exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 200 discussion

Actual exam question from CompTIA's SY0-601
Question #: 200
Topic #: 1
[All SY0-601 Questions]

Which of the following is the MOST effective way to detect security flaws present on third-party libraries embedded on software before it is released into production?

  • A. Employ different techniques for server- and client-side validations
  • B. Use a different version control system for third-party libraries
  • C. Implement a vulnerability scan to assess dependencies earlier on SDLC
  • D. Increase the number of penetration tests before software release
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
stoneface
Highly Voted 2 years, 9 months ago
Selected Answer: C
Going with C
upvoted 31 times
J_Ark1
2 years, 6 months ago
what is sdlc? again
upvoted 5 times
babyzilla
2 years, 6 months ago
Systems Development Cycle
upvoted 2 times
babyzilla
2 years, 6 months ago
Systems Development Life* Cycle
upvoted 4 times
...
...
Sandon
2 years, 6 months ago
Software development life cycle
upvoted 10 times
...
...
DirtyDann
1 year, 6 months ago
stoneface has sp0ken
upvoted 3 times
...
i_luv_stoneface
2 years, 3 months ago
UR RIGHT BABY BOY
upvoted 17 times
...
Old_Boy_
1 year, 6 months ago
King stoneface has spoken
upvoted 7 times
...
...
ApplebeesWaiter1122
Highly Voted 1 year, 10 months ago
Selected Answer: C
Using a vulnerability scan to assess dependencies in third-party libraries earlier in the software development life cycle (SDLC) is the most effective way to detect security flaws. Vulnerability scanning tools can automatically analyze software and its dependencies to identify known vulnerabilities and security issues. By performing these scans early in the SDLC, developers can identify and address security flaws in third-party libraries before the software is released into production.
upvoted 8 times
...
Kid_lela
Most Recent 2 years, 2 months ago
Guys I can’t see the rest of the questions after question number 200? Am I the only one?
upvoted 2 times
assfedassfinished
2 years, 2 months ago
Temporarily Restricted Page CompTIA SY0-601 The last segment of each exam is restricted solely to users with Contributor Access. We decided to take this temporary action in an effort to catch up with the costs of ExamTopics infrastructure, moderation personal and simultaneously reduce infrastructure load. Please consider getting Contributor Access- users with Contributor Access get many other benefits, such as printable whole exams (with discussions included), inline discussions right next to the questions, and many more features. Thank you for understanding, ExamTopics team. I suspect that you got the same thing?
upvoted 2 times
...
...
siyoooowpaooo
2 years, 3 months ago
From Messer Practice Test: A company has just purchased a new application server, and the security director wants to determine if the system is secure. The system is currently installed in a test environment and will not be available to users until the rollout to production next week. Which of the following would be the BEST way to determine if any part of the system can be exploited? ❍ A. Tabletop exercise ❍ B. Vulnerability scanner ❍ C. Password cracker ❍ D. Penetration test The Answer: D. Penetration test A penetration test can be used to actively exploit potential vulnerabilities in a system or application. This could cause a denial of service or loss of data, so the best practice is to perform the penetration test during non￾production hours or in a test environment.
upvoted 4 times
...
ronniehaang
2 years, 4 months ago
Selected Answer: C
C. Implement a vulnerability scan to assess dependencies earlier on SDLC It is a best practice to assess security flaws in software dependencies as early as possible in the software development life cycle (SDLC) to minimize the risk of vulnerabilities being exploited in production. One effective way to do this is by implementing a vulnerability scan to assess dependencies, which are third-party libraries embedded in the software. A vulnerability scan can detect security flaws and vulnerabilities in the libraries used by the software and provide recommendations for remediation. By implementing a vulnerability scan early in the SDLC, the company can proactively address security issues before they become a problem in production.
upvoted 4 times
...
FMMIR
2 years, 5 months ago
Selected Answer: C
The most effective way to detect security flaws present on third-party libraries embedded on software before it is released into production is to implement a vulnerability scan to assess dependencies earlier on the SDLC, or software development life cycle. A vulnerability scan is a type of security assessment that involves identifying and analyzing potential vulnerabilities in a system or application. By conducting a vulnerability scan earlier on in the SDLC, the development team can identify any security flaws in the third-party libraries before the software is released into production. This can help prevent security issues from being introduced into the production environment and ensure that the software is secure and compliant. Employing different techniques for server- and client-side validations, using a different version control system for third-party libraries, and increasing the number of penetration tests are not directly related to detecting security flaws in third-party libraries.
upvoted 3 times
...
rodwave
2 years, 6 months ago
Selected Answer: C
Answer: Implement a vulnerability scan to assess dependencies earlier on SDLC Implementing vulnerability scans allows for earlier detection and assessment of any potential vulnerabilities, which can then be addressed accordingly.
upvoted 1 times
...
zharis
2 years, 7 months ago
Selected Answer: D
Going with D. Penetration tests which actively test security controls exploit vulnerabilities - prove that a vulnerability is high risk by exploiting it to gain access to data or install backdoors
upvoted 4 times
...
RonWonkers
2 years, 8 months ago
Selected Answer: C
Gonna go with C
upvoted 1 times
...
okay123
2 years, 9 months ago
Selected Answer: C
It's C
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...