ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Question

A development team has generated a comprehensive software bill of materials (SBOM) for its web application and now needs to ensure that any newly disclosed Common Vulnerabilities and Exposures (CVEs) affecting third-party components are detected and remediated as quickly as possible. Which approach BEST meets this continuous monitoring requirement?

  • Schedule quarterly static application security tests (SAST) focusing on the project's proprietary source code.

  • Enforce TLS for all connections to the internal artifact repository hosting third-party binaries.

  • Instruct developers to review each component vendor's website for advisories at the start of every sprint.

  • Integrate an automated software composition analysis tool that continuously cross-references the SBOM with vulnerability intelligence feeds (e.g., NVD) and alerts on affected component versions.

ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Secure Software Supply Chain
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot