Which technique should a network administrator use to enhance the security of source code in transit while maintaining readability?

Disable ads (and more) with a membership for a one time $4.99 payment

Prepare for the Certmaster CE Security+ Domain 3.0 exam. Utilize flashcards and multiple-choice questions, each with hints and explanations, to get ready for your test!

The technique that enhances the security of source code in transit while maintaining readability is obfuscation. Obfuscation involves modifying the source code in a way that makes it difficult for humans to understand, while still allowing the code to be executed correctly. This is particularly beneficial when sharing code over a network where security might be a concern. By obfuscating the code, sensitive logic or data can be hidden, making it less accessible to potential attackers who intercept the code in transit.

This method preserves the functionality of the code while rendering it less comprehensible to anyone who may try to read it, thus providing a layer of protection against reverse engineering. It is especially useful when developers need to share code without exposing intellectual property or sensitive information, all while maintaining the ability for it to be executed and utilized by the intended recipient.

In contrast, encryption, while excellent for securing data in transit, transforms the code into a format that is not readable without decryption, making it less suitable if readability is a necessary condition. Compression can reduce the size of the code for transfer but does not inherently provide security or readability benefits. Checksum validation ensures data integrity but is not a method to enhance security or readability during transit.