nerdexam
(ISC)2(ISC)2

CISSP · Question #1054

CISSP Question #1054: Real Exam Question with Answer & Explanation

Sign in or unlock CISSP to reveal the answer and full explanation for question #1054. The question stem and answer options stay visible for context.

Submitted by andreas_gr· Mar 5, 2026Software Development Security

Question

An attacker has intruded into the source code management system and is able to download but not modify the code. Which of the following aspects of the code theft has the HIGHEST security impact?

Options

  • AThe attacker could publicly share confidential comments found in the stolen code.
  • BCompetitors might be able to steal the organization's ideas by looking at the stolen code.
  • CA competitor could run their own copy of the organization's website using the stolen code.
  • DAdministrative credentials or keys hard-coded within the stolen code could be used to access

Unlock CISSP to see the answer

You've previewed enough free CISSP questions. Unlock CISSP for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#source code security#data breach#hard-coded credentials#supply chain attacks
Full CISSP PracticeBrowse All CISSP Questions