Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 402 discussion

Actual exam question from ISC's CISSP
Question #: 402
Topic #: 1
[All CISSP Questions]

In order to meet the project delivery deadline, a web application developer used readily available software components. Which is the BEST method for reducing the risk associated with this practice?

  • A. Ensure developers are using approved software development frameworks.
  • B. Obtain components from official sources over secured link.
  • C. Ensure encryption of all sensitive data in a manner that protects and defends against threats.
  • D. Implement a process to verify the effectiveness of the software components and settings.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Rollingalx
Highly Voted 1 year, 9 months ago
I go with B
upvoted 7 times
jackdryan
1 year, 6 months ago
B is correct
upvoted 1 times
...
...
1460168
Most Recent 3 months, 2 weeks ago
Selected Answer: D
ChatGPT4.0 says: Conclusion While B (obtaining components from official sources over secured link) is a crucial step in ensuring the integrity and authenticity of the components, it does not fully address the broader risks associated with the use of third-party components. These components might still have inherent vulnerabilities or may not perform as expected. Therefore, D (implementing a process to verify the effectiveness of the software components and settings) remains the BEST method for comprehensively reducing the risk. This approach ensures that all components are thoroughly vetted for security, reliability, and compatibility, providing a higher level of assurance that the software will function as intended without introducing new vulnerabilities. Thus, I stand by the conclusion that D is the best overall method for reducing the risk associated with using readily available software components, even though B is also an important part of a robust security strategy.
upvoted 1 times
...
murphseal
4 months, 1 week ago
Selected Answer: D
While B ensures that components are acquired safely and likely from reputable sources, it does not provide assurance that the components themselves are free from vulnerabilities or fully effective.
upvoted 2 times
...
73f8ac3
6 months, 2 weeks ago
Selected Answer: B
I see people going to D. D is 'nice', but is quite time consuming, so it contradict the purpose of 'meet the project deadline !" B is simple to put in place, and it addresses the main risk which is downloading the packages from an untrusted source
upvoted 1 times
...
gjimenezf
9 months, 3 weeks ago
Selected Answer: B
It asks to reduce risk of utilizing third-party software, B is the best option for that
upvoted 1 times
...
Soleandheel
11 months, 1 week ago
D. Implement a process to verify the effectiveness of the software components and settings. D. is a broader answer which includes B in it. So D. is a better answer choice to me than B.
upvoted 1 times
...
thanhlb
1 year, 1 month ago
Selected Answer: A
using approved software development framework means already tested/reviewed...by manager
upvoted 1 times
...
Mickey321
1 year, 2 months ago
Selected Answer: D
I go with D
upvoted 2 times
...
[Removed]
1 year, 7 months ago
Selected Answer: B
I would suggest B. I think D is too narrow, we don't only want to take into account effectiveness, but mainly security.
upvoted 2 times
...
Delab202
1 year, 7 months ago
Selected Answer: D
A software security assessment involves analyzing the software components for vulnerabilities and other security weaknesses that could be exploited by attackers. The assessment should include a review of the software's code, configuration settings, and dependencies, as well as any known security issues or vulnerabilities. By conducting a software security assessment of the components, the developer can identify any security risks that may exist and take steps to address them before integrating the components into the web application. This can help to reduce the risk of security breaches, data loss, and other security incidents that could result from the use of insecure software components.
upvoted 1 times
...
Goseu
1 year, 7 months ago
Selected Answer: B
I go with B
upvoted 1 times
...
user009
1 year, 8 months ago
Answer: D. Implement a process to verify the effectiveness of the software components and settings. Using readily available software components can be a time-saving practice for developers, but it also introduces certain risks, such as security vulnerabilities, compatibility issues, and license violations. To reduce the risk associated with this practice, it's essential to implement a process to verify the effectiveness of the software components and settings. Therefore, option D is the best method for reducing the risk associated with using readily available software components. This process should include reviewing the software components for known vulnerabilities, compatibility issues, and licensing restrictions. It should also include testing the components in the context of the web application to ensure that they work as expected and do not introduce any new vulnerabilities or issues.
upvoted 4 times
Rollingalx
1 year, 8 months ago
It may be difficult to detect new vulnerabilities that are introduced through the use of untrusted components.
upvoted 1 times
SpaceMonkey1
1 year, 7 months ago
D includes B
upvoted 2 times
Rollingalx
1 year, 7 months ago
Good point. Implementing a process to verify the effectiveness of the software components and settings would typically involve ensuring that the components were obtained from official sources over a secured link (option B). So D seems to be the correct answer.
upvoted 3 times
...
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...