ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Question

During a security design review, a developer proposes inventing a proprietary, unpublished encryption algorithm so that only the project team knows how ciphertext is produced, claiming this secrecy will make attacks harder. In line with the Open Design principle, which response best protects the system's security?

  • Accept the proprietary algorithm but wrap it in code obfuscation tools so reverse engineering is extremely difficult.

  • Reject the proposal and adopt a well-known, publicly reviewed cipher such as AES, publishing protocol details while safeguarding only the encryption keys.

  • Approve the proprietary algorithm and conduct a single external penetration test before releasing the product, keeping the design confidential thereafter.

  • Implement a standard algorithm but hide all key-exchange logic through compiled binaries without documenting the protocol externally.

ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Secure Software Concepts
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot