List of questions
Related questions
Question 1141 - CISSP discussion
An attacker has intruded into the source code management system and is able to download but not modify the code. Which of the following aspects of the code theft has the HIGHEST security impact?
A.
The attacker could publicly share confidential comments found in the stolen code.
B.
Competitors might be able to steal the organization's ideas by looking at the stolen code.
C.
A competitor could run their own copy of the organization's website using the stolen code.
D.
Administrative credentials or keys hard-coded within the stolen code could be used to access sensitive data.
Your answer:
0 comments
Sorted by
Leave a comment first