Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Security Controls






2. OCTAVE






3. NIST standards related to software security






4. Least common mechanism






5. ISO/IEC 27003






6. STRIDE






7. Security profile of a software






8. Categories of controls






9. Availability






10. OWASP Code Review Guide






11. Security design principles






12. Least privilege






13. ISO /IEC 27000:2009






14. Auditing






15. Implementation challenges






16. Economy of mechanism






17. ISO/IEC 27006:2007






18. Operation Controls






19. Flaw Hypothesis Method (FHM)






20. Total Risk






21. Benefits of coding standards






22. Vulnerabilities repositories






23. Confidentiality






24. Authorization






25. Properties of secure software






26. DREAD






27. OWASP Top 10






28. Risk management process






29. FIPS140-2 (Security requirement for cryptographic modules)






30. Compartmentalization






31. EALs levels






32. PCI DSS






33. Technical Controls






34. ISO/IEC 15408






35. Multifactor authentication






36. Single Loss Expectancy (SLE)






37. Session Management






38. Phsychological acceptability






39. Holistic Security in software






40. Management Controls






41. Challenges in implementing auditing/logging






42. Annual Loss Expectancy (ALE)






43. Develop hack resilient software






44. Access Matrix model


45. FIPS 201






46. ISO/IEC 9216






47. Software security risk management methodologies






48. Annual Rate of Occurence (ARO)






49. Counter measures






50. After identification step is...