<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Answer Explanation for Assessment Test Question 40 Sybex Official Study Guide. in CISSP Study Group</title>
    <link>https://community.isc2.org/t5/CISSP-Study-Group/Answer-Explanation-for-Assessment-Test-Question-40-Sybex/m-p/48511#M139</link>
    <description>&lt;P&gt;Hi Need some help with the below question.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Most software vulnerabilities exist because of a lack of secure or defensive coding practises used by developers. Which of the following is&lt;U&gt;&lt;EM&gt;&lt;STRONG&gt; not&lt;/STRONG&gt;&lt;/EM&gt;&lt;/U&gt; considered a secure coding technique. (Choose all that apply)&lt;/P&gt;&lt;P&gt;A. Using immutable systems&lt;/P&gt;&lt;P&gt;B. Using stored procedures&lt;/P&gt;&lt;P&gt;C. Using code signing&lt;/P&gt;&lt;P&gt;D. Using Server side validation&lt;/P&gt;&lt;P&gt;E Optimizing file sizes&lt;/P&gt;&lt;P&gt;F Using third-party software libraries.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 04 Dec 2021 00:39:50 GMT</pubDate>
    <dc:creator>gopalk</dc:creator>
    <dc:date>2021-12-04T00:39:50Z</dc:date>
    <item>
      <title>Answer Explanation for Assessment Test Question 40 Sybex Official Study Guide.</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Answer-Explanation-for-Assessment-Test-Question-40-Sybex/m-p/48511#M139</link>
      <description>&lt;P&gt;Hi Need some help with the below question.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Most software vulnerabilities exist because of a lack of secure or defensive coding practises used by developers. Which of the following is&lt;U&gt;&lt;EM&gt;&lt;STRONG&gt; not&lt;/STRONG&gt;&lt;/EM&gt;&lt;/U&gt; considered a secure coding technique. (Choose all that apply)&lt;/P&gt;&lt;P&gt;A. Using immutable systems&lt;/P&gt;&lt;P&gt;B. Using stored procedures&lt;/P&gt;&lt;P&gt;C. Using code signing&lt;/P&gt;&lt;P&gt;D. Using Server side validation&lt;/P&gt;&lt;P&gt;E Optimizing file sizes&lt;/P&gt;&lt;P&gt;F Using third-party software libraries.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 04 Dec 2021 00:39:50 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Answer-Explanation-for-Assessment-Test-Question-40-Sybex/m-p/48511#M139</guid>
      <dc:creator>gopalk</dc:creator>
      <dc:date>2021-12-04T00:39:50Z</dc:date>
    </item>
    <item>
      <title>Re: Answer Explanation for Assessment Test Question 40 Sybex Official Study Guide.</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Answer-Explanation-for-Assessment-Test-Question-40-Sybex/m-p/48512#M140</link>
      <description>&lt;P&gt;Answer Key reveals ABCD. But I think the "NOT" was not considered.&lt;/P&gt;</description>
      <pubDate>Sat, 04 Dec 2021 00:42:08 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Answer-Explanation-for-Assessment-Test-Question-40-Sybex/m-p/48512#M140</guid>
      <dc:creator>gopalk</dc:creator>
      <dc:date>2021-12-04T00:42:08Z</dc:date>
    </item>
    <item>
      <title>Re: Answer Explanation for Assessment Test Question 40 Sybex Official Study Guide.</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Answer-Explanation-for-Assessment-Test-Question-40-Sybex/m-p/49717#M172</link>
      <description>I think the answer should be a, e and f?</description>
      <pubDate>Tue, 15 Feb 2022 16:14:55 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Answer-Explanation-for-Assessment-Test-Question-40-Sybex/m-p/49717#M172</guid>
      <dc:creator>radhika_ajay</dc:creator>
      <dc:date>2022-02-15T16:14:55Z</dc:date>
    </item>
    <item>
      <title>Re: Answer Explanation for Assessment Test Question 40 Sybex Official Study Guide.</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Answer-Explanation-for-Assessment-Test-Question-40-Sybex/m-p/49745#M173</link>
      <description>&lt;P&gt;Not to sound snarky but the answers in the appendix do a fantastic job at explaining the answers.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That said, I found some errors within multiple books and reported them to the publishers.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Good luck!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Feb 2022 14:15:48 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Answer-Explanation-for-Assessment-Test-Question-40-Sybex/m-p/49745#M173</guid>
      <dc:creator>BrianF</dc:creator>
      <dc:date>2022-02-16T14:15:48Z</dc:date>
    </item>
    <item>
      <title>Re: Answer Explanation for Assessment Test Question 40 Sybex Official Study Guide.</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Answer-Explanation-for-Assessment-Test-Question-40-Sybex/m-p/49847#M180</link>
      <description>&lt;P&gt;A&amp;nbsp; &amp;nbsp;using immutable system is not secure coding technique.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Feb 2022 15:19:48 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Answer-Explanation-for-Assessment-Test-Question-40-Sybex/m-p/49847#M180</guid>
      <dc:creator>azekta</dc:creator>
      <dc:date>2022-02-23T15:19:48Z</dc:date>
    </item>
    <item>
      <title>Re: Answer Explanation for Assessment Test Question 40 Sybex Official Study Guide.</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Answer-Explanation-for-Assessment-Test-Question-40-Sybex/m-p/59683#M813</link>
      <description>&lt;P&gt;I messaged ISC2 for the answer and still waiting on a response.&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jun 2023 14:48:05 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Answer-Explanation-for-Assessment-Test-Question-40-Sybex/m-p/59683#M813</guid>
      <dc:creator>dpower</dc:creator>
      <dc:date>2023-06-04T14:48:05Z</dc:date>
    </item>
    <item>
      <title>Re: Answer Explanation for Assessment Test Question 40 Sybex Official Study Guide.</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Answer-Explanation-for-Assessment-Test-Question-40-Sybex/m-p/64081#M986</link>
      <description>&lt;P&gt;Is this it:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.wiley.com/en-us/%28ISC%292+CISSP+Certified+Information+Systems+Security+Professional+Official+Study+Guide%2C+9th+Edition-p-9781119786238#errata-section" target="_blank" rel="noopener"&gt;(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide, 9th Edition | Wiley&lt;/A&gt;&lt;/P&gt;&lt;P&gt;(in case the url is removed: it is from wiley dot com in an errata section of the book --google the name of the book and errata)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;"This should read:&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;40. B, C, D. Programmers need to adopt secure coding practices, which include using stored procedures, code signing, and server-side validation."&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This could still be wrong, and it may fit with the claim they forgot the "not"&lt;/P&gt;</description>
      <pubDate>Wed, 01 Nov 2023 10:09:46 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Answer-Explanation-for-Assessment-Test-Question-40-Sybex/m-p/64081#M986</guid>
      <dc:creator>JohnEricsson</dc:creator>
      <dc:date>2023-11-01T10:09:46Z</dc:date>
    </item>
    <item>
      <title>Re: Answer Explanation for Assessment Test Question 40 Sybex Official Study Guide.</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Answer-Explanation-for-Assessment-Test-Question-40-Sybex/m-p/73972#M1675</link>
      <description>&lt;P&gt;In the context of secure coding techniques, the following options are &lt;STRONG&gt;not&lt;/STRONG&gt; considered secure coding practices:&lt;/P&gt;&lt;P&gt;E. Optimizing file sizes&lt;BR /&gt;F. Using third-party software libraries&lt;/P&gt;&lt;P&gt;While optimizing file sizes can improve performance, it does not directly relate to security practices. Similarly, using third-party software libraries can introduce vulnerabilities if those libraries are not properly vetted or maintained.&lt;/P&gt;&lt;P&gt;The other options—using immutable systems, stored procedures, code signing, and server-side validation—are all considered secure coding practices.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2024 08:28:35 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Answer-Explanation-for-Assessment-Test-Question-40-Sybex/m-p/73972#M1675</guid>
      <dc:creator>Mahender</dc:creator>
      <dc:date>2024-09-20T08:28:35Z</dc:date>
    </item>
  </channel>
</rss>

