Before embedding third-party libraries in developed code, it is crucial to assess the existing vulnerabilities in the third-party code and evaluate the responsiveness and efficiency of the library developers in addressing these vulnerabilities. This check helps to ensure that the third-party libraries are secure and do not introduce unnecessary risks into the developed code.
The other options may provide valuable information about the third-party libraries, but assessing existing vulnerabilities and the responsiveness of the library developers is the most relevant security check in this context.
What to be done to best prevent issues in third-party code?
Establish a baseline and process for every third-party software that is introduced into the organisation, including performing a risk assessment to establish the risk associated with implementing a certain piece of code.
This section is not available anymore. Please use the main Exam Page.SY0-601 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
comeragh
Highly Voted 2 years, 8 months agoProtract8593
Most Recent 1 year, 9 months agoSabITSec
2 years, 5 months agoImanism
2 years, 6 months agoRonWonkers
2 years, 7 months agovarun0
2 years, 8 months ago