ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Question

During a production hardening review of a web application server, you are told to add a runtime control that will immediately detect any unauthorized change to its executable files and YAML configuration after deployment. Which implementation most directly fulfills this requirement?

  • Install a file-integrity monitoring agent that stores cryptographic hashes of critical files and raises real-time alerts whenever a hash no longer matches the baseline.

  • Configure role-based access control so only the deployment account can write to application directories.

  • Digitally sign all executables during the build process and verify signatures only at deployment time.

  • Schedule full anti-malware scans of the server's file system every night after business hours.

ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Secure Software Implementation
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot