Skip to content

Latest commit

 

History

History
15 lines (11 loc) · 690 Bytes

File metadata and controls

15 lines (11 loc) · 690 Bytes

Programming

Challenge Type Challenge Point Time
QUIZ 40 5 Minutes

Challenge Description

Max uses a web browser which allow running Java embedded in a web page, downloaded across network, and run on a Max's computer. Max knows that this makes the security of his computer a big concern. With this in mind, he knows that using of Java runtime system will minimize risk / threat of Java code execute. How does Max ensure that this Java technology will protect him from risk/threat?

  • Sandbox
  • Applet Boundaries
  • Defense-in-depth
  • Digital Certificate
  • Confidentiality