ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 95 - CAS-004 discussion

Report
Export

A home automation company just purchased and installed tools for its SOC to enable incident identification and response on software the company develops. The company would like to prioritize defenses against the following attack scenarios:

Unauthorized insertions into application development environments

Authorized insiders making unauthorized changes to environment configurations

Which of the following actions will enable the data feeds needed to detect these types of attacks on development environments? (Choose two.)

A.
Perform static code analysis of committed code and generate summary reports.
Answers
A.
Perform static code analysis of committed code and generate summary reports.
B.
Implement an XML gateway and monitor for policy violations.
Answers
B.
Implement an XML gateway and monitor for policy violations.
C.
Monitor dependency management tools and report on susceptible third-party libraries.
Answers
C.
Monitor dependency management tools and report on susceptible third-party libraries.
D.
Install an IDS on the development subnet and passively monitor for vulnerable services.
Answers
D.
Install an IDS on the development subnet and passively monitor for vulnerable services.
E.
Model user behavior and monitor for deviations from normal.
Answers
E.
Model user behavior and monitor for deviations from normal.
F.
Continuously monitor code commits to repositories and generate summary logs.
Answers
F.
Continuously monitor code commits to repositories and generate summary logs.
Suggested answer: E, F

Explanation:

Modeling user behavior and monitoring for deviations from normal and continuously monitoring code commits to repositories and generating summary logs are actions that will enable the data feeds needed to detect unauthorized insertions into application development environments and authorized insiders making unauthorized changes to environment configurations. Modeling user behavior and monitoring for deviations from normal is a technique that uses baselines, analytics, machine learning, or other methods to establish normal patterns of user activity and identify anomalies or outliers that could indicate malicious or suspicious behavior. Modeling user behavior and monitoring for deviations from normal can help detect unauthorized insertions into application development environments, as it can alert on unusual or unauthorized access attempts, commands, actions, or transactions by users. Continuously monitoring code commits to repositories and generating summary logs is a technique that uses tools, scripts, automation, or other methods to track and record changes made to code repositories by developers, testers, reviewers, or other parties involved in the software development process. Continuously monitoring code commits to repositories and generating summary logs can help detect authorized insiders making unauthorized changes to environment configurations, as it can audit and verify the source, time, reason, and impact of code changes made by authorized users. Performing static code analysis of committed code and generate summary reports is not an action that will enable the data feeds needed to detect unauthorized insertions into application development environments and authorized insiders making unauthorized changes to environment configurations, but an action that will enable the data feeds needed to detect vulnerabilities, errors, bugs, or quality issues in committed code. Implementing an XML gateway and monitor for policy violations is not an action that will enable the data feeds needed to detect unauthorized insertions into application development environments and authorized insiders making unauthorized changes to environment configurations, but an action that will enable the data feeds needed to protect XML-based web services from threats or attacks by validating XML messages against predefined policies. Monitoring dependency management tools and report on susceptible third-party libraries is not an action that will enable the data feeds needed to detect unauthorized insertions into application development environments and authorized insiders making unauthorized changes to environment configurations, but an action that will enable the data feeds needed to identify outdated or vulnerable third-party libraries used in software development projects. Installing an IDS (intrusion detection system) on the development subnet and passively monitor for vulnerable services is not an action that will enable the data feeds needed to detect unauthorized insertions into application development environments and authorized insiders making unauthorized changes

asked 02/10/2024
Ziyad Karadsheh
33 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first