Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Confidentiality






2. Common best practices significant to Sofware Security






3. Counter measures






4. ISO/IEC 27005:2008






5. Error and exception management






6. PCI DSS






7. Phsychological acceptability






8. Single Loss Expectancy (SLE)






9. Security Risk Management Discipline






10. ISO/IEC 9216






11. OWASP testing guide






12. Annual Loss Expectancy (ALE)






13. STRIDE






14. Challenges in implementing auditing/logging






15. Session Management






16. Security Policies

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


17. Holistic Security in software






18. General security concept






19. Non Repudiation






20. OWASP Top 10






21. Flaw Hypothesis Method (FHM)






22. Take-Grant Model






23. FIPS 201






24. Configurations Parameters Management






25. OCTAVE






26. Integrity






27. Clipping level






28. Operation Controls






29. Popular guides developed by OWASP






30. Security design principles






31. Residual Risk






32. Accountability






33. Security profile of a software






34. ISO /IEC 27000:2009






35. Develop hack resilient software






36. Compartmentalization






37. ISO/IEC 27003






38. Open design






39. Availability






40. Security Standards






41. OWASP development guide






42. Least common mechanism






43. Risk management process






44. Annual Rate of Occurence (ARO)






45. Vulnerability






46. Authorization






47. Complete mediation






48. Security Controls






49. Software security risk management methodologies






50. After identification step is...