{"id":70,"date":"2022-11-28T10:56:53","date_gmt":"2022-11-28T10:56:53","guid":{"rendered":"https:\/\/exampracticetests.com\/c\/CAS-004\/comptia-casp-cas-004-question062\/"},"modified":"2022-11-28T10:56:53","modified_gmt":"2022-11-28T10:56:53","slug":"comptia-casp-cas-004-question062","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/c\/CAS-004\/comptia-casp-cas-004-question062\/","title":{"rendered":"CompTIA CASP+ CAS-004 &#8211; Question062"},"content":{"rendered":"<div class=\"question\">A security architect is implementing a web application that uses a database back end. Prior to the production, the architect is concerned about the possibility of XSS attacks and wants to identify security controls that could be put in place to prevent these attacks.<br \/>\nWhich of the following sources could the architect consult to address this security concern?<br \/><strong><br \/>A.<\/strong> SDLC<br \/><strong>B.<\/strong> OVAL<br \/><strong>C.<\/strong> IEEE<br \/><strong>D.<\/strong> OWASP<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>B<\/strong><\/div>\n<p><strong>Explanation:<\/strong> <\/p>\n<div class=\"explanation\">\nReference: <a href=\"https:\/\/dzone.com\/articles\/what-is-oval-a-community-driven-vulnerability-mana\" title=\"External link\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/dzone.com\/articles\/what-is-oval-a-community-driven-vulnerab&#8230;<\/a><\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>A security architect is implementing a web application that uses a database back end. Prior to the production, the architect is concerned about the possibility of XSS attacks and wants to identify security controls that could be put in place to prevent these attacks. Which of the following sources could the architect consult to address [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,65],"class_list":["post-70","post","type-post","status-publish","format-standard","hentry","category-comptia-casp-cas-004","tag-comptia-casp-cas-004","tag-question-062"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/c\/CAS-004\/wp-json\/wp\/v2\/posts\/70","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/c\/CAS-004\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/c\/CAS-004\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/CAS-004\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/CAS-004\/wp-json\/wp\/v2\/comments?post=70"}],"version-history":[{"count":0,"href":"https:\/\/exampracticetests.com\/c\/CAS-004\/wp-json\/wp\/v2\/posts\/70\/revisions"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/c\/CAS-004\/wp-json\/wp\/v2\/media?parent=70"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/CAS-004\/wp-json\/wp\/v2\/categories?post=70"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/CAS-004\/wp-json\/wp\/v2\/tags?post=70"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}