Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Threat






2. Total Risk






3. OWASP Code Review Guide






4. ISO/IEC 9216






5. NIST standards related to software security






6. Exposure factor (EF)






7. Annual Loss Expectancy (ALE)






8. EALs levels






9. Authorization






10. Operation Controls






11. Residual Risk






12. Vulnerability






13. Popular guides developed by OWASP






14. Least privilege






15. Challenges in implementing auditing/logging






16. ISO /IEC 27000:2009






17. OWASP development guide






18. Security Policies

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


19. ISO/IEC 15408






20. Accountability






21. Properties of secure software






22. Auditing






23. Complete mediation






24. General security concept






25. FIPS140-2 (Security requirement for cryptographic modules)






26. Compartmentalization






27. Vulnerabilities repositories






28. Flaw Hypothesis Method (FHM)






29. OCTAVE






30. PCI DSS






31. Management Controls






32. Confidentiality






33. Integrity






34. Single point failure






35. Security profile of a software






36. Least common mechanism






37. Software security risk management methodologies






38. Counter measures






39. DREAD






40. After identification step is...






41. Annual Rate of Occurence (ARO)






42. Multifactor authentication






43. Holistic Security in software






44. OWASP Top 10






45. Core Security Concept






46. Security Controls






47. Categories of controls






48. Configurations Parameters Management






49. Security design principles






50. Technical Controls