exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 87 discussion

Actual exam question from ISC's CISSP
Question #: 87
Topic #: 1
[All CISSP Questions]

Which of the following BEST describes the purpose of software forensics?

  • A. To analyze possible malicious intent of malware
  • B. To perform cyclic redundancy check (CRC) verification and detect changed applications
  • C. To determine the author and behavior of the code
  • D. To review program code to determine the existence of backdoors
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
dev46
Highly Voted 1 year, 6 months ago
Software forensics is the science of analyzing software source code or binary code to determine whether intellectual property infringement or theft occurred. It is the centerpiece of lawsuits, trials, and settlements when companies are in dispute over issues involving software patents, copyrights, and trade secrets. Software forensics tools can compare code to determine correlation, a measure that can be used to guide a software forensics expert. Source -Wikipedia
upvoted 8 times
jackdryan
10 months, 1 week ago
C is correct
upvoted 1 times
...
...
georgegeorge125487
Most Recent 7 months ago
Software forensics: the importance is attribution : review the code to identify the developer when malicious insiders are suspected.
upvoted 1 times
...
Bach1968
8 months, 2 weeks ago
Selected Answer: C
The purpose of software forensics (also known as software reverse engineering) is best described as: C. To determine the author and behavior of the code. Software forensics involves the analysis of software code to understand its structure, functionality, and behavior. It aims to identify the origin of the code, determine its purpose, and gain insights into its functionality. By examining the code, forensic analysts can gather information about the software's behavior, identify potential vulnerabilities or malicious intent, and assess its overall security. While software forensics may involve analyzing possible malicious intent of malware (option A), performing cyclic redundancy check (CRC) verification to detect changed applications (option B), and reviewing program code to determine the existence of backdoors (option D), its primary purpose is to understand and investigate the authorship and behavior of the code. the story never end, too long and too complex
upvoted 3 times
...
assmaalick
9 months, 1 week ago
D Forensic analysts may also be called on to conduct forensic reviews of applications or the activity that takes place within a running application. In some cases, when malicious insiders are suspected, the forensic analyst may be asked to conduct a review of software code, looking for back doors, logic bombs, or other security vulnerabilities. In other cases, forensic analysis may be asked to review and interpret the log files from application or database servers, seeking other signs of malicious activity, such as SQL injection attacks, privilege escalations, or other application attacks
upvoted 1 times
...
somkiatr
1 year, 2 months ago
Selected Answer: C
I choose C. What Is Software Forensics? Software forensics is a branch of science that investigates computer software text codes and binary codes in cases involving patent infringement or theft. Software forensics can be used to support evidence for legal disputes over intellectual property, patents, and trademarks.
upvoted 1 times
...
rajkamal0
1 year, 2 months ago
Selected Answer: C
C is the correct answer. Reading the question clearly suggests the forensic analysis of attacker code
upvoted 1 times
...
Firedragon
1 year, 4 months ago
Selected Answer: C
C. https://en.wikipedia.org/wiki/Software_forensics
upvoted 1 times
...
FredDurst
1 year, 4 months ago
Selected Answer: C
Software Science aimed at authorship analysis of computer source code for legal purposes. It involves the areas of author identification, discrimination, and characterization. https://resources.infosecinstitute.com/topic/computer-forensics-overview-software-forensics/
upvoted 2 times
...
Bhuraw
1 year, 4 months ago
Selected Answer: A
A seems right
upvoted 3 times
...
Outdoors
1 year, 4 months ago
Selected Answer: D
D is correct
upvoted 1 times
...
franbarpro
1 year, 5 months ago
Selected Answer: C
Yep "C" - Let's make sure they didn't copy our code
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago