Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 149 discussion

Actual exam question from ISC's CISSP
Question #: 149
Topic #: 1
[All CISSP Questions]

Which element of software supply chain management has the GREATEST security risk to organizations?

  • A. Unsupported libraries are often used.
  • B. Applications with multiple contributors are difficult to evaluate.
  • C. Vulnerabilities are difficult to detect.
  • D. New software development skills are hard to acquire.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
dm808
8 months ago
Selected Answer: B
Considering the fairly recent SolarWinds hack.. I would have to go with B
upvoted 1 times
...
Vasyamba1
8 months, 1 week ago
Selected Answer: C
From OSG - When evaluating organizational risk, consider external factors that can affect the organization, especially related to company stability and resource availability. The supply chain can be a threat vector, where materials, software, hardware, or data is being obtained from a supposedly trusted source but the supply chain behind that source could have been compromised and the asset poisoned or modified.
upvoted 1 times
...
Soleandheel
11 months, 3 weeks ago
A. Unsupported libraries refer to software libraries or components that are no longer actively maintained or updated by their developers. These libraries may have become outdated or obsolete, making them vulnerable to security vulnerabilities and issues that could be exploited by attackers. Unsupported libraries are a concern in software development and supply chain security because they pose a risk to the security and stability of the applications and systems that depend on them. Organizations should actively monitor and update their software components, including libraries, to mitigate these risks and ensure the security of their software supply chain.
upvoted 2 times
...
shmoeee
1 year ago
OSG 9th edition. pg 99 , "This could happen if your supplier reuses components (like libraries) developed elsewhere..." Tough one, but I'm going with...A
upvoted 1 times
...
74gjd_37
1 year, 2 months ago
Selected Answer: A
The correct answer is A: "Unsupported libraries are often used". The use of unsupported libraries in software development can pose a significant security risk to organizations. Unsupported libraries may have vulnerabilities that are not patched or addressed by the developer, which can be exploited by attackers. Additionally, unsupported libraries may not receive timely updates or support, which can leave them vulnerable to exploits. It is, therefore, essential for organizations to manage their use of libraries carefully and ensure that they are using supported and up-to-date libraries in their software development processes to minimize security risks.
upvoted 2 times
...
benllp_sst
1 year, 3 months ago
Selected Answer: C
I think Option C is better than option A because software supply chain included a lot of open source software or components and which is difficult to detect vulnerabilities.
upvoted 1 times
...
Bach1968
1 year, 4 months ago
Selected Answer: A
option A (Unsupported libraries are often used) can also pose a significant security risk in software supply chain management. When organizations use unsupported or outdated libraries in their software development process, they may expose themselves to known vulnerabilities that have not been patched or addressed by the library developers. These vulnerabilities can be exploited by attackers to gain unauthorized access, compromise the system, or steal sensitive data. Unsupported libraries may not receive regular security updates, leaving them more susceptible to attacks. Therefore, option A is indeed a valid consideration and can contribute to the security risks associated with software supply chain management.
upvoted 1 times
...
xxxBadManxxx
1 year, 5 months ago
A: In software supply chain management, the element that poses the greatest security risk to organizations is often considered to be the third-party components and dependencies used in software development. Third-party components include libraries, frameworks, modules, or plugins that are integrated into an organization's.
upvoted 1 times
...
nat0220
1 year, 6 months ago
B MULTIPLE VENDORS
upvoted 1 times
...
dmo_d
1 year, 6 months ago
Selected Answer: A
A and B both are reasonable risks. B can cause high risks in many cases. But A cause high risks in every case - unmaintained/unsupported libraries are a huge problem because often there are impossible to replace and there are no fixes even for known vulnerabilities.
upvoted 3 times
...
The1BelowAll
1 year, 7 months ago
Selected Answer: A
Unsupported libraries can contain vulnerabilities
upvoted 2 times
jackdryan
1 year, 6 months ago
B is correct
upvoted 1 times
...
...
RVoigt
1 year, 9 months ago
Selected Answer: B
Official Study Guide pg 35 - "Understand supply chain risk management (SCRM) concepts. SCRM is a means to ensure that all the vendors or links in the supply chain are reliable, trustworthy, reputable organizations that disclose their practices and security requirements to their business partners. SCRM includes evaluating risks associated with hardware, software, and services; performing third-party assessment and monitoring; establishing minimum security requirements; and enforcing service-level requirements."
upvoted 1 times
...
JohnyDal
1 year, 9 months ago
Selected Answer: A
unsupported libraries pose the biggest risk
upvoted 3 times
...
trojix
1 year, 10 months ago
Selected Answer: B
Applications with multiple contributors are difficult to evaluate. Software supply chain management refers to the process of controlling the flow of software components and dependencies throughout the software development lifecycle.
upvoted 1 times
...
oban
1 year, 10 months ago
Selected Answer: B
B. Applications with multiple contributors are difficult to evaluate. Applications with multiple contributors, such as open-source software, are popular among organizations because they can be a cost-effective way to acquire software capabilities. However, these applications also present a significant security risk to organizations. Due to their open-source nature, it's hard to ensure that all contributors have the necessary security skills and that the application is free of vulnerabilities. Additionally, it can be difficult for an organization to understand the provenance of the code and track updates, which could create the risk of introducing new vulnerabilities or malware into the organization. - openai
upvoted 2 times
...
Jamati
2 years ago
Seems like all these questions here on Exam Topics are all about Software and software testing. Nothing from Domains 1 - 5.
upvoted 2 times
...
franbarpro
2 years, 1 month ago
Selected Answer: A
Def - "A"
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...