ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Question

While conducting threat modeling for a new e-commerce platform, you learn the developers plan to integrate an open-source payment-tokenization library downloaded directly from a public Git repository. Which risk inherited from a third-party supplier should you flag as the MOST relevant security threat?

  • Its MIT license might require the company to include attribution text in product documentation.

  • The library may already contain vulnerabilities or malicious code introduced upstream, enabling attackers to compromise payment data or inject backdoors.

  • Adding the library could increase the application's download size, slowing page loads for mobile users.

  • Ongoing maintenance of the library could cease, forcing the development team to rewrite payment functionality in the future.

ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Secure Software Architecture and Design
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot