exam questions

Exam PT0-003 All Questions

View all questions & answers for the PT0-003 exam

Exam PT0-003 topic 1 question 3 discussion

Actual exam question from CompTIA's PT0-003
Question #: 3
Topic #: 1
[All PT0-003 Questions]

A penetration tester is performing a security review of a web application. Which of the following should the tester leverage to identify the presence of vulnerable open-source libraries?

  • A. VM
  • B. IAST
  • C. DAST
  • D. SCA
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
680e6b7
2 months, 2 weeks ago
Selected Answer: D
SCA tools are specifically designed to identify vulnerabilities in open-source libraries used within an application. They analyze dependencies, check for known security issues, and provide insights into outdated or vulnerable components. This makes them the best choice for detecting security risks in third-party code. VM (Vulnerability Management) focuses on tracking and managing vulnerabilities but does not directly scan open-source libraries. IAST (Interactive Application Security Testing) works by analyzing applications during runtime but is more focused on detecting security flaws in the application's own code rather than its dependencies. DAST (Dynamic Application Security Testing) scans running applications for vulnerabilities but does not specialize in identifying issues within open-source libraries.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...