ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 123 - CS0-003 discussion

Report
Export

A software developer has been deploying web applications with common security risks to include insufficient logging capabilities. Which of the following actions would be most effective to reduce risks associated with the application development?

A.
Perform static analyses using an integrated development environment.
Answers
A.
Perform static analyses using an integrated development environment.
B.
Deploy compensating controls into the environment.
Answers
B.
Deploy compensating controls into the environment.
C.
Implement server-side logging and automatic updates.
Answers
C.
Implement server-side logging and automatic updates.
D.
Conduct regular code reviews using OWASP best practices.
Answers
D.
Conduct regular code reviews using OWASP best practices.
Suggested answer: D

Explanation:

Conducting regular code reviews using OWASP best practices is the most effective action to reduce risks associated with the application development. Code reviews are a systematic examination of the source code of an application to detect and fix errors, vulnerabilities, and weaknesses that may compromise the security, functionality, or performance of the application. Code reviews can help to improve the quality and security of the code, as well as to identify and remediate common security risks, such as insufficient logging capabilities. OWASP (Open Web Application Security Project) is a global nonprofit organization that provides free and open resources, tools, standards, and best practices for web application security. OWASP best practices for logging include following a common logging format and approach, logging relevant security events and data, protecting log data from unauthorized access or modification, and using log analysis and monitoring tools to detect and respond to security incidents. By following OWASP best practices for logging, developers can ensure that their web applications have sufficient and effective logging capabilities that can help to prevent, detect, and mitigate security threats.

asked 02/10/2024
Alberto Paniagua
30 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first