ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Question
Your development team discovered a production buffer-overflow defect in a C++ microservice even though the code compiled successfully. A root-cause analysis shows that the compiler emitted multiple "unsafe function usage" warnings that were not acted on. To prevent similar issues, which build policy change most effectively enforces secure coding practice for handling compiler diagnostics?
Suppress low-severity warnings and rely on runtime exception handling to mitigate any residual risks.
Permit builds with warnings but require developers to list each ignored warning in a tracking document before release.
Shift security review to post-deployment static analysis scans instead of interrupting the compile process for warnings.
Configure the build system to fail compilation whenever the compiler emits any warning, requiring developers to resolve all warnings before code can be merged.
Compiler warnings frequently highlight undefined behavior, unsafe function use, and type or bounds mismatches-conditions that attackers can exploit. Treating every compiler warning as an error stops the build whenever such conditions are detected, forcing developers to fix the underlying code before release. Merely suppressing or labeling warnings, running post-deployment scans, or adding manual acknowledgements does not guarantee the issue is remediated; the vulnerable binary could still be produced and shipped. Therefore, configuring the build to fail on any warning is the strongest preventive control and aligns with secure-by-default development guidance from industry standards and vendor best practices.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a buffer overflow and why is it a security risk?
Open an interactive chat with Bash
Why are compiler warnings important in secure coding?
Open an interactive chat with Bash
What does 'secure-by-default' mean in software development?
Open an interactive chat with Bash
Why do compiler warnings matter for secure coding?
Open an interactive chat with Bash
How does treating warnings as errors enforce secure development?
Open an interactive chat with Bash
What are examples of unsafe functions that developers should avoid?
Open an interactive chat with Bash
ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Secure Software Implementation
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .