exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 119 discussion

Actual exam question from CompTIA's SY0-601
Question #: 119
Topic #: 1
[All SY0-601 Questions]

Which of the following secure coding techniques makes compromised code more difficult for hackers to use?

  • A. Obfuscation
  • B. Normalization
  • C. Execution
  • D. Reuse
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
varun0
Highly Voted 2 years, 8 months ago
Selected Answer: A
A is correct
upvoted 12 times
ScottT
2 years, 7 months ago
https://en.wikipedia.org/wiki/Obfuscation_(software)
upvoted 1 times
...
...
Protract8593
Highly Voted 1 year, 9 months ago
Selected Answer: A
Obfuscation is a secure coding technique that involves modifying the source code to make it more difficult for hackers to understand or reverse engineer the code. By using obfuscation, the code's logic and structure become more complex and convoluted, making it harder for attackers to identify vulnerabilities or manipulate the code for malicious purposes. This technique aims to increase the level of effort required to exploit or reuse compromised code, thereby enhancing the security of the application.
upvoted 12 times
...
ApplebeesWaiter1122
Most Recent 1 year, 9 months ago
Selected Answer: A
Obfuscation is a secure coding technique that makes compromised code more difficult for hackers to understand and use. It involves modifying the source code in such a way that it becomes more complex, convoluted, or difficult to read and comprehend. The goal of obfuscation is to make the code harder to reverse-engineer, making it challenging for attackers to understand its logic, control flow, and vulnerabilities. By using obfuscation techniques, the code's original intent and functionality are preserved, but its structure and appearance are intentionally made confusing and obscure. This can help protect sensitive information, intellectual property, or proprietary algorithms within the code.
upvoted 3 times
...
LeonardSnart
1 year, 11 months ago
Selected Answer: A
"Obfuscation attempts to make something unclear or difficult to understand, and code obfuscation (or code camouflage) attempts to make the code unreadable. It does things like rename variables, replace numbers with expressions, replace strings of characters with hexadecimal codes, and remove comments. For example, a meaningful variable of strFirstName might be renamed to 94mdiwl, and the number 11 might be changed to 0xF01B – 0x73 – 0xEF9D (which still results in the decimal number 11). It’s worth noting that most security experts reject security through obscurity as a reliable method of maintaining security. Similarly, code obfuscation might make the code difficult to understand by most people. However, it’s still possible for someone with skills to dissect the code." -Security+ Get Certified Get Ahead SY0-601 by Darril Gibson
upvoted 1 times
...
madmax1984
2 years, 3 months ago
Selected Answer: A
Code obfuscation makes the code more difficult to read. Stored procedures are used with SQL databases and can be used for input validation. Normalization refers to organizing tables and columns in a database to reduce redundant data and improve overall database performance.
upvoted 4 times
...
xxxdolorxxx
2 years, 3 months ago
Selected Answer: A
A is the right answer here. I know because I've done exactly that for web dev stuff, lol.
upvoted 2 times
...
rodwave
2 years, 5 months ago
Selected Answer: A
Answer: Obfuscation Obfuscation is the action of making something obscure, unclear, or unintelligible. In software development, obfuscation is the act of creating code that is difficult for humans or computers to understand.
upvoted 7 times
...
Gravoc
2 years, 7 months ago
Don't forget that obfuscation works in the reverse as well. Hackers usually obfuscate their malware and viruses to avoid signature detectors. Things such as writing arbitrary and benign looking code, and sneaking malicious functions into it. Or hackers also like to stretch the key length of their encryption, or use naming conventions that are only easily understandable by the person who created it.
upvoted 2 times
...
Fitzd
2 years, 7 months ago
Three of the most common techniques used to obfuscate data are encryption, tokenization, and data masking.
upvoted 9 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago