ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Question

During the design of an industrial control appliance that may be physically accessed by attackers, you are asked to ensure the operating system and bootloader cannot run if they have been replaced with malicious code. Which approach best fulfills this secure boot requirement at power-on?

  • Implement UEFI Secure Boot with a vendor-installed platform key and sign every boot component so firmware verifies each stage before execution.

  • Configure the bootloader to require an administrator password before it loads the kernel.

  • Store the expected hash of the operating-system image in a TPM PCR and perform remote attestation after startup.

  • Place the bootloader on a read-only disk partition that is mounted with the 'ro' option at system start.

ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Secure Software Deployment, Operations, Maintenance
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot