ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Question
During an architecture review of a multi-tenant IaaS platform running on commodity x86-64 servers, you are asked to recommend a control that will most effectively reduce the risk that Spectre/Meltdown-style speculative execution attacks could allow one tenant to read privileged or cross-VM memory pages. Which host-level requirement should you specify?
Compile all guest workloads with retpoline to eliminate indirect branch speculation.
Enable simultaneous multithreading (hyper-threading) and pin each virtual CPU to a dedicated hardware core.
Strengthen address space layout randomization (ASLR) and stack canaries in all guest images.
Require Kernel Page-Table Isolation (KPTI) to separate user and kernel page tables on both host and guest operating systems.
Kernel Page-Table Isolation (KPTI) forces the processor to keep separate page tables for user-mode and kernel-mode addresses. Because speculative execution can no longer access kernel mappings that have been removed from user space, attacks like Meltdown-and many cross-VM data-exfiltration techniques that rely on reading privileged memory during speculation-are largely neutralized. Retpoline only hardens indirect branches against Spectre variant 2 and does not stop Meltdown. ASLR and stack canaries help against traditional memory-safety exploits but do not block speculative reads of privileged pages. Enabling simultaneous multithreading (hyper-threading) can actually increase side-channel exposure rather than mitigate it.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Kernel Page-Table Isolation (KPTI) and how does it mitigate risks like Spectre and Meltdown?
Open an interactive chat with Bash
How do speculative execution attacks like Spectre and Meltdown work?
Open an interactive chat with Bash
Why are other controls like Retpoline and ASLR insufficient against Meltdown-style attacks?
Open an interactive chat with Bash
What is speculative execution, and why is it vulnerable to attacks like Spectre/Meltdown?
Open an interactive chat with Bash
How does Kernel Page-Table Isolation (KPTI) mitigate the effects of speculative execution attacks?
Open an interactive chat with Bash
Why is enabling simultaneous multithreading (hyper-threading) not recommended to mitigate side-channel attacks?
Open an interactive chat with Bash
ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Secure Software Architecture and Design
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .