ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Question

Your company is deploying a battery-powered IoT environmental monitoring system that uses a multi-hop wireless mesh topology. Because nodes have very limited processing power and often lack any connection to central infrastructure, you must select a way to authenticate neighbors and secure routing traffic. Which key-management approach is MOST appropriate?

  • Rely solely on 802.11i/WPA2 link-layer security negotiated at association to secure and authenticate all mesh traffic

  • Implement certificate-based mutual TLS between nodes using 2048-bit RSA keys issued by an online certificate authority

  • Preload each node with a random subset of keys from a large predistributed key pool so neighbors can establish shared secrets opportunistically

  • Provision every node with a single network-wide symmetric key used for all encryption and authentication

ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Secure Software Architecture and Design
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot