SAST scans provides you the list ofA) Exploitable vulnerabilitiesB) Code quality assuranceC) Both A and BD) Potential code security flawsReset Answer
Question
SAST scans provides you the list of
A) Exploitable vulnerabilities
B) Code quality assurance
C) Both A and B
D) Potential code security flaws
Reset Answer
Solution
Break Down the Problem
- Identify the purpose of SAST (Static Application Security Testing) scans.
- Determine what outputs or findings are generated by SAST scans.
Relevant Concepts
- SAST Purpose: SAST is a method to analyze source code for vulnerabilities without executing the program.
- Outputs of SAST: SAST scans typically generate reports that highlight security flaws and vulnerabilities in the source code.
Analysis and Detail
- Exploitable Vulnerabilities: SAST scans do help in identifying vulnerabilities that can be exploited.
- Code Quality Assurance: While SAST focuses primarily on security, it may also assist in enhancing code quality, but this is not its primary purpose.
- Potential Code Security Flaws: The primary output of SAST scans is to identify security flaws in the code, making this a core function of such scans.
Verify and Summarize
- SAST scans predominantly provide a list of exploitable vulnerabilities and potential code security flaws.
- While they can contribute to code quality, that is not explicitly their main function.
Final Answer
The correct answer is C) Both A and B, as SAST scans provide a list of exploitable vulnerabilities and potential code security flaws.
Similar Questions
hat type of vulnerabilities cannot be identified by SAST Scanning?Cross Site ScriptingSQL InjectionBusiness LogicServer Side Request forgeryReset Answer
What type of vulnerability scanner woudl you use to test for vulnerabilities on a assessment?
Which application security testing method is considered most costly?SASTDASTboth a and bNone of the above
Which of the following comes under the threat category ‘Software Attack’?Group of answer choicesBuffer OverrunSQL InjectionCross-Site ScriptingTrojan Horse
Which of the following tools is primarily used for vulnerability scanning?1 pointA) WiresharkB) MetasploitC) NmapD) Nessus
Upgrade your grade with Knowee
Get personalized homework help. Review tough concepts in more detail, or go deeper into your topic by exploring other relevant questions.