ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Question

In a regulated environment, investigators must later prove which administrator altered firewall rules. The system already hashes each rule change and stores the editor's user ID. What additional control would best provide cryptographic non-repudiation of each modification record?

  • Digitally sign each change record with the administrator's private key before it is written to the log.

  • Encrypt the log files symmetrically so only security personnel can read them.

  • Require administrators to use multi-factor authentication when logging into the firewall management console.

  • Store the log files on write-once, read-many (WORM) media to prevent any later alteration.

ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Secure Software Concepts
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot