ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Question

In a regulated environment, investigators must later prove which administrator altered firewall rules. The system already hashes each rule change and stores the editor's user ID. What additional control would best provide cryptographic non-repudiation of each modification record?

  • Encrypt the log files symmetrically so only security personnel can read them.

  • Digitally sign each change record with the administrator's private key before it is written to the log.

  • Store the log files on write-once, read-many (WORM) media to prevent any later alteration.

  • Require administrators to use multi-factor authentication when logging into the firewall management console.

ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Secure Software Concepts
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot