Challenge Type | Challenge Point | Time |
---|---|---|
QUIZ | 40 | 5 Minutes |
Max uses a web browser which allow running Java embedded in a web page, downloaded across network, and run on a Max's computer. Max knows that this makes the security of his computer a big concern. With this in mind, he knows that using of Java runtime system will minimize risk / threat of Java code execute. How does Max ensure that this Java technology will protect him from risk/threat?
- Sandbox
- Applet Boundaries
- Defense-in-depth
- Digital Certificate
- Confidentiality