ISC2 CISSP Practice Question

A software development team is building a new module for processing sensitive user data. During a design review, the security architect notes that the proposed architecture uses multiple, overlapping third-party libraries for data validation and encryption. The team argues this provides defense-in-depth, but the architect is concerned about the complexity. Which recommendation BEST aligns the design with the principle of economy of mechanism?

  • Isolate each of the overlapping libraries in its own containerized environment.

  • Ensure all library licenses are vetted and approved by the legal department.

  • Refactor the design to use a single, well-vetted library for each core security function.

  • Add an additional layer of custom encryption on top of the existing libraries.

ISC2 CISSP
Software Development Security
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot