ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Question

Your organization runs a containerized web application on a managed Kubernetes cluster. To strengthen continuous monitoring, you must configure security telemetry sent to the SIEM so that attempted runtime privilege-escalation inside any container is detected as soon as it happens. Which data source should you prioritize forwarding?

  • Application access logs produced by the web servers in each container

  • Scheduled configuration snapshots exported from the Kubernetes API server

  • Kernel-level system call events collected by a container runtime or eBPF sensor

  • Virtual network flow logs captured from the cluster's network interfaces

ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Secure Software Deployment, Operations, Maintenance
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot