Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ISO/IEC 27006:2007






2. Integrity






3. Counter measures






4. STRIDE






5. FIPS 197 (Advance Cryptographic standards - AES)






6. Security Standards






7. FIPS 201






8. Single point failure






9. Information Security Models






10. Security profile of a software






11. ISO/IEC 27002:2005






12. ISO/IEC 15408






13. Vulnerability






14. Authentication






15. DREAD






16. OWASP testing guide






17. Common best practices significant to Sofware Security






18. Implementation challenges






19. Challenges in implementing auditing/logging






20. Operation Controls






21. Economy of mechanism






22. ISO/IEC 21827:2008






23. Compartmentalization






24. PCI DSS






25. After identification step is...






26. ISO/IEC 27003






27. Categories of controls






28. ISO/IEC 9216






29. OCTAVE






30. OWASP development guide






31. Least privilege






32. FIPS140-2 (Security requirement for cryptographic modules)






33. OWASP Top 10






34. Availability






35. Annual Loss Expectancy (ALE)






36. Vulnerabilities repositories






37. Total Risk






38. Complete mediation






39. Management Controls






40. Security Policies


41. Open design






42. Risk management process






43. NIST standards related to software security






44. Authorization






45. Safeguards






46. Holistic Security in software






47. Security Controls






48. Develop hack resilient software






49. Accountability






50. Access Matrix model