Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Confidentiality






2. FIPS140-2 (Security requirement for cryptographic modules)






3. EALs levels






4. Auditing






5. Security Policies


6. Multifactor authentication






7. Popular guides developed by OWASP






8. OWASP testing guide






9. Total Risk






10. ISO/IEC 27006:2007






11. Exposure factor (EF)






12. ISO/IEC 9216






13. Counter measures






14. ISO /IEC 27000:2009






15. Holistic Security in software






16. Information Security Models






17. Vulnerabilities repositories






18. Non Repudiation






19. After identification step is...






20. OWASP development guide






21. ISO/IEC 27002:2005






22. Categories of controls






23. ISO/IEC 27005:2008






24. FIPS 201






25. Software security risk management methodologies






26. Vulnerability






27. Phsychological acceptability






28. Core Security Concept






29. Common best practices significant to Sofware Security






30. ISO/IEC 27003






31. Annual Rate of Occurence (ARO)






32. Single Loss Expectancy (SLE)






33. ISO/IEC 21827:2008






34. Safeguards






35. Risk management process






36. Develop hack resilient software






37. OWASP Code Review Guide






38. Properties of secure software






39. PCI DSS






40. NIST standards related to software security






41. Security Standards






42. Security profile of a software






43. Economy of mechanism






44. Flaw Hypothesis Method (FHM)






45. Authorization






46. ISO/IEC 15408






47. Authentication






48. Open design






49. FIPS 197 (Advance Cryptographic standards - AES)






50. Compartmentalization