Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Develop hack resilient software






2. Vulnerabilities repositories






3. Categories of controls






4. Take-Grant Model






5. Technical Controls






6. Access Matrix model


7. Least privilege






8. FIPS140-2 (Security requirement for cryptographic modules)






9. EALs levels






10. Management Controls






11. Implementation challenges






12. Open design






13. Security design principles






14. Non Repudiation






15. Security Controls






16. Properties of secure software






17. Annual Rate of Occurence (ARO)






18. Integrity






19. ISO/IEC 21827:2008






20. OWASP Top 10






21. OWASP Code Review Guide






22. Core Security Concept






23. Single point failure






24. Clipping level






25. Single Loss Expectancy (SLE)






26. General security concept






27. Information Security Models






28. Confidentiality






29. Safeguards






30. ISO /IEC 27000:2009






31. Operation Controls






32. Challenges in implementing auditing/logging






33. Accountability






34. ISO/IEC 27005:2008






35. Residual Risk






36. Phsychological acceptability






37. Holistic Security in software






38. OWASP testing guide






39. Authentication






40. Multifactor authentication






41. Popular guides developed by OWASP






42. Benefits of coding standards






43. FIPS 197 (Advance Cryptographic standards - AES)






44. ISO/IEC 15408






45. ISO/IEC 27006:2007






46. ISO/IEC 27001:2005






47. ISO/IEC 27003






48. After identification step is...






49. Security profile of a software






50. Security Policies