(ISC)2(ISC)2
CISSP · Question #1054
CISSP Question #1054: Real Exam Question with Answer & Explanation
Sign in or unlock CISSP to reveal the answer and full explanation for question #1054. The question stem and answer options stay visible for context.
Submitted by andreas_gr· Mar 5, 2026Software Development Security
Question
An attacker has intruded into the source code management system and is able to download but not modify the code. Which of the following aspects of the code theft has the HIGHEST security impact?
Options
- AThe attacker could publicly share confidential comments found in the stolen code.
- BCompetitors might be able to steal the organization's ideas by looking at the stolen code.
- CA competitor could run their own copy of the organization's website using the stolen code.
- DAdministrative credentials or keys hard-coded within the stolen code could be used to access
Unlock CISSP to see the answer
You've previewed enough free CISSP questions. Unlock CISSP for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.
Topics
#source code security#data breach#hard-coded credentials#supply chain attacks