Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 158 discussion

Actual exam question from ISC's CISSP
Question #: 158
Topic #: 1
[All CISSP Questions]

Which of the following is a secure design principle for a new product?

  • A. Restrict the use of modularization.
  • B. Do not rely on previously used code.
  • C. Build in appropriate levels of fault tolerance.
  • D. Utilize obfuscation whenever possible.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
BDSec
Highly Voted 2 years, 2 months ago
C, obfuscation is not a recommended design principle
upvoted 7 times
jackdryan
1 year, 6 months ago
C is correct
upvoted 1 times
...
...
projtfer
Highly Voted 2 years, 1 month ago
Selected Answer: C
Fault tolerance is (C) is correct because it covers the availability aspect. Obfuscation is not a design principle and the rest of them don't make sense!
upvoted 7 times
...
eboehm
Most Recent 7 months, 2 weeks ago
Selected Answer: C
At first I was going with D because I thought fault tolerance was about systems design and adding more complents. However, in software it just means that the application is designed to "fail graciously" . That is the application will continue to work despite an error
upvoted 2 times
...
Moose01
1 year ago
Selected Answer: D
obfuscation ! having built fault tolerance system does not help the weaknesses within the Software code, and obfuscation means to make the SW code hard to understand if compromised, meaning more secure more work for the hackers.
upvoted 1 times
...
74gjd_37
1 year, 2 months ago
Selected Answer: C
The correct answer is C. Build in appropriate levels of fault tolerance. Building in fault tolerance is a secure design principle because it helps ensure that a product can continue to function even if a component fails or is compromised. This is an important aspect of security, as it helps prevent attackers from exploiting vulnerabilities in the product to gain unauthorized access or cause other types of harm. Restricting the use of modularization, not relying on previously used code, and utilizing obfuscation whenever possible can also be important security measures, but they are not necessarily secure design principles in and of themselves.
upvoted 1 times
...
RVoigt
1 year, 9 months ago
Selected Answer: D
CISSP Official Student Guide 6th ed, page 253 - "Secure coding techniques: Use of proper cryptographic algorithms, static and dynamic code analysis and obfuscation techniques in the deployment of code may reduce the risk of some of the common forms of compromise noted above (...vulnerabilities)."
upvoted 1 times
RVoigt
1 year, 9 months ago
I have to change to BDSec's point - CISSP Official Study Guide pg 343 - Fault tolerance is the ability of a system to suffer a fault but continue to operate. Fault tolerance is achieved by adding redundant components such as additional disks within a redundant array of independent disks (RAID) (a.k.a. redundant array of independent disks (RAID)(a.k.a. redundant array of inexpensive disks (RAID)) array, or additional servers within a failover clustered configuration. Fault tolerance is an essential element of security design. It is also considered part of avoiding single points of failure and the implementation of redundancy. For more details on fault tolerance, redundant servers, RAID, and failover solutions, see Chapter 18, "Disaster Recovery Planning."
upvoted 1 times
...
...
Dee83
1 year, 10 months ago
C. Build in appropriate levels of fault tolerance. Fault tolerance refers to the ability of a system to continue functioning properly in the event of the failure of one or more of its components. By building in appropriate levels of fault tolerance, the system can continue to operate even in the event of a failure, reducing the risk of data loss and downtime. This can help to ensure the continuity of operations and the availability of the system, which are important for security and reliability. On the other hand, the other options given may not be considered as secure design principle, as Restricting the use of modularization can make it harder to maintain and update the system, not relying on previously used code can make it harder to ensure compatibility and stability, and Utilizing obfuscation whenever possible can make it harder to debug and troubleshoot the system.
upvoted 3 times
...
Mr_Zaw
1 year, 10 months ago
C. I will go with C. Below is the phrase from Official Study Guide, While security through obscurity is typically not considered a valid security measure, it may still have value in some cases. Hence D is not an answer. Every application need to have exception handling (kind of fault tolerance). Improper handling of errors can introduce a variety of security problems.
upvoted 2 times
...
somkiatr
1 year, 10 months ago
Selected Answer: B
I will choose B. The previous source code would outdated or exposed to vulnerability like zero days. I don't choose D because one of the design principle is "keep it simple and open". I don't choose C because one of the design principle is "Fail securely".
upvoted 2 times
somkiatr
1 year, 10 months ago
Reference : https://cybersophia.net/articles/how-to/10-design-principles-for-secure-system-development/
upvoted 1 times
...
...
Hava_2013
2 years ago
why not B?
upvoted 1 times
oudmaster
1 year, 11 months ago
because it is totally fine to use libraries (reusable code) in software development as long as they are secure.
upvoted 1 times
...
...
Jamati
2 years ago
Selected Answer: D
I think D. Code is often obfuscated to protect intellectual property or trade secrets, and to prevent an attacker from reverse engineering a proprietary software program. Encrypting some or all of a program's code is one obfuscation method. The main advantages of obfuscation are Secrecy, Efficiency (some obfuscation techniques, like unused code removal, have the effect of shrinking the program and making it less resource intensive to run) and Security (obfuscation is a built-in security method, sometimes referred to as application self-protection. It is well-suited for protecting applications that run in an untrusted environment and that contain sensitive information). One of the main disadvantages of obfuscation is it is also by malware writers to evade antivirus programs. https://www.techtarget.com/searchsecurity/definition/obfuscation#:~:text=Obfuscation%20means%20to%20make%20something,code%20is%20one%20obfuscation%20method.
upvoted 1 times
...
JAckThePip
2 years, 1 month ago
On the base of Principle of Avoiding Security by Obscurity the obfuscation can be used
upvoted 1 times
...
stickerbush1970
2 years, 2 months ago
I would go with D on this.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...