Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 297 discussion

Actual exam question from ISC's CISSP
Question #: 297
Topic #: 1
[All CISSP Questions]

What is the overall goal of software security testing?

  • A. Identifying the key security features of the software
  • B. Ensuring all software functions perform as specified
  • C. Reducing vulnerabilities within a software system
  • D. Making software development more agile
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Nickolos
Highly Voted 2 years, 1 month ago
Selected Answer: C
First hit on google: Software Security Testing Provides Critical Protection By testing for flaws in software, security testing solutions seek to remove vulnerabilities before software is purchased or deployed and before the flaws can be exploited.
upvoted 7 times
jackdryan
1 year, 6 months ago
C is correct
upvoted 1 times
...
...
Yanjun
Highly Voted 2 years, 2 months ago
It should be C
upvoted 6 times
...
darkvicinity87
Most Recent 6 months ago
Correct answer is C
upvoted 1 times
...
629f731
10 months, 2 weeks ago
Selected Answer: C
Reducing vulnerabilities within a software system (Option C): The primary objective of software security testing is to identify and mitigate vulnerabilities and weaknesses in the software's design, implementation, and configuration. This helps enhance the security posture of the software and reduces the risk of exploitation by malicious actors.
upvoted 1 times
...
isaac592
1 year, 1 month ago
Selected Answer: C
Assessing the effectiveness of software security includes testing where special care must be given to the discovery of software vulnerabilities that could lead to data or system compromise. - 11th hour B. Ensuring all software functions performed as specified = Acceptance Testing
upvoted 1 times
...
Delab202
1 year, 11 months ago
Selected Answer: C
Assessing software security impact Many applications simply aren't designed with security as a primary consideration: developers work around the clock to make sure everything works, and only then do they think about how to keep attackers out. In practice, every application will have bugs and oversights that leave openings for attack, but most exploits are prevented or significantly reduced when developers make security more than an afterthought.
upvoted 1 times
...
oudmaster
1 year, 11 months ago
even if software functions perform as specified, the software could still have vulnerabilities subject to exploits. Then what is the use of software security testing?
upvoted 2 times
...
sec_007
2 years ago
Selected Answer: C
Uncovering vulnerabilities in software. https://www.geeksforgeeks.org/software-testing-security-testing
upvoted 1 times
...
franbarpro
2 years, 1 month ago
They are talking about software SECURITY testing.... they are not testing for the way the sofware function. So, I agree w/ Nickolos - "C"
upvoted 2 times
...
BDSec
2 years, 2 months ago
Selected Answer: B
It’s eliminating vuln not reducing. B
upvoted 2 times
Nickolos
2 years, 1 month ago
B is performed by quality assurance. Security testing does not concern with whether an application works as intended or not. E. G if an application stops responding after you click "tools" option in the interface of the app, it has nothing to do with ST
upvoted 1 times
...
...
CuteRabbit168
2 years, 2 months ago
Selected Answer: C
Software security testing (SST) is the process of identifying and eliminating vulnerabilities in software. https://www.euro-testing.com/blog/what-is-software-security-testing/
upvoted 5 times
...
Cww1
2 years, 2 months ago
B includes C, correct
upvoted 3 times
Yadster
2 years, 1 month ago
B does not include C. Hence CISSP is about security, if this was focus on Software development than the PMP certification with the answer B would be correct. However this is about applying security controls and also in development life cycle how to implement security within the development phases. C is correct.
upvoted 5 times
...
...
matt1976
2 years, 2 months ago
B. Answer provided is correct. A quick google will verify it
upvoted 2 times
Nickolos
2 years, 1 month ago
If you're using Google to access yandex and then search for the answer, then yes. Otherwise B is wrong.
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...