ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Question

During a design review, your team proposes executing untrusted third-party plug-ins inside lightweight Docker containers that run under separate Linux namespaces and cgroups, while the main application continues to run on the host. What is the primary security advantage of this isolation technique if a plug-in is later found to be malicious?

  • It automatically encrypts all data transmitted from the container, preventing data disclosure on the network.

  • It restricts the compromised code to a confined namespace and resource set, limiting access to the host and other processes.

  • It eliminates the need for memory-protection features like ASLR in the plug-in code.

  • It guarantees that the plug-in cannot consume host CPU or memory resources, avoiding any performance impact.

ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Secure Software Implementation
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot