ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Question

During a peer review you notice that a Java properties file committed to the project's source-code repository contains the production database user name and password in clear text. To align with secure configuration management practices for credential handling, which action should the development team take?

  • Remove the credentials from the repository and load them at runtime from a controlled secrets vault or platform secret store that is integrated with the build and deployment pipeline.

  • Keep the credentials in the same file but replace them with base64-encoded strings to avoid casual inspection.

  • Apply a custom reversible obfuscation algorithm to the credentials before compilation so they are unreadable in the source tree.

  • Move the credentials into code comments and configure the build system to strip comments in release builds.

ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Secure Software Implementation
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot