ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Question

Your development team must ensure that a critical code-signing private key cannot be recovered by any single administrator or by anyone who gains access to one stored fragment. They also need the key to be recoverable during a disaster as long as at least three of five designated team leads are available. Which control BEST satisfies these requirements?

  • Store the private key inside a hardware security module that requires individual administrator passwords for access.

  • Implement a (3,5) Shamir secret sharing scheme to distribute the private key among the five team leads.

  • Encrypt the private key with AES-256 and keep a single encrypted backup copy in an off-site safe.

  • Place the private key in a centralized vault protected by multi-factor authentication and audit logging.

ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Secure Software Concepts
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot