{"id":88,"date":"2022-11-28T10:57:12","date_gmt":"2022-11-28T10:57:12","guid":{"rendered":"https:\/\/exampracticetests.com\/c\/CAS-004\/comptia-casp-cas-004-question080\/"},"modified":"2022-11-28T10:57:12","modified_gmt":"2022-11-28T10:57:12","slug":"comptia-casp-cas-004-question080","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/c\/CAS-004\/comptia-casp-cas-004-question080\/","title":{"rendered":"CompTIA CASP+ CAS-004 &#8211; Question080"},"content":{"rendered":"<div class=\"question\">A home automation company just purchased and installed tools for its SOC to enable incident identification and response on software the company develops. The company would like to prioritize defenses against the following attack scenarios:<br \/>\n&#8211; Unauthorized insertions into application development environments<br \/>\n&#8211; Authorized insiders making unauthorized changes to environment configurations<br \/>\nWhich of the following actions will enable the data feeds needed to detect these types of attacks on development environments? (Choose two.)<br \/><strong><br \/>A.<\/strong> Perform static code analysis of committed code and generate summary reports.<br \/><strong>B.<\/strong> Implement an XML gateway and monitor for policy violations.<br \/><strong>C.<\/strong> Monitor dependency management tools and report on susceptible third-party libraries.<br \/><strong>D.<\/strong> Install an IDS on the development subnet and passively monitor for vulnerable services.<br \/><strong>E.<\/strong> Model user behavior and monitor for deviations from normal.<br \/><strong>F.<\/strong> Continuously monitor code commits to repositories and generate summary logs.<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>CD<\/strong><\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>A home automation company just purchased and installed tools for its SOC to enable incident identification and response on software the company develops. The company would like to prioritize defenses against the following attack scenarios: &#8211; Unauthorized insertions into application development environments &#8211; Authorized insiders making unauthorized changes to environment configurations Which of the following [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,83],"class_list":["post-88","post","type-post","status-publish","format-standard","hentry","category-comptia-casp-cas-004","tag-comptia-casp-cas-004","tag-question-080"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/c\/CAS-004\/wp-json\/wp\/v2\/posts\/88","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/c\/CAS-004\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/c\/CAS-004\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/CAS-004\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/CAS-004\/wp-json\/wp\/v2\/comments?post=88"}],"version-history":[{"count":0,"href":"https:\/\/exampracticetests.com\/c\/CAS-004\/wp-json\/wp\/v2\/posts\/88\/revisions"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/c\/CAS-004\/wp-json\/wp\/v2\/media?parent=88"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/CAS-004\/wp-json\/wp\/v2\/categories?post=88"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/CAS-004\/wp-json\/wp\/v2\/tags?post=88"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}