ExamGecko
Home Home / ISC / CISSP
Question list
Search
Search

Question 1141 - CISSP discussion

Report
Export

An attacker has intruded into the source code management system and is able to download but not modify the code. Which of the following aspects of the code theft has the HIGHEST security impact?

A.
The attacker could publicly share confidential comments found in the stolen code.
Answers
A.
The attacker could publicly share confidential comments found in the stolen code.
B.
Competitors might be able to steal the organization's ideas by looking at the stolen code.
Answers
B.
Competitors might be able to steal the organization's ideas by looking at the stolen code.
C.
A competitor could run their own copy of the organization's website using the stolen code.
Answers
C.
A competitor could run their own copy of the organization's website using the stolen code.
D.
Administrative credentials or keys hard-coded within the stolen code could be used to access sensitive data.
Answers
D.
Administrative credentials or keys hard-coded within the stolen code could be used to access sensitive data.
Suggested answer: A
asked 18/09/2024
Oscar Luis Garza Ruiz
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first