Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 376 discussion

Actual exam question from ISC's CISSP
Question #: 376
Topic #: 1
[All CISSP Questions]

Which of the following should be included in a good defense-in-depth strategy provided by object-oriented programming for software development?

  • A. Polymorphism
  • B. Inheritance
  • C. Polyinstantiation
  • D. Encapsulation
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
TO3
Highly Voted 2 years, 1 month ago
Page 947 if CISSP study guide discusses Encapsulation as a security method for Object oriented programming. Page 981 discusses polyinstantiation for database use.
upvoted 19 times
Humongous1593
2 years ago
Its honestly BS they would even ask a question about something that is basically mentioned in passing. But, its in ISC best interest if people fail. Gotta get them $$$
upvoted 7 times
...
jackdryan
1 year, 6 months ago
D is correct
upvoted 1 times
...
...
pingundas
Highly Voted 2 years ago
From ISC2 self study guide 2022 "One of the key features in object oriented technology useful to security is polyinstantiation. Polyinstantiation may prevent inference possibilities by creating a new version of an object by replacing variables with other values. Essentially, it allows different versions of the same information to exist at different classification levels. Therefore, users at a lower classification level don't know of the existence of a higher classification level."
upvoted 6 times
...
KJ44
Most Recent 2 weeks, 3 days ago
Selected Answer: D
Encapsulation is a fundamental concept in object-oriented programming (OOP) that involves bundling data and methods into a single unit, or class. It's a way to store, hide, and manipulate data while giving the programmer more control over it.
upvoted 1 times
...
hoho2000
8 months, 2 weeks ago
Selected Answer: B
Could answer be B based on below statement from CISSP offical textbook? Inheritance. The concept of a data class makes it possible to define subclasses of data objects that share some or all the main (or super) class characteristics. If security is properly implemented in the high-level class, then subclasses should inherit that security. The same is true of objects derived not from one class but from another object. The keys are to properly implement security in the high-level class objects so that the subclasses can inherit them properly. It is very important to create objects that have good security characteristics because these can be inherited by further objects.
upvoted 1 times
...
GuardianAngel
9 months, 2 weeks ago
polyinstantiation is database related - it's not part of object-oriented programming. I'm a developer with 30 yrs of programming and database development. I agree some of these questions have nothing to do with making you better at security, it's like every other vendor cert test, they ask you things that are text book applicable but not very useful on the job.
upvoted 3 times
...
gjimenezf
9 months, 3 weeks ago
Selected Answer: D
From the Study guide: Encapsulation thus provides for ways to bind sensiliive data with the methods that provide for trustworthy processing of that data. As a result, many OOP architectures inhere ,~ provide greater securi1ty featu res, which can be used by their systems desi:gners and builders to enhance systems and organizat ional! security postures
upvoted 1 times
...
YesPlease
11 months ago
Selected Answer: D
Answer D) Encapsulation Encapsulation term specifically mentioned on the CISSP official study guide on Page 942 for programming. POLYINSTANTIATION is wrong: it mainly refers to Database security POLYMORPHISM (method overloading/overriding) is wrong: it is a programming concept and not really a security method that enhances code reusability and flexibility by enabling objects of different types to be treated in a unified way. https://cissphemant.medium.com/cissp-domain-8-software-development-security-easy-notes-to-pass-cissp-certification-in-2023-24-acca3ef22528#:~:text=POLYINSTANTIATION%20%26%20POLYMORPHISM
upvoted 1 times
...
Soleandheel
11 months, 1 week ago
D. Encapsulation Encapsulation is a fundamental concept in object-oriented programming (OOP) that involves bundling data (attributes) and methods (functions) that operate on that data into a single unit known as an object. It allows you to control access to the internal state of an object, protecting it from unauthorized modifications or direct external access. Encapsulation helps promote data integrity and security by enforcing access controls and ensuring that the object's internal workings remain hidden from external code. It's a key principle for building modular, maintainable, and secure software systems.
upvoted 1 times
...
[Removed]
11 months, 2 weeks ago
Selected Answer: D
It's D. Even when searching for object-oriented programming and the answer word, the only information that comes up related to security is encapsulation.
upvoted 1 times
...
HughJassole
1 year, 5 months ago
More evidence for C: https://www.skillset.com/questions/what-object-oriented-programming-concept-is-when-two-objects-with-same-name-have-different-data-8932#:~:text=Polyinstantiation%20in%20computer%20science%20is,(identifier%2C%20primary%20key).
upvoted 2 times
...
HughJassole
1 year, 5 months ago
C. Polyinstantiation seems the right answer. "Polyinstantiation is a cybersecurity strategy where multiple instances of a shared resource are created to prevent a user without the correct privileges from seeing the more sensitive information." It prevents against an inference attack since different info is displayed based on classification level. https://cyberhoot.com/cybrary/polyinstantiation/#:~:text=Polyinstantiation%20is%20a%20cybersecurity%20strategy,seeing%20the%20more%20sensitive%20information. https://www.enjoyalgorithms.com/blog/encapsulation-in-oops Nothing about security, it's about flexibility in the design
upvoted 3 times
...
ACunningPlan
1 year, 7 months ago
Selected Answer: D
Encapsulation is the only one that is defense-in-depth. Polyinstantiation provides multiple versions but that is not depth, just different instance levels.
upvoted 2 times
...
Rollingalx
1 year, 9 months ago
I go with D Encapsulation is an important security method in object-oriented programming that involves encapsulating data and code into a single entity, and only allowing access to that entity through predefined interfaces. This helps to prevent unauthorized access to the data and code, and it also makes the code easier to maintain and modify.
upvoted 1 times
...
BP_lobster
1 year, 11 months ago
Selected Answer: C
The other options are fundamental characteristics of OOP/best practice that should be applied constantly. Polyinstantiation is the one we add depending on context/need.
upvoted 2 times
...
princeada
2 years ago
Data security is the biggest concert of the 21st century. To provide basic data protection, encapsulation was implemented in object-oriented programming. Encapsulation is closely related to abstraction and data hiding, in one-word encapsulation is a protective shield. It is one of the fundamentals of OOP which hide data and structure of methods inside a class. It prevents unauthorized access to data and how it processing inside a class. https://www.geekboots.com/story/concept-of-encapsulation-in-oops
upvoted 1 times
...
rdy4u
2 years ago
Selected Answer: C
Development phase. This is when we "engineer in security and develop controls". Polyinstantiation is a way to engineer in security.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...