exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 68 discussion

Actual exam question from CompTIA's CAS-004
Question #: 68
Topic #: 1
[All CAS-004 Questions]

A developer wants to maintain integrity to each module of a program and ensure the code cannot be altered by malicious users.
Which of the following would be BEST for the developer to perform? (Choose two.)

  • A. Utilize code signing by a trusted third party.
  • B. Implement certificate-based authentication.
  • C. Verify MD5 hashes.
  • D. Compress the program with a password.
  • E. Encrypt with 3DES.
  • F. Make the DACL read-only.
Show Suggested Answer Hide Answer
Suggested Answer: AC 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
iosnet
Highly Voted 3 years, 4 months ago
I think the most suitable answer is AB as the keyword "A developer wants to maintain". So it shud be something to do with implementation prevention control.
upvoted 10 times
FoxTrotDG
2 years, 3 months ago
Maintaining and implementing are not the same thing.
upvoted 2 times
...
...
FoxTrotDG
Highly Voted 2 years, 3 months ago
Selected Answer: AC
A and C both directly address the goal of ensuring code integrity and detecting unauthorized modifications by providing ways to validate that the code has not been altered since it was signed or hashed. Certificate-based authentication focuses on verifying the identity of users or systems involved in a communication but does not check the integrity of the code itself.
upvoted 7 times
FoxTrotDG
2 years, 2 months ago
I'm changing my answer to A and B. MD5 hashes are not effective in maintaining code integrity because they are easily modified. Certificate-based authentication can help maintain the integrity of each module by ensuring only authorized users can access and modify the code
upvoted 8 times
...
...
f7bc9da
Most Recent 1 month, 2 weeks ago
Selected Answer: AB
AB The developer wouldn't verify MD5 hashes to ensure the code can't be altered. MD5 hashes ensure that code HAS NOT been altered, but does not prevent altering the source code. Code signing seems unanimous, and B is the next best option - implementing certificate-based authentication is used to ensure that only trusted entities (users) can access the same system. The key here is prevention, not verification. AB is the answer.
upvoted 1 times
...
881cfb8
6 months, 2 weeks ago
Selected Answer: AC
A and C Question wants integrity, signing attests, hash confirms Other answers are for other purposes such as confidentiality and authentication which is not what was asked
upvoted 1 times
...
deeden
7 months, 1 week ago
Selected Answer: AC
A. Utilize code signing by a trusted third party Explanation: Code signing ensures that the modules are authenticated and have not been altered. It provides a digital signature verifying that the code is genuine. C. Verify MD5 hashes Explanation: Hashing helps ensure code integrity. By generating an MD5 hash for each module and verifying it, the developer can detect if the code has been modified. However, stronger hash functions (e.g., SHA-256) are often recommended.
upvoted 1 times
deeden
7 months, 1 week ago
F. Make the DACL read-only: This restricts file access permissions but does not prevent the alteration of the source code itself. a malicious actor or advanced user might still: Change Permissions: If they have elevated privileges, they could change the permissions from read-only to read-write. Copy and Alter: Create a copy of the file, modify the copy, and then overwrite the original if they can escalate privileges or bypass certain restrictions.
upvoted 1 times
...
...
IT_Master_Tech
7 months, 3 weeks ago
A and C.
upvoted 1 times
...
grelaman
8 months, 1 week ago
Selected Answer: AF
A. Utilize code signing by a trusted third party. Code signing ensures that the code’s integrity is verified and that it has not been altered since it was signed. It provides a way to confirm that the code is from a trusted source and has not been tampered with. (Request number 1 of the problem - Assure integrity) F. Make the DACL read-only. Making the DACL (Discretionary Access Control List) read-only helps prevent unauthorized or malicious users from altering the code (Request Number 2 of the problem). This access control measure directly addresses the issue of unauthorized alterations by restricting write access to the code.
upvoted 2 times
deeden
7 months, 1 week ago
However, a malicious actor or advanced user might still: Change Permissions: If they have elevated privileges, they could change the permissions from read-only to read-write. Copy and Alter: Create a copy of the file, modify the copy, and then overwrite the original if they can escalate privileges or bypass certain restrictions.
upvoted 1 times
...
deeden
7 months, 1 week ago
B is related to user authentication, not code integrity. C has security limitations (MD5 is weak). D and E do not ensure integrity, only confidentiality.
upvoted 1 times
...
...
23169fd
11 months, 2 weeks ago
Selected Answer: AC
A. Utilize code signing by a trusted third party. Code signing involves digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted since it was signed. This process uses a trusted third-party certificate authority (CA) to ensure the authenticity and integrity of the code. C. Verify MD5 hashes. Verifying hashes involves calculating a hash of the program's code and comparing it to a known good hash. While MD5 is not the most secure hash function (SHA-256 is preferred for stronger security), using hashes in general helps ensure that the code has not been altered. Regularly verifying these hashes can help detect any unauthorized changes to the code.
upvoted 1 times
...
cyspec
11 months, 3 weeks ago
Selected Answer: AC
The arguments for C not "preventing" also applies to A. As for finding a MD5 collision, good luck with that while keeping the module valid.
upvoted 2 times
...
loucrass
1 year, 2 months ago
Selected Answer: AC
The correct answers are (A and C)
upvoted 2 times
...
surfuganda
1 year, 2 months ago
Selected Answer: AF
Developer wants to: 1-maintain integrity to each module of a program and 2-ensure the code cannot be altered by malicious users. A. Utilize code signing by a trusted third party: Code signing digitally signs executable files with a cryptographic signature. By obtaining a code signing certificate from a trusted third party, the developer signs each module of the program, ensuring integrity. When users run the program, their systems can verify the signature to ensure the code has not been altered since it was signed. Code signing is widely used to establish trust in software distribution channels and mitigate the risk of code tampering. F. Make the DACL read-only: DACL (Discretionary Access Control List) specifies access permissions to securable objects, such as files or directories, on Windows systems. Making the DACL read-only restricts write access to the program's files, maintaining integrity by preventing malicious users from altering them.
upvoted 2 times
...
Tayfay
1 year, 4 months ago
Selected Answer: AE
To maintain the integrity of each module in a program and prevent malicious alteration, the developer should consider the following two options: A. Utilize code signing by a trusted third party: This creates a digital signature for each module using a certificate from a trusted authority. Any modification to the code will invalidate the signature, alerting users and preventing execution. E. Encrypt with 3DES: While considered less secure than modern algorithms like AES, 3DES encryption can still provide a layer of protection against unauthorized modification. Decrypting would require the attacker to possess the encryption key, adding a barrier to tampering.
upvoted 1 times
...
D1960
1 year, 4 months ago
Leaning towards AC. Everybody agrees on A. Everybody also agrees that the possible choices are: AB, AC, or AF. If A is done, then B is also effectively done. So B is probably not the best choice. If DACL is made read-only across the board, then authorized users could not alter the code. By default, the best choice seems to be: AC.
upvoted 1 times
D1960
1 year, 4 months ago
After looking at question 233, I think I will change my answer to AF. I think CompTIA wants the test taker to understand that MD5 is used for detection, and DACL prevents code from being modified. So AC for 233 and AF for 68.
upvoted 2 times
...
...
Delab202
1 year, 5 months ago
Selected Answer: AC
For a developer aiming to maintain integrity to each module of a program and ensure the code cannot be altered by malicious users, the best choices would be: A. Utilize code signing by a trusted third party. Code signing involves signing the code with a cryptographic signature, and this signature is verified by the operating system or runtime environment. It ensures that the code has not been tampered with since it was signed. A trusted third party enhances the credibility of the signature. C. Verify MD5 hashes. MD5 hashes can be used to verify the integrity of files. The developer can compute the MD5 hash of each module and provide the computed hashes. Users can then independently calculate the MD5 hash of the downloaded modules and compare them to ensure integrity.
upvoted 2 times
...
The_Lucifer
1 year, 5 months ago
why not F ?
upvoted 2 times
...
smoothAzure
1 year, 5 months ago
What is the right answer? Did anyone take exams
upvoted 1 times
...
Anarckii
1 year, 5 months ago
Selected Answer: AB
correcting to AB
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...