exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 547 discussion

Actual exam question from CompTIA's CAS-004
Question #: 547
Topic #: 1
[All CAS-004 Questions]

During a software assurance assessment, an engineer notices the source code contains multiple instances of strcpy, which does not verify the buffer length. Which of the following solutions should be integrated into the SDLC process to reduce future risks?

  • A. Require custom IDS/IPS detection signatures for each type of insecure function found.
  • B. Perform a penetration test before moving to the next step of the SDLC.
  • C. Update the company's secure coding policy to exclude insecure functions.
  • D. Perform DAST/SAST scanning before handoff to another team.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
0e4eff2
2 days, 22 hours ago
Selected Answer: C
The source code in this scenario uses insecure functions like strcpy which are known for not checking buffer sizes, leading to buffer overflow vulnerabilities. The most effective solution is to update the company’s secure coding policy to prohibit the use of insecure functions and replace them with safer alternatives, such as strncpy, which enforces buffer length checks. Integrating this change into the Software Development Life Cycle (SDLC) ensures that future code adheres to secure practices, thereby reducing the risk of vulnerabilities being introduced into production systems.
upvoted 1 times
...
Bright07
2 weeks, 6 days ago
Selected Answer: C
After careful consideration, and review of the questions and answers with some research, I changed my answer to C. Updating the secure coding policy to exclude insecure functions prevents the issue at the source and integrates security into the development process early, reducing future risks. Secondary Recommendation: D While not as strong as C, implementing DAST/SAST scanning can help catch any violations of the secure coding policy. However, C is the most effective long-term solution.
upvoted 3 times
...
grelaman
6 months, 1 week ago
Selected Answer: D
Integrating SAST/DAST tools into the CI/CD pipeline ensures that code is automatically scanned with each build or release. Developers receive real-time alerts about insecure code, allowing them to fix issues promptly. Automated scanning reduces the likelihood of insecure functions being overlooked due to human error. SAST/DAST tools often maintain logs and reports, providing an audit trail of security assessments. Enforces the secure coding policy by actively detecting violations, rather than relying solely on developers' adherence.
upvoted 4 times
...
Bright07
6 months, 2 weeks ago
Ans D. Perform DAST/SAST scanning before handoff to another team. Implementing Dynamic Application Security Testing (DAST) and Static Application Security Testing (SAST) can help identify insecure functions and coding practices early in the development process. This proactive approach allows teams to catch vulnerabilities before they are handed off or deployed, reducing the likelihood of security issues in the final product. While the other options may have merit, they are not as comprehensive or proactive in addressing the root cause of the issue throughout the development process.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago