nerdexam
(ISC)2(ISC)2

CISSP · Question #447

CISSP Question #447: Real Exam Question with Answer & Explanation

Sign in or unlock CISSP to reveal the answer and full explanation for question #447. The question stem and answer options stay visible for context.

Submitted by satoshi_tk· Mar 5, 2026Security Architecture and Engineering

Question

In organization discovers that its secure file transfer protocol (SFTP) server has been accessed by an unauthorized person to download an unreleased game. A recent security audit found weaknesses in some of the organization's general information technology (IT) controls, specifically pertaining to software change control and security patch management, but not in other control areas. Which of the following is the MOST probable attack vector used in the security breach?

Options

  • ABuffer overflow
  • BWeak password able to lack of complexity rules
  • CDistributed Denial of Service (DDoS)
  • DCross-Site Scripting (XSS)

Unlock CISSP to see the answer

You've previewed enough free CISSP questions. Unlock CISSP for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#attack vectors#buffer overflow#patch management#vulnerability exploitation
Full CISSP PracticeBrowse All CISSP Questions