ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Question
During a design review, your team proposes executing untrusted third-party plug-ins inside lightweight Docker containers that run under separate Linux namespaces and cgroups, while the main application continues to run on the host. What is the primary security advantage of this isolation technique if a plug-in is later found to be malicious?
It automatically encrypts all data transmitted from the container, preventing data disclosure on the network.
It restricts the compromised code to a confined namespace and resource set, limiting access to the host and other processes.
It eliminates the need for memory-protection features like ASLR in the plug-in code.
It guarantees that the plug-in cannot consume host CPU or memory resources, avoiding any performance impact.
Running untrusted code inside its own container confines that code to an isolated process, filesystem, network stack, and set of system resources defined by the container's namespaces and cgroups. If the plug-in is exploited, the attacker's ability to access host resources or other application processes is greatly limited, reducing lateral movement and overall breach impact. Containers do not automatically encrypt outbound data, remove the need for memory-safety features, or prevent all performance effects, so the other options overstate capabilities that container isolation does not provide.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are Linux namespaces and cgroups?
Open an interactive chat with Bash
How do Docker containers enhance application security?
Open an interactive chat with Bash
Why is isolation important when running untrusted code?
Open an interactive chat with Bash
What are namespaces and cgroups in Linux?
Open an interactive chat with Bash
How does Docker ensure isolation using Linux namespaces?
Open an interactive chat with Bash
What happens if a container is compromised?
Open an interactive chat with Bash
ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Secure Software Implementation
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .