ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Question

A utility company is deploying a wireless sensor network to measure pressure along a remote pipeline. Engineers warn that some sensor nodes could be physically captured by intruders, exposing any secret material stored on the device. Which architectural decision most directly limits the effect of such a node-capture event on the integrity of data sent by the remaining sensors?

  • Embed the encryption key directly in the firmware image so it never appears in memory after boot time.

  • Establish a distinct symmetric key between each sensor and the base station and reject traffic not authenticated with the correct per-node key.

  • Have every sensor authenticate and encrypt its traffic with a single pre-shared group key to minimize processing overhead.

  • Rely on link-layer cyclic redundancy checks (CRCs) to detect any alteration of packets in transit across the mesh.

ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Secure Software Architecture and Design
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot