exam questions

Exam CS0-003 All Questions

View all questions & answers for the CS0-003 exam

Exam CS0-003 topic 1 question 293 discussion

Actual exam question from CompTIA's CS0-003
Question #: 293
Topic #: 1
[All CS0-003 Questions]

An organization is conducting a pilot deployment of an e-commerce application. The application’s source code is not available. Which of the following strategies should an analyst recommend to evaluate the security of the software?

  • A. Static testing
  • B. Vulnerability testing
  • C. Dynamic testing
  • D. Penetration testing
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
5134674
2 days ago
Selected Answer: C
Pen testing is quite evasive and expansive, but not correct answer in this scenario, since the app is in its Pilot phase.
upvoted 1 times
...
KANKALE
4 days, 5 hours ago
Selected Answer: C
Answer is dynamic testing
upvoted 1 times
...
luiiizsoares
5 days, 6 hours ago
Selected Answer: C
Correct Answer: C. Dynamic testing Analysis: Given that the application's source code is not available, dynamic testing is an appropriate method to evaluate the security of the software. Dynamic testing involves analyzing the application by executing it and observing its behavior during runtime, which allows for the identification of security vulnerabilities that may not be evident through code inspection alone.
upvoted 1 times
...
zecomeia_007
2 weeks, 3 days ago
Selected Answer: D
Penetration testing simulates real-world attacks to identify vulnerabilities and assess the overall security posture of the application.
upvoted 1 times
...
ChopSNap
3 weeks, 1 day ago
Selected Answer: D
D. Penetration testing Since the source code is not available, static testing and vulnerability scanning are not feasible options. Dynamic testing, while useful, might not be sufficient to uncover deep-rooted vulnerabilities. Penetration testing is the most suitable approach in this case. It involves simulating real-world attacks to identify and exploit vulnerabilities in the application. This approach doesn't require access to the source code and can reveal critical security flaws that other testing methods might miss.
upvoted 3 times
...
SheikS
3 weeks, 3 days ago
D Penetration testing Penetration testing simulates real-world attacks on the application to identify vulnerabilities that could be exploited by an attacker. This method doesn't require access to the source code and is effective in assessing the security of the application in its operational environment.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago