exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 746 discussion

Actual exam question from CompTIA's SY0-601
Question #: 746
Topic #: 1
[All SY0-601 Questions]

Which of the following are the most likely vectors for the unauthorized or unintentional inclusion of vulnerable code in a software company’s final software releases? (Choose two).

  • A. Certificate mismatch
  • B. Use of penetration-testing utilities
  • C. Weak passwords
  • D. Included third-party libraries
  • E. Vendors/supply chain
  • F. Outdated anti-malware software
Show Suggested Answer Hide Answer
Suggested Answer: DE 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
EMP00000000
Highly Voted 1 year, 7 months ago
Selected Answer: DE
Same as question 610. Its D & E.
upvoted 9 times
sosa4547
1 year, 1 month ago
I was just thinking this question was already in here!
upvoted 3 times
...
...
Petercx
Most Recent 1 year, 7 months ago
Selected Answer: DE
The most likely vectors for the unauthorized or unintentional inclusion of vulnerable code in a software company’s final software releases are D. Included third-party libraries and E. Vendors/supply chain1. Included third-party libraries: These can introduce vulnerabilities if they are not properly vetted or if they are not kept up-to-date. A third-party library might have known vulnerabilities that can be exploited by an attacker. Vendors/supply chain: If a software company includes code from vendors or other parts of the supply chain, there’s a risk that this code could introduce vulnerabilities. This is especially true if the vendors themselves do not have robust security practices.
upvoted 2 times
...
[Removed]
1 year, 7 months ago
Selected Answer: DE
Only ones here that match
upvoted 2 times
...
KELOS
1 year, 7 months ago
D E is correct
upvoted 2 times
...
kevin403
1 year, 7 months ago
Selected Answer: DE
my answer is D & E
upvoted 3 times
...
kong345
1 year, 7 months ago
Selected Answer: DE
DE is the correct answer
upvoted 3 times
...
wakkaking14
1 year, 7 months ago
Selected Answer: DE
Software that is outsourced to vendors and third parties is vulnerable to malware being injected into the product from the supply chain.
upvoted 3 times
...
ComPCertOn
1 year, 7 months ago
Selected Answer: DE
my answer is D & E
upvoted 3 times
...
Soleandheel
1 year, 7 months ago
The best options are: D. Included third-party libraries E. Vendors/supply chain
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...