exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 233 discussion

Actual exam question from CompTIA's CAS-004
Question #: 233
Topic #: 1
[All CAS-004 Questions]

A developer wants to maintain integrity to each module of a program and ensure controls are in place to detect unauthorized code modification. Which of the following would be BEST for the developer to perform? (Choose two.)

  • A. Utilize code signing by a trusted third party.
  • B. Implement certificate-based authentication.
  • C. Verify MD5 hashes.
  • D. Compress the program with a password.
  • E. Encrypt with 3DES.
  • F. Make the DACL read-only.
Show Suggested Answer Hide Answer
Suggested Answer: AC 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
javier051977
Highly Voted 1 year ago
Selected Answer: AC
A. Utilize code signing by a trusted third party: Code signing is a process that allows a developer to digitally sign their code with a certificate. This certificate is issued by a trusted third party and confirms that the code has not been tampered with or modified since it was signed. When users run the program, their computer will check the code signature to ensure that it has not been modified, providing a strong assurance of code integrity. C. Verify MD5 hashes: A hash function is a mathematical function that takes input data and produces a fixed-size output called a hash value. MD5 is a commonly used hash function that can be used to verify the integrity of a file. By generating an MD5 hash value for each module of the program, the developer can verify that the module has not been modified. If the hash value changes, it indicates that the module has been tampered with.
upvoted 7 times
...
Ariel235788
Highly Voted 7 months, 1 week ago
Selected Answer: AC
Guys, q68: A developer wants to maintain integrity to each module of a program and ensure the *code cannot be altered by malicious users*. (answers; A and F) This q: A developer wants to maintain integrity to each module of a program and ensure controls are in place to *detect unauthorized code modification*. (Answers; A and C)
upvoted 6 times
...
joinedatthehop
Most Recent 7 months, 2 weeks ago
Repeat of question #68.
upvoted 1 times
Alex_2169
7 months, 1 week ago
the questions are slightly different
upvoted 5 times
joinedatthehop
6 months, 3 weeks ago
You are correct. It is different than #68. The answer fir this question here is AC
upvoted 2 times
...
...
Ariel235788
7 months, 1 week ago
Yup they added this part: ensure controls are in place to detect unauthorized code modification. Note: DETECT. Verifying MD5 hashes detects changes. q68 asks you to ensure no malicious user can modify code, making THOSE answer choices A and F
upvoted 4 times
...
...
pawnpusher
8 months, 2 weeks ago
C is WRONG! MD5 hashes will not be available on "modules" of an application.
upvoted 1 times
...
Sleezyglizzy
9 months ago
AC On sec+, Cysa+ anything that dealt with integrity the answer was most likely hashes. btw I passed both
upvoted 4 times
...
BreakOff874
1 year ago
Selected Answer: AC
Answer is A and C. B will prevent and not detect unauthorized code modification.
upvoted 4 times
...
darkdumper
1 year ago
Selected Answer: AB
same q68
upvoted 3 times
Ariel235788
7 months, 1 week ago
slightly different actually; Yup they added this part: ensure controls are in place to detect unauthorized code modification. Note: DETECT. Verifying MD5 hashes detects changes. q68 asks you to ensure no malicious user can modify code, making THOSE answer choices A and F
upvoted 1 times
...
...
Amin4799
1 year, 1 month ago
Selected Answer: AB
same q68
upvoted 1 times
Ariel235788
7 months, 1 week ago
Go back and re-read. They are asking slightly different things
upvoted 1 times
...
...
Geofab
1 year, 1 month ago
Selected Answer: AB
going with my original answer on question 68
upvoted 1 times
Ariel235788
7 months, 1 week ago
You should re-read q68
upvoted 1 times
...
...
encxorblood
1 year, 1 month ago
Selected Answer: AF
A. Utilize code signing by a trusted third party. F. Make the DACL (Discretionary Access Control List) read-only. Utilizing code signing by a trusted third party ensures that each module's integrity is maintained, as the digital signature verifies the authenticity and integrity of the code. Making the DACL read-only helps protect against unauthorized code modification by limiting write access to the appropriate individuals or groups.
upvoted 3 times
Meep123
7 months, 1 week ago
The question is asking about detecting, not preventing. Very good answer and explaination, but I believe it to be Trusted Third Party and MD5.
upvoted 1 times
...
...
josepa
1 year, 1 month ago
AB, correct
upvoted 2 times
...
unBREAKable_Fs4
1 year, 1 month ago
A and B
upvoted 4 times
...
OneSaint
1 year, 2 months ago
Repeat Q68
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago