Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Residual Risk






2. Confidentiality






3. Management Controls






4. Security Controls






5. Non Repudiation






6. After identification step is...






7. Error and exception management






8. Operation Controls






9. Configurations Parameters Management






10. Holistic Security in software






11. Availability






12. Common best practices significant to Sofware Security






13. OWASP testing guide






14. Information Security Models






15. ISO/IEC 27003






16. Flaw Hypothesis Method (FHM)






17. Phsychological acceptability






18. Exposure factor (EF)






19. FIPS 197 (Advance Cryptographic standards - AES)






20. ISO/IEC 27006:2007






21. Authentication






22. ISO /IEC 27000:2009






23. Open design






24. Auditing






25. Security Policies


26. Challenges in implementing auditing/logging






27. ISO/IEC 21827:2008






28. Economy of mechanism






29. OWASP Top 10






30. Technical Controls






31. Compartmentalization






32. Security design principles






33. Vulnerabilities repositories






34. Access Matrix model


35. OCTAVE






36. Least common mechanism






37. Security Risk Management Discipline






38. Take-Grant Model






39. Vulnerability






40. OWASP Code Review Guide






41. OWASP development guide






42. Accountability






43. EALs levels






44. Least privilege






45. ISO/IEC 27001:2005






46. Develop hack resilient software






47. Software security risk management methodologies






48. Single Loss Expectancy (SLE)






49. Session Management






50. FIPS 201