ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Question
In a containerized production environment, the security team notices that developers sometimes install additional packages after deployment. To stop any malicious binaries that might run inside the containers at runtime, they need a control that will immediately detect and block malware even if it was not present in the original image. Which approach best meets this requirement?
Enforce strict host-based firewall rules to limit outbound network traffic from container hosts to approved destinations
Deploy an on-access malware scanning agent inside each container runtime that uses frequently updated signatures and behavioral analysis to block suspicious executables at run time
Add container image scanning to the CI/CD pipeline to prevent pushing images that contain known vulnerabilities
Rely on static application security testing of the microservice source code before each build is triggered
An on-access (real-time) malware scanning agent placed inside each running container monitors every file execution attempt and compares it to up-to-date signature and heuristic rules. Because the scan happens at runtime, any malicious code introduced after deployment-such as through a package manager or a compromised process-is detected and blocked before it can execute. Image scanning in the CI/CD pipeline, while important, only protects against malware present at build time and cannot see changes made after the container is running. Host firewalls focus on network traffic, not executable content, and SAST finds source-code flaws before compilation rather than detecting malicious binaries delivered post-deployment. Therefore, deploying real-time anti-malware agents inside the container runtime is the most effective control for this scenario.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an on-access malware scanning agent?
Open an interactive chat with Bash
Why is container image scanning at the CI/CD pipeline insufficient in this scenario?
Open an interactive chat with Bash
What is the difference between runtime and static application security measures?
Open an interactive chat with Bash
What is an on-access malware scanning agent?
Open an interactive chat with Bash
Why isn't container image scanning sufficient after deployment?
Open an interactive chat with Bash
How does behavioral analysis help detect malware in containers?
Open an interactive chat with Bash
ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Secure Software Implementation
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .