ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Question

Your company ships high-value electronics labeled with passive 13.56 MHz RFID tags so distribution centers can quickly process inbound pallets. Management worries that competitors might discreetly use their own readers alongside public roads to capture tag data in transit and deduce inventory levels. Which design control most effectively mitigates this skimming risk without impeding normal scanning at authorized docks?

  • Equip the tags with password-protected memory and enforce cryptographic challenge-response between the tag and authorized readers before any data exchange.

  • Configure readers to transmit at the lowest possible power so tags respond only at very close range.

  • Switch from high-frequency (13.56 MHz) tags to low-frequency (125 kHz) tags to shorten the read distance and reduce interception chances.

  • Ship items in metallized, RF-shielded packaging that warehouse staff must remove before scanning each pallet.

ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Secure Software Architecture and Design
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot