ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Question
During a production hardening review of a web application server, you are told to add a runtime control that will immediately detect any unauthorized change to its executable files and YAML configuration after deployment. Which implementation most directly fulfills this requirement?
Configure role-based access control so only the deployment account can write to application directories.
Digitally sign all executables during the build process and verify signatures only at deployment time.
Schedule full anti-malware scans of the server's file system every night after business hours.
Install a file-integrity monitoring agent that stores cryptographic hashes of critical files and raises real-time alerts whenever a hash no longer matches the baseline.
File Integrity Monitoring (FIM) works by creating a cryptographic baseline (hashes) of selected critical files and then continuously or periodically re-calculating those hashes while the system is running. Any difference between the stored baseline and the current hash indicates a potential unauthorized change; the FIM agent can then send an alert to a SIEM or other monitoring console for incident response. Restricting permissions (RBAC) and code signing are useful preventive measures but do not actively watch files at runtime. Nightly anti-malware scans occur too infrequently to provide immediate detection.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is File Integrity Monitoring (FIM)?
Open an interactive chat with Bash
What is a cryptographic hash and how does it work?
Open an interactive chat with Bash
How does File Integrity Monitoring differ from access control or code signing?
Open an interactive chat with Bash
How does File Integrity Monitoring (FIM) work?
Open an interactive chat with Bash
What is a cryptographic hash and why is it useful for file integrity monitoring?
Open an interactive chat with Bash
Why is real-time detection important for securing applications compared to periodic scans?
Open an interactive chat with Bash
ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Secure Software Implementation
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .