Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Flaw Hypothesis Method (FHM)






2. Benefits of coding standards






3. Examples of Security Standards






4. PCI DSS






5. Security design principles






6. Non Repudiation






7. Categories of controls






8. Take-Grant Model






9. Single point failure






10. NIST standards related to software security






11. Technical Controls






12. OWASP Top 10






13. Risk management process






14. Access Matrix model


15. Phsychological acceptability






16. Implementation challenges






17. ISO/IEC 27006:2007






18. Integrity






19. Compartmentalization






20. Safeguards






21. Security Controls






22. Error and exception management






23. Security profile of a software






24. Security Standards






25. Develop hack resilient software






26. DREAD






27. Vulnerability






28. Annual Rate of Occurence (ARO)






29. Management Controls






30. FIPS 197 (Advance Cryptographic standards - AES)






31. Accountability






32. Annual Loss Expectancy (ALE)






33. Popular guides developed by OWASP






34. Open design






35. Complete mediation






36. Availability






37. Core Security Concept






38. FIPS140-2 (Security requirement for cryptographic modules)






39. Confidentiality






40. Holistic Security in software






41. Information Security Models






42. Software security risk management methodologies






43. Vulnerabilities repositories






44. ISO/IEC 27002:2005






45. Clipping level






46. ISO /IEC 27000:2009






47. Challenges in implementing auditing/logging






48. Security Risk Management Discipline






49. OWASP Code Review Guide






50. FIPS 201