ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Question

After isolating a compromised application server, the response team removes the attacker's web shell and applies the vendor security patch that corrects the exploited flaw. Before placing the host back into production, which additional remediation activity is most important to ensure complete eradication of the incident?

  • Reimage the server from a trusted, verified backup and validate its integrity before reconnecting it to the network.

  • Enable verbose logging and keep the current image to monitor for any remaining attacker activity.

  • Turn off network intrusion detection sensors to avoid interference with the restored production workload.

  • Notify affected customers and regulators of the breach before performing any further technical actions.

ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Secure Software Deployment, Operations, Maintenance
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot