Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Take-Grant Model






2. OWASP development guide






3. Security Policies


4. After identification step is...






5. ISO/IEC 27003






6. OWASP Code Review Guide






7. Access Matrix model


8. Phsychological acceptability






9. Annual Rate of Occurence (ARO)






10. ISO/IEC 27006:2007






11. Security design principles






12. Software security risk management methodologies






13. Popular guides developed by OWASP






14. Least privilege






15. Residual Risk






16. ISO /IEC 27000:2009






17. ISO/IEC 21827:2008






18. Challenges in implementing auditing/logging






19. Examples of Security Standards






20. Risk management process






21. Authentication






22. Vulnerability






23. STRIDE






24. Counter measures






25. Confidentiality






26. Operation Controls






27. Single point failure






28. Economy of mechanism






29. ISO/IEC 9216






30. Compartmentalization






31. Threat






32. Security profile of a software






33. PCI DSS






34. General security concept






35. Develop hack resilient software






36. Security Standards






37. NIST standards related to software security






38. ISO/IEC 27001:2005






39. Auditing






40. Integrity






41. Session Management






42. Information Security Models






43. Configurations Parameters Management






44. Properties of secure software






45. Non Repudiation






46. Technical Controls






47. Multifactor authentication






48. Safeguards






49. Complete mediation






50. Availability