exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 494 discussion

Actual exam question from CompTIA's CAS-004
Question #: 494
Topic #: 1
[All CAS-004 Questions]

A security engineer evaluates the overall security of a custom mobile gaming application and notices that developers are bringing in a large number of open-source packages without appropriate patch management. Which of the following would the engineer most likely recommend for uncovering known vulnerabilities in the packages?

  • A. Leverage an exploitation framework to uncover vulnerabilities.
  • B. Use fuzz testing to uncover potential vulnerabilities in the application.
  • C. Utilize a software composition analysis tool to report known vulnerabilities.
  • D. Reverse engineer the application to look for vulnerable code paths.
  • E. Analyze the use of an HTTP intercepting proxy to dynamically uncover issues.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Bright07
3 weeks, 5 days ago
Selected Answer: C
Software Composition Analysis (SCA) tools are specifically designed to scan and analyze the open-source libraries and packages used in an application. These tools identify known vulnerabilities in the components (including outdated or unpatched versions) by cross-referencing them with publicly available vulnerability databases (such as the National Vulnerability Database - NVD). Given that the issue involves a large number of open-source packages without appropriate patch management, an SCA tool is the most appropriate way to uncover vulnerabilities related to outdated or vulnerable open-source dependencies.
upvoted 2 times
...
Pesos
6 months ago
When you see 3rd party or open source, think software composition analysis.
upvoted 2 times
...
grelaman
6 months, 2 weeks ago
Selected Answer: C
Software Composition Analysis (SCA) is a methodology and set of tools designed to identify third-party and open-source components within a software codebase. SCA tools analyze the composition of software to detect outdated libraries, known vulnerabilities, and license compliance issues associated with those components. - SCA tools scan the codebase to create an inventory of all third-party libraries and dependencies used in the application. - They cross-reference identified components against databases of known vulnerabilities (e.g., CVEs) to flag any outdated or insecure libraries. - SCA can be integrated into various stages of the SDLC, such as during coding, building, or continuous integration processes. - It provides developers with immediate feedback, allowing them to update or replace insecure components before the software is released
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago