ISC2 CISSP Practice Question

An organization is adopting multiple open-source and proprietary libraries as part of a new web application. The security manager must evaluate the risk presented by these third-party components before deploying to production. Which approach provides the most direct, evidence-based insight into actual vulnerabilities in the specific versions that will be included in the release?

  • Conducting a software composition analysis and vulnerability scan

  • Using only open-source components with publicly accessible code repositories

  • Reviewing the vendor's claims about security features during contract negotiations

  • Requesting the vendor's security certification documentation

ISC2 CISSP
Software Development Security
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot