exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 113 discussion

Actual exam question from CompTIA's CAS-004
Question #: 113
Topic #: 1
[All CAS-004 Questions]

The Chief Information Security Officer of a startup company has asked a security engineer to implement a software security program in an environment that previously had little oversight.
Which of the following testing methods would be BEST for the engineer to utilize in this situation?

  • A. Software composition analysis
  • B. Code obfuscation
  • C. Static analysis
  • D. Dynamic analysis
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
DaleC78
Highly Voted 2 years, 4 months ago
Selected Answer: D
Choosing D here. The application was already in place (had a little oversight) and Dynamic analysis is the way to go against systems that are already operating.
upvoted 13 times
FoxTrotDG
2 years, 1 month ago
The environment had little oversight, not the program
upvoted 2 times
...
...
RevZig67
Highly Voted 2 years, 11 months ago
Selected Answer: C
Static for Source-Code. Seems like the best answer. Get to it before it is compiled.
upvoted 8 times
...
Chiaretta
Most Recent 3 months ago
Selected Answer: A
Due to the software is already in place and had a little oversight, the best place where to start is a Software composition analysis.
upvoted 1 times
...
deeden
5 months, 1 week ago
Selected Answer: A
Agree with A. In a startup environment with little prior oversight, there is a high likelihood of the use of third-party libraries and open-source software. Software composition analysis (SCA) is the best initial step to identify vulnerabilities, outdated dependencies, and licensing issues in third-party components. This method is particularly critical in such environments to quickly gain visibility into the security posture of existing software and mitigate risks.
upvoted 1 times
deeden
5 months, 1 week ago
D. Dynamic analysis: Dynamic analysis involves testing running applications for vulnerabilities, often in a staging or production-like environment. While it is critical later in the security program, it is not as effective as SCA in environments initially lacking oversight, where vulnerabilities in third-party components are a significant concern.
upvoted 1 times
...
deeden
5 months, 1 week ago
C. Static analysis: Static analysis is a valuable testing method to identify vulnerabilities in source code. However, it is most effective after a strong baseline has been established, and when you are primarily analyzing internally developed code rather than focusing on third-party software.
upvoted 1 times
...
...
23169fd
9 months, 3 weeks ago
Selected Answer: C
Static analysis involves examining the code without executing it. This type of analysis can identify vulnerabilities, coding errors, and security flaws early in the development process.
upvoted 3 times
...
cyspec
10 months ago
Selected Answer: C
Keyword is startup. A good place to start is SAST which is easily enabled on GitLab.
upvoted 3 times
...
e4af987
1 year ago
Selected Answer: A
Here's why SCA is the most suitable choice for this scenario: Limited Existing Security: In an environment with minimal security practices, there's a high chance that third-party libraries and components might have unknown vulnerabilities. SCA can identify these potential risks without requiring deep code review of the entire codebase. Focus on Open Source: Startups often leverage open-source libraries to accelerate development. SCA is particularly valuable for identifying vulnerabilities within these open-source components.
upvoted 2 times
e4af987
1 year ago
Not only that... but who said the Startup company develops software?
upvoted 1 times
cyspec
10 months ago
A startup company wouldn't conduct SCA.
upvoted 1 times
...
...
...
Trap_D0_r
1 year, 3 months ago
Selected Answer: D
Choosing D here because a SCA in this contect (an environment that previously had little oversight) could be almost useless. a Static Analysis could spit out tens of thousands of findings that need to be parsed through an evaluated (I've used Fortify SCA tool, it reports a LOT of findings, many false). If the environment had little oversight, you could be looking at bad libraries, poor code, unsecure methods and objects--just a MESS, and you can't do anything about it immediately. With a DAST solution however, you'll get a list of actual vulnerabilities related to the software while it's running, and there will be no false negatives. This is a horribly worded question, though.
upvoted 1 times
...
talosDevbot
1 year, 3 months ago
Selected Answer: C
Ideally, both SAST and DAST should be utilized. But if the question is only asking for one answer, it should be static analysis. Static analysis is commonly used to catch vulnerabilities early on and provides more oversight along the development cycle. If you utilize Dynamic analysis, you would have to write the source code, compile it, and run the program for the testing to occur. This provides more oversight only towards the later cycles of the development cycle
upvoted 3 times
...
Anarckii
1 year, 4 months ago
Selected Answer: C
"in an environment that previously had little oversight" you are going to want to do a thorough analysis on the environment through the use of static analysis. Dynamic may miss important stuff that could not be caught
upvoted 3 times
...
biggytech
1 year, 5 months ago
Selected Answer: C
C is the answer because you are coming into an environment with previous little oversight and static analysis is used to establish a new baseline that CAN be trusted, THEN dynamic analysis will be used. It's a poorly made question but static is the most correct answer in this context.
upvoted 3 times
...
Meep123
1 year, 7 months ago
Going with C. With an environment that had very little oversight, I'd prefer static at least before dynamic analysis if neither were present, assuming dynamic would follow suite. Source code being more important.
upvoted 1 times
...
BiteSize
1 year, 9 months ago
Selected Answer: C
Static Analysis provides the most value and should be the first thing out of these options. Source: Verifying each answer against Chat GPT, my experience, other test banks, a written book, and weighing in the discussion from all users to create a 100% accurate guide for myself before I take the exam. (It isn't easy because of the time needed, but it is doing my diligence)
upvoted 6 times
...
BreakOff874
2 years ago
Selected Answer: C
I checked this question with 3 different AIs. As a startup company previously had little oversight, implementing static analysis can help identify and remediate security issues before they become a part of the final product.
upvoted 3 times
...
last_resort
2 years ago
Selected Answer: C
Static analysis will be more thorough and uncover more issues. Dynamic would be good as well but static will provide more value.
upvoted 5 times
...
Geofab
2 years, 1 month ago
Selected Answer: D
I am choosing D. due to the fact that the software is already developed and running.
upvoted 1 times
FoxTrotDG
2 years, 1 month ago
We don't know that the software is already developed and running. The environment had little oversight, but it says nothing about the program. This is another vague CompTIA question. Could make an argument for C or D.
upvoted 2 times
tefyayaydu
1 year, 5 months ago
Without information provided about the application, such as the deliverables handled, it should be assumed that the program is already built. It should also be noted that the CIO is not going to be the person on a development team for an application, they only deal with high-level strategies and if they are recommending a security product as a solution then it is safe to state it is a working product. DAST would be correct here.
upvoted 1 times
...
...
...
FoxTrotDG
2 years, 1 month ago
Selected Answer: C
Static analysis is the best method to utilize in this situation, as it involves analyzing the source code of the application without actually executing it.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago