<< Prev Question Next Question >>

Question 17/27

A developer is using shared functions for software code in order to reduce complexity, knowing that greater complexity and volume of code are harder to defend against attacks.
Which security principle is demonstrated in this scenario?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (27q)
Question 1: An organization has experienced injection attacks in the pas...
Question 2: What is the layer of the OSI model that creates, maintains, ...
Question 3: With expanded business opportunities and markets, a company ...
Question 4: An organization's network has been the target of several cyb...
Question 5: An attacker uses login data from a data breach to attempt to...
Question 6: An attacker uses a list of commonly used access credentials ...
Question 7: An organization is the victim of an attack in which an attac...
Question 8: A company is developing a disaster recovery plan for its int...
Question 9: A host is already set up with an operating system. An admini...
Question 10: A company's internal messaging system is being redesigned. T...
Question 11: An organization does not have controls in place to limit emp...
Question 12: A company is developing a data protection methodology in ord...
Question 13: An organization's network has been the target of several cyb...
Question 14: A computer network has software that tracks successful and u...
Question 15: After a series of attacks, an organization needs to bolster ...
Question 16: When setting up a network, a technician needs a router that ...
Question 17: A developer is using shared functions for software code in o...
Question 18: In the process of setting up a Linux-based network system, a...
Question 19: An attacker uses a network device to take over an existing c...
Question 20: Which CIA triad component is a driver for enabling role-base...
Question 21: Which scenario demonstrates a violation of the integrity com...
Question 22: A company is specifically worried about rogue access points....
Question 23: Which layer of the OSI model includes the ICMP?...
Question 24: Which layer of the OSI model includes HTTP?...
Question 25: An attacker uses malicious software to disable network resou...
Question 26: Which statement describes the Integrity tenet of IT security...
Question 27: Which layer of the TCP/IP model includes the Internet Protoc...