[Tools and Code Analysis]
A penetration tester is performing a security review of a web application. Which of the following should the tester leverage to identify the presence of vulnerable open-source libraries?
Software Composition Analysis (SCA) is used to analyze dependencies in applications and identify vulnerable open-source libraries.
Option A (VM - Virtual Machine) : A VM is a computing environment, not a vulnerability detection tool.
Option B (IAST - Interactive Application Security Testing) : IAST analyzes runtime behavior, but it does not specialize in detecting vulnerable libraries.
Option C (DAST - Dynamic Application Security Testing) : DAST scans running applications for vulnerabilities, but it does not analyze open-source libraries.
Option D (SCA - Software Composition Analysis) : Correct.
Identifies security flaws in dependencies.
Used for managing supply chain risks.
Reference: CompTIA PenTest+ PT0-003 Official Guide -- Software Composition Analysis (SCA)
Leslee
16 hours agoBettye
6 days agoNicolette
11 days agoTawny
16 days agoBette
21 days agoLaticia
27 days agoShoshana
1 month agoDelsie
1 month agoStephanie
1 month agoNancey
2 months agoPaola
2 months agoMalcolm
2 months agoArthur
2 months agoMatilda
2 months agoWai
3 months agoMindy
3 months agoShantell
3 months agoCora
3 months agoRamonita
2 months ago