ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Question

Your team is deploying battery-powered 6LoWPAN sensors that report over UDP. Each node has only 64 KB RAM and must authenticate the cloud collector, encrypt readings in transit, and still leave headroom for secure future firmware updates. Which approach offers an appropriate security level while respecting the hardware constraints?

  • Implement DTLS using pre-shared key (PSK) ciphersuites between each sensor and the collector.

  • Terminate a full TLS 1.3 session on each sensor using mutual X.509 certificate authentication.

  • Deploy IPsec transport mode with 2048-bit RSA certificates on every sensor node.

  • Protect all traffic with WPA3-Enterprise and rely on the Wi-Fi access point for encryption and authentication.

ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Secure Software Architecture and Design
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot