ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 110 - SY0-601 discussion

Report
Export

Which of the following are the MOST likely vectors for the unauthorized inclusion of vulnerable code in a software company’s final software releases? (Select TWO.)

A.
Unsecure protocols
Answers
A.
Unsecure protocols
B.
Use of penetration-testing utilities
Answers
B.
Use of penetration-testing utilities
C.
Weak passwords
Answers
C.
Weak passwords
D.
Included third-party libraries
Answers
D.
Included third-party libraries
E.
Vendors/supply chain
Answers
E.
Vendors/supply chain
F.
Outdated anti-malware software
Answers
F.
Outdated anti-malware software
Suggested answer: D, E

Explanation:

The most likely vectors for the unauthorized inclusion of vulnerable code in a software company's final software releases are included third-party libraries and vendors/supply chain. Reference:

CompTIA Security+ Study Guide by Emmett Dulaney, Chapter 8: Application, Data, and Host Security, Supply Chain and Software Development Life Cycle

asked 02/10/2024
Carlos Castro
29 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first