Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Error and exception management






2. Categories of controls






3. Phsychological acceptability






4. Operation Controls






5. Confidentiality






6. Take-Grant Model






7. Benefits of coding standards






8. Examples of Security Standards






9. EALs levels






10. ISO/IEC 9216






11. Single Loss Expectancy (SLE)






12. Security Standards






13. Popular guides developed by OWASP






14. PCI DSS






15. Security Policies


16. Least common mechanism






17. ISO/IEC 21827:2008






18. Annual Loss Expectancy (ALE)






19. Security Controls






20. Residual Risk






21. ISO/IEC 27001:2005






22. After identification step is...






23. Availability






24. Auditing






25. Flaw Hypothesis Method (FHM)






26. Security design principles






27. ISO/IEC 27005:2008






28. Core Security Concept






29. NIST standards related to software security






30. Common best practices significant to Sofware Security






31. OWASP Code Review Guide






32. OWASP testing guide






33. Exposure factor (EF)






34. STRIDE






35. OWASP Top 10






36. Security profile of a software






37. Authentication






38. Properties of secure software






39. Accountability






40. FIPS 201






41. Non Repudiation






42. Implementation challenges






43. Safeguards






44. Configurations Parameters Management






45. Integrity






46. FIPS140-2 (Security requirement for cryptographic modules)






47. Threat






48. OWASP development guide






49. Complete mediation






50. Information Security Models