From the course: CCSP Cert Prep: 4 Cloud Application Security Audio Review
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Secure coding practices Q&A
From the course: CCSP Cert Prep: 4 Cloud Application Security Audio Review
Secure coding practices Q&A
- [Instructor] Here's a question on secure coding practices similar to one that you might find on the CCSP exam. (air whooshing) When digitally signing an application, what key should the developer use? Should they use the certificate authority's public key, the certificate authority's private key, the developer's public key, or the developer's private key? (air whooshing) Let me repeat that question for you. When digitally signing an application, what key should the developer use? Should the developer use the certificate authority's public key, the certificate authority's private key, the developer's public key, or the developer's private key? (air whooshing) (timer clicking) (timer rings) (air whooshing) The developer should use their own private key. Digital signatures always use a private key, and the developer only has access to their own private key. They definitely should not have access to the…
Contents
-
-
-
(Locked)
Secure software development lifecycle2m 29s
-
(Locked)
Secure software development lifecycle Q&A1m 14s
-
(Locked)
Application security vulnerabilities2m 6s
-
(Locked)
Application security vulnerabilities Q&A1m 17s
-
(Locked)
Secure coding practices1m 49s
-
(Locked)
Secure coding practices Q&A1m 13s
-
(Locked)
Software security assessment2m 46s
-
(Locked)
Software security assessment Q&A1m 30s
-
(Locked)
Verified secure software2m 2s
-
(Locked)
Verified secure software Q&A55s
-
(Locked)
Cloud application architecture2m 28s
-
(Locked)
Cloud application architecture Q&A1m 18s
-
(Locked)
-