Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 89 discussion

Actual exam question from ISC's CISSP
Question #: 89
Topic #: 1
[All CISSP Questions]

What is the BEST method to use for assessing the security impact of acquired software?

  • A. Threat modeling
  • B. Common vulnerability review
  • C. Software security compliance validation
  • D. Vendor assessment
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Firedragon
Highly Voted 2 years ago
Selected Answer: A
A. Official study guide, page26 Threat modeling is the security process where potential threats are identified, categorized, and analyzed. Threat modeling can be performed as a proactive measure during design and development or as a reactive measure once a product has been deployed. In either case, the process identifies the potential harm, the probability of occurrence, the priority of concern, and the means to eradicate or reduce the threat.
upvoted 8 times
jackdryan
1 year, 6 months ago
A is correct
upvoted 1 times
...
...
nuggetbutts
Most Recent 2 weeks, 2 days ago
Selected Answer: D
Threat modeling is not the most applicable to the question which is specific to "aquired software". The only options are C and D - and D encompasses C making D the broader "management level" answer. 3rd party vendor assessments are used to validate security and can be distributed to potential customers as proof of their security compliance.
upvoted 1 times
...
maawar83
11 months ago
Answer is C! Elimination Rule: - A-Threat Modeling is a process not a method to use for assessing security impact - B- known vulnerabilities is part of the threat model and security assessment so It is either C or D.. the best will be C as Ensure that the acquired software complies with relevant security standards and regulations. This may include industry-specific standards or frameworks, as well as general data protection regulations.
upvoted 3 times
...
Bach1968
1 year, 4 months ago
Selected Answer: A
The BEST method to use for assessing the security impact of acquired software is: A. Threat modeling. Threat modeling is a proactive approach to identify potential security threats and vulnerabilities in software systems. It involves analyzing the software's architecture, components, and interactions to determine possible attack vectors and prioritize security controls accordingly. By conducting a threat modeling exercise for acquired software, organizations can gain insights into potential security risks and make informed decisions on implementing appropriate security measures. It helps in understanding the software's security posture and guides the development of effective mitigation strategies.
upvoted 1 times
...
Jamati
2 years ago
Selected Answer: A
Answer is A. Once you've acquired the software you can implement a threat model such as STRIDE. However before purchasing the system you have to ensure it has been subjected to formal evaluation processes in advance and has received some kind of security rating. Often trusted third parties are used to perform security evaluations; one such example being the Common Criteria. CISSP official Study Guide Volume 9 page 337
upvoted 2 times
...
Mgz156
2 years, 2 months ago
Selected Answer: A
Answer is A. Security impact of software after being "Acquired " . Threat Modelling is right
upvoted 3 times
...
krassko
2 years, 2 months ago
Selected Answer: A
B is included in A
upvoted 3 times
...
ItsBananass
2 years, 2 months ago
I'm going with B, vulnerability assessment should give a vulnerability score which could give you a vulnerability impact assessment score and impact severity. I think you would have to know what the vulnerability is before you can asses the true treat. You can not have a threat w/o a vulnerability.
upvoted 2 times
dev46
2 years, 2 months ago
A seems right to me as we have to included more than vulnerability score to understand security impact of software/ application. Example, PASTA, a threat modeling method has 7 stage. One of the stage includes vulnerability weakness and analysis. So, option A includes B .
upvoted 3 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...