ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Question

While designing a payment terminal that keeps cryptographic session keys in external DDR memory, you learn attackers might gain brief physical access and attempt a cold-boot or bus-sniffing attack to extract those keys. Which memory-level control would best preserve the confidentiality of the keys under this threat?

  • Insert stack canaries to detect and halt execution on buffer-overflow attempts affecting the call stack.

  • Enable on-the-fly memory encryption so that all reads and writes to external DRAM are automatically AES-encrypted with a key stored inside a secure element.

  • Increase DRAM wait-state cycles to reduce timing side channels during memory accesses.

  • Use error-correcting code (ECC) DRAM to detect and correct single-bit memory faults.

ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Secure Software Architecture and Design
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot