technology &amp; Engineering
Vaselesa [24]

Answer:

Because it takes precision to a lot of things in tech and Eng. We need to measure all kinds of things, like wood, metal/etc. for computers and things that we use everyday, Because our world goes around being precise about things that we need everyday, like tables and things.

Explanation:

3 0
3 years ago
Other questions:
  • Background Susan finished work on system architecture issues, and her system design specification was approved. Now she is ready
    15·1 answer
  • Using your own computer, give the name of the operating system that runs it and give examples of five legal file names. Then cre
    13·1 answer
  • A ____ is a type of program that uses a grid to organize and work with data.
    14·1 answer
  • Approximately, what percentage of Smartphone owners in America uses their mobile devices to access social media platforms?
    7·1 answer
  • Will give brainliest!!!!!!!!!!!!
    6·2 answers
  • A ________ database state is one in which all data integrity constraints are satisfied
    15·2 answers
  • 7. Which cipher is based on the clues of the physical factors, rather than the hardware or a software cryptosystem
    8·1 answer
  • Represent the measuring unit ofcomputer un terms of fration of second​
    13·1 answer
  • Is there a way of how to delete this if so pleas tell me
    11·1 answer
  • What type of malware is best known for carrying other malware as a payload?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!