An organization found that some older third-party libraries are used in an application and were exploited by intruders. Which action is best for preventing a similar recurrence?
Remove all deprecated functions from the development project
Use secrets management for any embedded credentials
Apply consistent updates and scans for external dependencies
Add robust memory-safe calls to critical functions
Ensuring regular patching and updating of external dependencies is more effective than narrowly focusing on memory safeguards or secrets management. Properly managing third-party libraries detects known weaknesses and addresses them with updates. While memory-safe calls and secrets management bring additional security benefits, they do not resolve embedded weaknesses in outdated code. Removing deprecated functions further helps, but it does not address vulnerable libraries retained in the environment.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it critical to update and scan external dependencies?
Open an interactive chat with Bash
What are third-party libraries, and why do they pose security risks?
Open an interactive chat with Bash
How do tools for dependency management enhance security?