/* */

Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ISO/IEC 15408






2. Security design principles






3. FIPS140-2 (Security requirement for cryptographic modules)






4. Annual Rate of Occurence (ARO)






5. Access Matrix model


6. Examples of Security Standards






7. Core Security Concept






8. ISO/IEC 27006:2007






9. Security Policies


10. ISO/IEC 27001:2005






11. Take-Grant Model






12. Compartmentalization






13. Configurations Parameters Management






14. Technical Controls






15. Authentication






16. NIST standards related to software security






17. Authorization






18. Vulnerabilities repositories






19. Single point failure






20. Phsychological acceptability






21. STRIDE






22. Multifactor authentication






23. ISO/IEC 21827:2008






24. FIPS 201






25. Session Management






26. Exposure factor (EF)






27. Auditing






28. ISO /IEC 27000:2009






29. Total Risk






30. After identification step is...






31. Open design






32. Management Controls






33. OWASP Code Review Guide






34. Complete mediation






35. Operation Controls






36. Least privilege






37. Risk management process






38. Benefits of coding standards






39. FIPS 197 (Advance Cryptographic standards - AES)






40. Vulnerability






41. Categories of controls






42. DREAD






43. EALs levels






44. OWASP testing guide






45. ISO/IEC 27005:2008






46. Single Loss Expectancy (SLE)






47. Economy of mechanism






48. Threat






49. OCTAVE






50. Challenges in implementing auditing/logging






//