exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 367 discussion

Actual exam question from CompTIA's CAS-004
Question #: 367
Topic #: 1
[All CAS-004 Questions]

A security engineer has recently become aware of a Java application that processes critical information in real time on the company's network. The Java application was scanned with SAST prior to deployment, and all vulnerabilities have been mitigated. However, some known issues within the Java runtime environment cannot be resolved. Which of the following should the security engineer recommend to the developer in order to mitigate the issue with the LEAST amount of downtime?

  • A. Perform software composition analysis on libraries from third parties.
  • B. Run the application in a sandbox and perform penetration tests.
  • C. Rewrite and compile the application in C++ and then reinstall it.
  • D. Embed the current application into a virtual machine that runs on dedicated hardware.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Bright07
2 days, 2 hours ago
Selected Answer: A
The issue mentioned in the scenario involves known vulnerabilities within the Java runtime environment that cannot be resolved. In addition to the vulnerabilities in the runtime environment, the security engineer should focus on identifying any third-party libraries or dependencies that might also introduce vulnerabilities. Here’s why A is the best option: Software composition analysis (SCA) is a process used to identify known vulnerabilities in third-party libraries and dependencies used by the application. While the core Java runtime may have issues that cannot be immediately resolved, third-party libraries used in the application may also pose security risks. By performing SCA, the security engineer can identify and address vulnerabilities in third-party code, ensuring that those dependencies do not introduce additional risks.
upvoted 1 times
...
23169fd
5 months ago
Selected Answer: B
Quick Implementation: Sandboxing can be set up quickly compared to the time and complexity involved in setting up a dedicated VM environment. Minimal Downtime: The application can continue running in the sandbox with minimal interruption, allowing for immediate security testing and mitigation efforts. Flexibility and Focus: Penetration testing within a sandbox provides a focused approach to identifying and addressing vulnerabilities without impacting the main production environment.
upvoted 1 times
...
EAlonso
5 months ago
D. reduce the attack surface in case the exploits.
upvoted 1 times
...
Anarckii
11 months, 3 weeks ago
Selected Answer: D
D - makes the most sense if we are concerned about downtime
upvoted 2 times
...
OdinAtlasSteel
1 year, 1 month ago
Selected Answer: D
D. Embed the current application into a virtual machine that runs on dedicated hardware. This solution involves using virtualization technology, where the Java application is encapsulated within a virtual machine (VM). This approach allows for isolation and containment of the application, and any issues with the Java runtime environment are confined within the VM. It provides a level of abstraction and separation from the underlying hardware and operating system.
upvoted 2 times
...
oskinoo
1 year, 1 month ago
Selected Answer: D
D. Embed the current application into a virtual machine that runs on dedicated hardware. By embedding the Java application into a virtual machine (VM) running on dedicated hardware, you can isolate the application and its environment. This approach allows you to run the Java application while minimizing the impact of known issues in the Java runtime environment. If there are vulnerabilities or issues within the Java runtime, they are less likely to impact the overall system when it's contained within a VM. It provides an additional layer of security and isolation, reducing downtime associated with resolving runtime issues.
upvoted 2 times
...
joinedatthehop
1 year, 1 month ago
Selected Answer: A
Software Composition Analysis Identifies Risks in Open Source Packages. SCA tools identify all open source packages in an application and all the known vulnerabilities of those packages. This knowledge can be used to notify developers of the issues in their code to fix them before they are exploited.
upvoted 2 times
b49eb27
8 months, 1 week ago
They already know this is an issue so this does not help.
upvoted 2 times
...
...
POWNED
1 year, 1 month ago
Selected Answer: D
I agree the answer is D
upvoted 1 times
...
weaponxcel
1 year, 1 month ago
Selected Answer: D
D. Embed the current application into a virtual machine that runs on dedicated hardware - By running the application in a dedicated virtual machine (VM), it's isolated from the rest of the environment. This containment reduces the potential impact of vulnerabilities in the Java runtime since they'd be restricted to the VM. Moreover, embedding an application into a VM typically has a shorter downtime than rewriting the application or extensive testing.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago