Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam SY0-601 topic 1 question 610 discussion

Actual exam question from CompTIA's SY0-601
Question #: 610
Topic #: 1
[All SY0-601 Questions]

Which of the following are the MOST likely vectors for the unauthorized or unintentional inclusion of vulnerable code in a software company's final software releases? (Choose two.)

  • A. Unsecure protocols
  • B. Use of penetration-testing utilities
  • C. Weak passwords
  • D. Included third-party libraries
  • E. Vendors/supply chain
  • F. Outdated anti-malware software
Show Suggested Answer Hide Answer
Suggested Answer: DE 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Geronemo
1 week, 5 days ago
The most likely vectors for the unauthorized or unintentional inclusion of vulnerable code in a software company's final software releases are: D. Included third-party libraries: Third-party libraries are often used in software development to expedite the development process or incorporate additional functionality. However, if these libraries contain vulnerabilities, they can introduce security risks into the final software releases. E. Vendors/supply chain: Supply chain attacks involve exploiting vulnerabilities in the software supply chain to compromise the integrity of software products. Attackers may target vendors or suppliers to inject malicious code or compromise the software during distribution, leading to the inclusion of vulnerable code in the final software releases. Both of these vectors involve dependencies external to the company's direct development process and represent common avenues for the unintentional inclusion of vulnerable code.
upvoted 1 times
...
russian
1 week, 6 days ago
Selected Answer: DE
unintentional - you cant control it
upvoted 1 times
...
BD69
1 month, 2 weeks ago
Selected Answer: CD
What supply chain? Coders often put in passwords and forget them into code configuration files - not necessarily weak ones - and you can find them on version management systems
upvoted 2 times
...
LuckyAro
6 months, 2 weeks ago
Selected Answer: DE
E. Vendors/supply chain: Supply chain attacks, where attackers compromise vendors or suppliers to introduce vulnerabilities into the software supply chain, are a significant concern. This can result in vulnerable code making its way into the final software releases. D. Included third-party libraries: Third-party libraries are often used in software development to expedite the process. However, if these libraries contain vulnerabilities or are not kept up-to-date, they can introduce security flaws into the software.
upvoted 2 times
LuckyAro
6 months, 2 weeks ago
The other options, while important for overall security, are not as directly related to the inclusion of vulnerable code in software releases: A. Unsecure protocols: Unsecure protocols can lead to data breaches or other security issues but may not directly introduce vulnerable code into the software. B. Use of penetration-testing utilities: Penetration testing utilities are typically used for security assessments and should not introduce vulnerabilities into the software itself. C. Weak passwords: Weak passwords can lead to unauthorized access, but they don't necessarily introduce vulnerable code into the software. F. Outdated anti-malware software: Outdated anti-malware software can leave systems more susceptible to malware, but it doesn't directly introduce vulnerable code into the software.
upvoted 1 times
...
...
touisuzuki
7 months, 3 weeks ago
Selected Answer: DE
D. Included third-party libraries: When software companies incorporate third-party libraries or components into their applications, those libraries may contain vulnerabilities that can inadvertently be included in the final release. This is particularly true if the company does not regularly update or patch these libraries. E. Vendors/supply chain: The software supply chain, including vendors and suppliers, can introduce vulnerabilities into the software development process. Malicious actors could compromise the supply chain to inject vulnerabilities or malware into the final software release. Additionally, the software development process often involves interactions with external vendors, and vulnerabilities can be introduced at various stages of development.
upvoted 3 times
...
mpengly88
7 months, 4 weeks ago
Selected Answer: DE
I don’t see where unsecure protocols have anything to do with vulnerable code
upvoted 2 times
...
discord42069
8 months, 1 week ago
i think its DE because it mentions its unintentional
upvoted 1 times
...
sujon_london
8 months, 1 week ago
Selected Answer: DE
both the supply chain (vendors/supply chain) and the inclusion of third-party libraries pose significant risks because they introduce external code into the software development process, and this code might contain vulnerabilities that can go unnoticed until the final software release. Controlling and monitoring these external dependencies is crucial for software security.
upvoted 2 times
...
John_Ferguson
8 months, 1 week ago
Selected Answer: AD
A and D make sense since it's specifically asking about code vulnerabilities
upvoted 1 times
BD69
1 month, 2 weeks ago
Answer A is not on some versions of the exam, so we know, for sure, it's not an answer
upvoted 1 times
...
...
zits88
8 months, 1 week ago
Selected Answer: AD
Not sure, but going with A and D. I don't think "vendors/supply chain" is correct, but I am willing to hear other arguments.
upvoted 1 times
Paula77
2 months ago
The supply chain includes all the components and processes involved in creating and delivering software. If a vendor or supplier provides compromised or vulnerable components (such as software modules, APIs, or hardware), it can impact the final software product.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...