exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 89 discussion

Actual exam question from ISC's CISSP
Question #: 89
Topic #: 1
[All CISSP Questions]

What is the BEST method to use for assessing the security impact of acquired software?

  • A. Threat modeling
  • B. Common vulnerability review
  • C. Software security compliance validation
  • D. Vendor assessment
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Firedragon
Highly Voted 2 years, 5 months ago
Selected Answer: A
A. Official study guide, page26 Threat modeling is the security process where potential threats are identified, categorized, and analyzed. Threat modeling can be performed as a proactive measure during design and development or as a reactive measure once a product has been deployed. In either case, the process identifies the potential harm, the probability of occurrence, the priority of concern, and the means to eradicate or reduce the threat.
upvoted 9 times
jackdryan
1 year, 11 months ago
A is correct
upvoted 1 times
...
...
RRabbit_111
Most Recent 4 months, 3 weeks ago
Selected Answer: D
While threat modeling is undoubtedly valuable, vendor assessment aligns more closely with the question's focus on acquired software: Vendor assessment evaluates the entire security lifecycle of the software, not just static or identified threats. It includes considerations like: Patch management. Secure software development practices. Ongoing support and vulnerability disclosure mechanisms. The question's emphasis on "security impact" implies a need for broader risk management, which vendor assessments address by evaluating the vendor's ability to mitigate risks holistically, not just identifying specific threats.
upvoted 1 times
...
KennethLZK
4 months, 4 weeks ago
Selected Answer: D
Both Threat modeling & Vendor assessment are important, but for assessing the security impact of acquired software, vendor assessment provides a broader evaluation of the vendor's security practices, which is crucial for ensuring the software's overall security.
upvoted 1 times
...
nuggetbutts
5 months, 2 weeks ago
Selected Answer: D
Threat modeling is not the most applicable to the question which is specific to "aquired software". The only options are C and D - and D encompasses C making D the broader "management level" answer. 3rd party vendor assessments are used to validate security and can be distributed to potential customers as proof of their security compliance.
upvoted 1 times
...
maawar83
1 year, 3 months ago
Answer is C! Elimination Rule: - A-Threat Modeling is a process not a method to use for assessing security impact - B- known vulnerabilities is part of the threat model and security assessment so It is either C or D.. the best will be C as Ensure that the acquired software complies with relevant security standards and regulations. This may include industry-specific standards or frameworks, as well as general data protection regulations.
upvoted 3 times
...
Bach1968
1 year, 9 months ago
Selected Answer: A
The BEST method to use for assessing the security impact of acquired software is: A. Threat modeling. Threat modeling is a proactive approach to identify potential security threats and vulnerabilities in software systems. It involves analyzing the software's architecture, components, and interactions to determine possible attack vectors and prioritize security controls accordingly. By conducting a threat modeling exercise for acquired software, organizations can gain insights into potential security risks and make informed decisions on implementing appropriate security measures. It helps in understanding the software's security posture and guides the development of effective mitigation strategies.
upvoted 1 times
...
Jamati
2 years, 5 months ago
Selected Answer: A
Answer is A. Once you've acquired the software you can implement a threat model such as STRIDE. However before purchasing the system you have to ensure it has been subjected to formal evaluation processes in advance and has received some kind of security rating. Often trusted third parties are used to perform security evaluations; one such example being the Common Criteria. CISSP official Study Guide Volume 9 page 337
upvoted 2 times
...
Mgz156
2 years, 7 months ago
Selected Answer: A
Answer is A. Security impact of software after being "Acquired " . Threat Modelling is right
upvoted 3 times
...
krassko
2 years, 7 months ago
Selected Answer: A
B is included in A
upvoted 3 times
...
ItsBananass
2 years, 7 months ago
I'm going with B, vulnerability assessment should give a vulnerability score which could give you a vulnerability impact assessment score and impact severity. I think you would have to know what the vulnerability is before you can asses the true treat. You can not have a threat w/o a vulnerability.
upvoted 2 times
dev46
2 years, 7 months ago
A seems right to me as we have to included more than vulnerability score to understand security impact of software/ application. Example, PASTA, a threat modeling method has 7 stage. One of the stage includes vulnerability weakness and analysis. So, option A includes B .
upvoted 4 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago