A mobile application developer wants to secure an application that transmits sensitive information.
Which of the following should the developer implement to prevent SSL MITM attacks?
A . Stapling
B . Chaining
C . Signing
D . Pinning
Answer: D
A mobile application developer wants to secure an application that transmits sensitive information.
Which of the following should the developer implement to prevent SSL MITM attacks?
A . Stapling
B . Chaining
C . Signing
D . Pinning
Answer: D