ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Question

While reviewing a new web application's installation guide during the verification phase, you observe two steps: (1) disable the operating system's mandatory access-control module (SELinux) and (2) import the application's database schema by running a setup script as the database's root (superuser) account. No security justification or alternative procedures are documented. According to secure software lifecycle practices for verifying installation and setup instructions, what is the most appropriate action?

  • Approve the guide because disabling SELinux avoids compatibility issues and installation speed is the priority.

  • Delete the controversial steps from the guide so that no potentially harmful advice is published.

  • Return the document for revision, requiring it to justify the risky steps and include secure, least-privilege alternatives.

  • Proceed with code review and penetration testing; documentation issues are out of scope for security testing.

ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Secure Software Testing
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot