cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
gopalk
Reader I

Answer Explanation for Assessment Test Question 40 Sybex Official Study Guide.

Hi Need some help with the below question.

 

Most software vulnerabilities exist because of a lack of secure or defensive coding practises used by developers. Which of the following is not considered a secure coding technique. (Choose all that apply)

A. Using immutable systems

B. Using stored procedures

C. Using code signing

D. Using Server side validation

E Optimizing file sizes

F Using third-party software libraries.

 

5 Replies
gopalk
Reader I

Answer Key reveals ABCD. But I think the "NOT" was not considered.

radhika_ajay
Viewer

I think the answer should be a, e and f?
BrianF
Newcomer III

Not to sound snarky but the answers in the appendix do a fantastic job at explaining the answers. 

 

That said, I found some errors within multiple books and reported them to the publishers. 

 

Good luck!

 

 

azekta
Viewer II

A   using immutable system is not secure coding technique.

dpower
Viewer II

I messaged ISC2 for the answer and still waiting on a response.