ISC2 CISSP Practice Question

Your organization is selecting a commercial off-the-shelf (COTS) workflow application that will process sensitive customer data and be deployed for at least five years. The security team has compiled data on each vendor. To minimize the organization's long-term exposure to newly discovered vulnerabilities, which of the following characteristics should weigh MOST heavily in the procurement decision?

  • The software's compliance with secure development lifecycle methodologies

  • The vendor's patch management and vulnerability disclosure process

  • The software's third-party dependency management and supply-chain controls

  • The implementation of cryptographic standards and key-management protocols

ISC2 CISSP
Software Development Security
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot