CompTIA SecurityX Certification Exam CAS-004 Question # 75 Topic 8 Discussion

CompTIA SecurityX Certification Exam CAS-004 Question # 75 Topic 8 Discussion

CAS-004 Exam Topic 8 Question 75 Discussion:
Question #: 75
Topic #: 8

A home automation company just purchased and installed tools for its SOC to enable incident identification and response on software the company develops. The company would like to prioritize defenses against the following attack scenarios:

Unauthorized insertions into application development environments

Authorized insiders making unauthorized changes to environment configurations

Which of the following actions will enable the data feeds needed to detect these types of attacks on development environments? (Choose two.)


A.

Perform static code analysis of committed code and generate summary reports.


B.

Implement an XML gateway and monitor for policy violations.


C.

Monitor dependency management tools and report on susceptible third-party libraries.


D.

Install an IDS on the development subnet and passively monitor for vulnerable services.


E.

Model user behavior and monitor for deviations from normal.


F.

Continuously monitor code commits to repositories and generate summary logs.


Get Premium CAS-004 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.