[Tools and Code Analysis]
A penetration tester is performing a security review of a web application. Which of the following should the tester leverage to identify the presence of vulnerable open-source libraries?
Software Composition Analysis (SCA) is used to analyze dependencies in applications and identify vulnerable open-source libraries.
Option A (VM - Virtual Machine) : A VM is a computing environment, not a vulnerability detection tool.
Option B (IAST - Interactive Application Security Testing) : IAST analyzes runtime behavior, but it does not specialize in detecting vulnerable libraries.
Option C (DAST - Dynamic Application Security Testing) : DAST scans running applications for vulnerabilities, but it does not analyze open-source libraries.
Option D (SCA - Software Composition Analysis) : Correct.
Identifies security flaws in dependencies.
Used for managing supply chain risks.
Reference: CompTIA PenTest+ PT0-003 Official Guide -- Software Composition Analysis (SCA)
Jose
1 day agoGayla
7 days agoGeorgene
12 days agoAn
17 days agoGeraldo
22 days agoDana
27 days agoLeslee
2 months agoBettye
2 months agoNicolette
2 months agoTawny
2 months agoBette
2 months agoLaticia
2 months agoShoshana
3 months agoDelsie
3 months agoStephanie
3 months agoNancey
3 months agoPaola
3 months agoMalcolm
3 months agoArthur
4 months agoMatilda
4 months agoWai
4 months agoMindy
4 months agoShantell
5 months agoCora
5 months agoRamonita
4 months ago