ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Question
You are defining security architecture for an industrial controller that loads device drivers and BIOS updates at power-on. Compliance requires preventing execution of tampered or unauthorized code. Which mechanism MOST effectively provides both integrity and authenticity assurances before the firmware and drivers run?
Activate the operating system's kernel-mode code signing policy to block unsigned drivers after the OS has loaded.
Schedule periodic offline malware and vulnerability scans of firmware and driver binaries using signature-based tools.
Compute a CRC32 checksum for every firmware image at boot and compare it with a value stored on the system drive.
Enable hardware-enforced secure boot that validates cryptographic signatures of each firmware and driver against a root-of-trust key during the power-on sequence.
Hardware-based secure boot establishes a root of trust anchored in immutable code or keys burned into the platform. Each firmware component and driver is cryptographically signed; during the boot sequence the platform verifies the signature against trusted public keys before allowing execution. This process detects any modification (integrity) and confirms the publisher's identity (authenticity). A simple CRC stored on local media can show bit-level changes but does not prove who produced the code and is itself susceptible to tampering. Enforcing driver signing after the OS loads protects only kernel modules, leaving earlier firmware stages unchecked. Periodic vulnerability scans may uncover known malicious code long after it has already executed and do not provide real-time integrity or authenticity guarantees.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is secure boot and how does it work?
Open an interactive chat with Bash
What is the concept of a root of trust key?
Open an interactive chat with Bash
How does cryptographic signature verification ensure both integrity and authenticity?
Open an interactive chat with Bash
What is a root-of-trust key?
Open an interactive chat with Bash
How does cryptographic signature validation ensure both integrity and authenticity?
Open an interactive chat with Bash
What are the limitations of CRC32 checksums compared to cryptographic methods?
Open an interactive chat with Bash
ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Secure Software Architecture and Design
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .