exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 80 discussion

Actual exam question from CompTIA's CAS-004
Question #: 80
Topic #: 1
[All CAS-004 Questions]

A home automation company just purchased and installed tools for its SOC to enable incident identification and response on software the company develops. The company would like to prioritize defenses against the following attack scenarios:
✑ Unauthorized insertions into application development environments
✑ Authorized insiders making unauthorized changes to environment configurations
Which of the following actions will enable the data feeds needed to detect these types of attacks on development environments? (Choose two.)

  • A. Perform static code analysis of committed code and generate summary reports.
  • B. Implement an XML gateway and monitor for policy violations.
  • C. Monitor dependency management tools and report on susceptible third-party libraries.
  • D. Install an IDS on the development subnet and passively monitor for vulnerable services.
  • E. Model user behavior and monitor for deviations from normal.
  • F. Continuously monitor code commits to repositories and generate summary logs.
Show Suggested Answer Hide Answer
Suggested Answer: EF 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
nelombg
Highly Voted 1 year, 2 months ago
E and F are the answers to this question.
upvoted 12 times
...
deeden
Most Recent 5 months, 3 weeks ago
Selected Answer: EF
E. Detects unauthorized insider actions, such as unauthorized changes to configurations, by identifying abnormal user behaviors in the development environment. F. Enables tracking of unauthorized insertions or changes in application development environments by creating logs of code commits and analyzing them for irregularities.
upvoted 3 times
deeden
5 months, 3 weeks ago
A. Detects vulnerabilities in committed code but does not directly address unauthorized insertions or insider threats.
upvoted 1 times
...
...
Bright07
6 months, 1 week ago
And EF. To effectively prioritize defenses against the specified attack scenarios, the following actions will enable the necessary data feeds to detect these types of attacks on development environments: E. Model user behavior and monitor for deviations from normal. This approach helps detect unauthorized changes made by authorized insiders by identifying any anomalous behavior that deviates from the established patterns of normal user activity. F. Continuously monitor code commits to repositories and generate summary logs. Monitoring code commits allows for the detection of unauthorized insertions and changes within the application development environment, as it provides visibility into who is making changes and what those changes entail.
upvoted 1 times
...
IT_Master_Tech
6 months, 2 weeks ago
ChatGPT goes with A and D.
upvoted 1 times
...
23169fd
9 months, 4 weeks ago
Selected Answer: EF
Option A (Static Code Analysis), while valuable for ensuring code security and quality, does not directly address the specific scenarios of unauthorized insertions and insider threats as effectively as Options E and F. Static code analysis focuses on code quality and vulnerability detection, not on monitoring and detecting unauthorized actions.
upvoted 2 times
...
EAlonso
10 months ago
E.F, after F comes A as next step.
upvoted 2 times
...
cyspec
10 months, 1 week ago
Selected Answer: EF
SAST addresses the issue of poorly written code, not maliciously written code.
upvoted 3 times
...
ToPH
11 months ago
Selected Answer: EF
E. Model user behavior and monitor for deviations from normal. This approach involves using User and Entity Behavior Analytics (UEBA) to establish a baseline of normal user behavior and detect deviations. By modeling user behavior, the SOC can identify unauthorized activities by insiders, such as unauthorized changes to environment configurations. F. Continuously monitor code commits to repositories and generate summary logs. Monitoring code commits to repositories helps detect unauthorized insertions and changes in the codebase. Generating summary logs of these commits allows the SOC to track and identify suspicious activities or unauthorized changes made by insiders.
upvoted 4 times
...
ra774ra7
1 year, 3 months ago
Selected Answer: EF
E. Model user behavior and monitor for deviations from normal. This option focuses on detecting anomalies in user behavior within the development environment. By establishing baselines for typical actions and access patterns, the system can flag unusual activity that might indicate unauthorized insertions or configuration changes. This includes monitoring access times, modifications made, files accessed, and commands executed. F. Continuously monitor code commits to repositories and generate summary logs. This option provides visibility into changes made to the codebase. Monitoring commits allows for early detection of suspicious insertions, backdoors, or other malicious code injected by attackers. Analyzing commit logs can also reveal patterns of unauthorized activity, even if the attacker tries to blend in with legitimate changes. A. Doesn't help because it doesn't directly address unauthorized insertions or configuration changes.
upvoted 4 times
...
talosDevbot
1 year, 3 months ago
Selected Answer: EF
F) will detect unauthorized insertion E) will address the concern of insider threat. UEBA is commonly used to detect malicious activity from insiders. Note that the second attack scenario in the question is for unauthorized changes to *environmental configurations*. It does not state any changes to the code. The environmental configurations include things server addresses, database connection strings, and API endpoints. So if you have UEBA implemented, usually on a SIEM, you can detect these unauthorized changes in configuration.
upvoted 3 times
...
BiteSize
1 year, 9 months ago
Selected Answer: AF
A = SAST F = CONMON Best choices for coding protections in a modern dev environment. If they have a CI/CD pipeline, I would also recommend a DSAT. C is important but isn't as good D doesn't have enough action to it, a passive IDS doesn't beat CONMON and analysis of code. Source: Verifying each answer against Chat GPT, my experience, other test banks, a written book, and weighing in the discussion from all users to create a 100% accurate guide for myself before I take the exam. (It isn't easy because of the time needed, but it is doing my diligence)
upvoted 4 times
...
kycugu
2 years, 4 months ago
A. Perform static code analysis of committed code and generate summary reports. F. Continuously monitor code commits to repositories and generate summary logs. Performing static code analysis of committed code and continuously monitoring code commits to repositories can help detect unauthorized insertions into application development environments. Static code analysis is a technique that involves analyzing code without executing it to identify potential vulnerabilities, security flaws, or other issues. By performing static code analysis of committed code and generating summary reports, the home automation company can identify any code that does not meet its standards or that may be malicious.
upvoted 3 times
...
atebyasandwich
2 years, 4 months ago
Selected Answer: AF
It best meets the requirements of the question.
upvoted 3 times
...
dangerelchulo
2 years, 7 months ago
Selected Answer: AF
Is best actions for internal code review and security
upvoted 3 times
...
Agrona
2 years, 8 months ago
Selected Answer: AF
I like AF as the concern is "insider" static code reviews and submitted summary reports would be a good check against an insider threat. I thought IDS at first, but the concern isnt detecting an unusual presence or event at the transport layer, rather the integrity of the code.
upvoted 3 times
...
AlexJacobson
2 years, 9 months ago
Selected Answer: DF
Here what I think: D - you want to prevent "unauthorized insertion into development environment" so you need to watch that network segment - IDS F - you are monitoring commits done by authorized devs, making sure they don't abuse the access and do something bad in the code on purpose.
upvoted 3 times
AlexJacobson
2 years, 9 months ago
BTW, it can also be C and F. (C is basically saying that you are monitoring any changes with libraries and similar)
upvoted 1 times
...
BiteSize
1 year, 9 months ago
I would agree with D being an option but it says passively monitor services. I don't like the word passively, seems like making security an afterthought, if they said setup continuous monitoring (active monitoring) that would definitely be the answer
upvoted 1 times
...
...
RevZig67
2 years, 11 months ago
Selected Answer: AF
I think A F.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago