Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ISO/IEC 27001:2005






2. Phsychological acceptability






3. Counter measures






4. Properties of secure software






5. Least privilege






6. Vulnerabilities repositories






7. Authentication






8. Develop hack resilient software






9. ISO/IEC 27006:2007






10. Annual Loss Expectancy (ALE)






11. OCTAVE






12. OWASP Top 10






13. Economy of mechanism






14. Holistic Security in software






15. Technical Controls






16. ISO/IEC 27002:2005






17. Total Risk






18. ISO/IEC 27003






19. Session Management






20. Multifactor authentication






21. Auditing






22. Popular guides developed by OWASP






23. Threat






24. Security Standards






25. Error and exception management






26. Configurations Parameters Management






27. Common best practices significant to Sofware Security






28. DREAD






29. Take-Grant Model






30. Safeguards






31. Flaw Hypothesis Method (FHM)






32. Core Security Concept






33. ISO/IEC 21827:2008






34. Categories of controls






35. Security profile of a software






36. Security Risk Management Discipline






37. ISO/IEC 27005:2008






38. Access Matrix model


39. ISO /IEC 27000:2009






40. STRIDE






41. FIPS 201






42. Benefits of coding standards






43. Annual Rate of Occurence (ARO)






44. Vulnerability






45. Integrity






46. Single Loss Expectancy (SLE)






47. EALs levels






48. Compartmentalization






49. OWASP development guide






50. Authorization