The correct answer is Inclusion of debug code or credentials in production releases. Proper release engineering practices directly address the risk of including debug code, test credentials, or other non-production elements in production releases. This includes implementing proper build configurations, environment-specific settings, and pre-release verification processes. These practices ensure that what gets deployed to production contains only what is intended for production use, without development artifacts that could create security vulnerabilities.
Cross-site scripting vulnerabilities is incorrect because cross-site scripting vulnerabilities are primarily addressed through secure coding practices, input validation, and output encoding rather than release engineering. While proper QA during release might catch XSS issues, they're fundamentally a code-level vulnerability.
Memory leaks is incorrect because memory leaks are primarily addressed through proper coding practices and code quality techniques rather than release engineering. Memory management is handled at development time and is not typically affected by the release process.
Race conditions is incorrect because race conditions are primarily addressed through proper synchronization mechanisms and concurrency design patterns in the code rather than release engineering practices. These are design and implementation issues rather than release process issues.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are proper release engineering practices?
Open an interactive chat with Bash
Why is including debug code a security risk?
Open an interactive chat with Bash
What steps can be taken to ensure a secure release process?
Open an interactive chat with Bash
ISC2 CISSP
Software Development Security
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access