exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 75 discussion

Actual exam question from CompTIA's CS0-002
Question #: 75
Topic #: 1
[All CS0-002 Questions]

A security analyst is generating a list of recommendations for the company's insecure API. Which of the following is the BEST parameter mitigation recommendation?

  • A. Use TLS for all data exchanges.
  • B. Use effective authentication and authorization methods.
  • C. Implement parameterized queries.
  • D. Validate all incoming data.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
encxorblood
Highly Voted 2 years, 4 months ago
Selected Answer: D
Answer is D - Using effective authentication and authorization methods (option B) is important for ensuring that only authorized users can access the API, but it does not specifically address the issue of insecure API parameters.
upvoted 12 times
2Fish
2 years, 3 months ago
I am leaning on D as well. As you mentioned; this question specifically asks for best 'parameter mitigation'.
upvoted 5 times
...
...
db97
Highly Voted 2 years, 4 months ago
Selected Answer: B
I think all of them are good recommendations, but B is more important for me due to with a proper authorization and authentication mechanism you are ensuring that only trusted sources/destinations get involved with the exchange of information. After this, you can set other security controls such as validate the incoming data and establish a secure channel with TLS. Reference: https://www.techtarget.com/searchapparchitecture/tip/10-API-security-guidelines-and-best-practices
upvoted 6 times
...
edro
Most Recent 1 year, 7 months ago
Access related attack would require authentication as a mitigation measure Parameter attacks like an injection requires code validation as a security measure Answer is D
upvoted 1 times
...
kumax
1 year, 9 months ago
Selected Answer: D
ChatGPt: 1. Implement Input Validation 2. Implement Output Encoding
upvoted 1 times
...
Kaynem
1 year, 9 months ago
Selected Answer: D
Jason dion says whenever you see input validation, it's the answer. Can't say no to Jason.
upvoted 3 times
...
kmordalv
1 year, 9 months ago
Selected Answer: B
https://blog.hubspot.com/website/api-security#best-practices
upvoted 1 times
...
SimonR2
2 years, 2 months ago
If you actually look at the owasp top 10, the number one security issue is "Broken object property level authorization" my vote is for B
upvoted 1 times
...
kiduuu
2 years, 2 months ago
Selected Answer: D
Validating all incoming data would be the BEST parameter mitigation recommendation for an insecure API. This is because validating incoming data helps to prevent injection attacks, such as SQL injection or cross-site scripting (XSS), by ensuring that the data is in the expected format and does not contain malicious code or unexpected characters. While TLS, authentication and authorization methods, and parameterized queries are also important security measures, they do not specifically address parameter validation and would not be the BEST parameter mitigation recommendation in this case.
upvoted 4 times
...
10cccordrazine
2 years, 4 months ago
Selected Answer: D
The question says "parameter mitigation", which I admit is not very clear, but makes me want to choose D instead of B. Of course B is always required when building an API, but I don't think that is what the question is asking for. Also: https://www.esecurityplanet.com/applications/how-to-control-api-security-risks/
upvoted 5 times
...
absabs
2 years, 4 months ago
Answer is B other question sites.
upvoted 1 times
...
Stiobhan
2 years, 5 months ago
Enough said!!! https://blog.hubspot.com/website/api-security#:~:text=API%20Security%20Best%20Practices%201%201.%20Implement%20authentication.,activity.%20...%208%208.%20Conduct%20security%20tests.%20
upvoted 2 times
...
TeyMe
2 years, 7 months ago
Selected Answer: B
I would have gone for A if the question referenced REST API but B seems correct
upvoted 1 times
...
MortG7
2 years, 8 months ago
Selected Answer: B
API Security Top 10 2019 Here is a sneak peek of the 2019 version: API1:2019 Broken Object Level Authorization APIs tend to expose endpoints that handle object identifiers, creating a wide attack surface Level Access Control issue. Object level authorization checks should be considered in every function that accesses a data source using an input from the user. Read more. API2:2019 Broken User Authentication Authentication mechanisms are often implemented incorrectly, allowing attackers to compromise authentication tokens or to exploit implementation flaws to assume other user’s identities temporarily or permanently. Compromising a system’s ability to identify the client/user, compromises API security overall. Read more.
upvoted 2 times
...
Adrian831
2 years, 9 months ago
Selected Answer: B
Authentication and Authorization Both authentication and authorization are core to the security of APIs. They play different roles but together they ensure that the right legitimate consumer has the right permissions to access an API.
upvoted 3 times
db97
2 years, 4 months ago
A reasonable and simple answer. I support this. I also found this other reference: https://www.techtarget.com/searchapparchitecture/tip/10-API-security-guidelines-and-best-practices
upvoted 1 times
...
...
R00ted
2 years, 9 months ago
Selected Answer: A
Use TLS for data exchanges
upvoted 1 times
R00ted
2 years, 8 months ago
Changing my answer to B
upvoted 2 times
...
...
EVE12
2 years, 9 months ago
One common reason is that access to the APIs is often uncontrolled; insufficient permissions or authentication may be involved in accessing the API by unauthorized personnel. Broken object-level authorization Failure to authorize access on an object basis • Broken user authentication Failure to account for all the different ways a user could authenticate to the API, such as through other applications https://learning.oreilly.com/library/view/comptia-cysa
upvoted 1 times
...
amateurguy
2 years, 9 months ago
Why does it seem like C should be the answer?
upvoted 4 times
f3lix
2 years, 6 months ago
I also would honestly want to belive C is the answer as the question is "BEST parameter mitigation recommendation", wouldnt that be implementing parameterized queries?
upvoted 3 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...