ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Question
A family of battery-powered IoT sensors downloads plaintext configuration files over HTTP from a public mirror. Security policy requires each sensor to detect any unauthorized modification of a file before it is applied. Confidentiality is not a concern, and the solution should impose no key-management burden on the devices. Which technique should the software engineer implement to satisfy the policy?
Require mutual TLS between the mirror and every sensor for each download.
Publish a SHA-256 hash for each file and have the sensor recompute and compare the hash before applying the configuration.
Encrypt each configuration file with AES-256-GCM before publishing it to the mirror.
Sign each configuration file with an RSA private key and have the sensor verify the signature before use.
Computing a SHA-256 (or similar) hash of each configuration file on the publishing server and having the sensor recompute and compare that hash before use provides a tamper-evident check without needing any cryptographic keys to be stored or managed on the devices. Encryption with AES-256-GCM or enforcing mutual TLS would add confidentiality but still require symmetric or asymmetric keys to be provisioned and maintained. A digital signature also detects tampering and adds authenticity, but it introduces the very key-management overhead the scenario seeks to avoid. Therefore, publishing and verifying a cryptographic hash is the most appropriate control for integrity alone with minimal operational complexity.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a cryptographic hash function like SHA-256?
Open an interactive chat with Bash
Why is a SHA-256 hash better suited for this scenario than encryption?
Open an interactive chat with Bash
How does SHA-256 ensure integrity without authenticity?
Open an interactive chat with Bash
ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Secure Software Concepts
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .