exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 233 discussion

Actual exam question from CompTIA's CAS-004
Question #: 233
Topic #: 1
[All CAS-004 Questions]

A developer wants to maintain integrity to each module of a program and ensure controls are in place to detect unauthorized code modification. Which of the following would be BEST for the developer to perform? (Choose two.)

  • A. Utilize code signing by a trusted third party.
  • B. Implement certificate-based authentication.
  • C. Verify MD5 hashes.
  • D. Compress the program with a password.
  • E. Encrypt with 3DES.
  • F. Make the DACL read-only.
Show Suggested Answer Hide Answer
Suggested Answer: AC 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
javier051977
Highly Voted 1 year, 2 months ago
Selected Answer: AC
A. Utilize code signing by a trusted third party: Code signing is a process that allows a developer to digitally sign their code with a certificate. This certificate is issued by a trusted third party and confirms that the code has not been tampered with or modified since it was signed. When users run the program, their computer will check the code signature to ensure that it has not been modified, providing a strong assurance of code integrity. C. Verify MD5 hashes: A hash function is a mathematical function that takes input data and produces a fixed-size output called a hash value. MD5 is a commonly used hash function that can be used to verify the integrity of a file. By generating an MD5 hash value for each module of the program, the developer can verify that the module has not been modified. If the hash value changes, it indicates that the module has been tampered with.
upvoted 7 times
...
Ariel235788
Highly Voted 8 months, 4 weeks ago
Selected Answer: AC
Guys, q68: A developer wants to maintain integrity to each module of a program and ensure the *code cannot be altered by malicious users*. (answers; A and F) This q: A developer wants to maintain integrity to each module of a program and ensure controls are in place to *detect unauthorized code modification*. (Answers; A and C)
upvoted 6 times
...
joinedatthehop
Most Recent 9 months ago
Repeat of question #68.
upvoted 1 times
Alex_2169
8 months, 4 weeks ago
the questions are slightly different
upvoted 5 times
joinedatthehop
8 months, 2 weeks ago
You are correct. It is different than #68. The answer fir this question here is AC
upvoted 2 times
...
...
Ariel235788
8 months, 4 weeks ago
Yup they added this part: ensure controls are in place to detect unauthorized code modification. Note: DETECT. Verifying MD5 hashes detects changes. q68 asks you to ensure no malicious user can modify code, making THOSE answer choices A and F
upvoted 4 times
...
...
pawnpusher
10 months ago
C is WRONG! MD5 hashes will not be available on "modules" of an application.
upvoted 1 times
...
Sleezyglizzy
10 months, 3 weeks ago
AC On sec+, Cysa+ anything that dealt with integrity the answer was most likely hashes. btw I passed both
upvoted 4 times
...
BreakOff874
1 year, 2 months ago
Selected Answer: AC
Answer is A and C. B will prevent and not detect unauthorized code modification.
upvoted 4 times
...
darkdumper
1 year, 2 months ago
Selected Answer: AB
same q68
upvoted 3 times
Ariel235788
8 months, 4 weeks ago
slightly different actually; Yup they added this part: ensure controls are in place to detect unauthorized code modification. Note: DETECT. Verifying MD5 hashes detects changes. q68 asks you to ensure no malicious user can modify code, making THOSE answer choices A and F
upvoted 1 times
...
...
Amin4799
1 year, 2 months ago
Selected Answer: AB
same q68
upvoted 1 times
Ariel235788
8 months, 4 weeks ago
Go back and re-read. They are asking slightly different things
upvoted 1 times
...
...
Geofab
1 year, 2 months ago
Selected Answer: AB
going with my original answer on question 68
upvoted 1 times
Ariel235788
8 months, 4 weeks ago
You should re-read q68
upvoted 1 times
...
...
encxorblood
1 year, 3 months ago
Selected Answer: AF
A. Utilize code signing by a trusted third party. F. Make the DACL (Discretionary Access Control List) read-only. Utilizing code signing by a trusted third party ensures that each module's integrity is maintained, as the digital signature verifies the authenticity and integrity of the code. Making the DACL read-only helps protect against unauthorized code modification by limiting write access to the appropriate individuals or groups.
upvoted 3 times
Meep123
9 months ago
The question is asking about detecting, not preventing. Very good answer and explaination, but I believe it to be Trusted Third Party and MD5.
upvoted 1 times
...
...
josepa
1 year, 3 months ago
AB, correct
upvoted 2 times
...
unBREAKable_Fs4
1 year, 3 months ago
A and B
upvoted 4 times
...
OneSaint
1 year, 4 months ago
Repeat Q68
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...