Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ISO/IEC 27006:2007






2. Challenges in implementing auditing/logging






3. Complete mediation






4. PCI DSS






5. OWASP Code Review Guide






6. Accountability






7. DREAD






8. OWASP testing guide






9. ISO/IEC 21827:2008






10. Compartmentalization






11. FIPS 197 (Advance Cryptographic standards - AES)






12. General security concept






13. Auditing






14. Annual Loss Expectancy (ALE)






15. ISO/IEC 15408






16. Operation Controls






17. STRIDE






18. Phsychological acceptability






19. Exposure factor (EF)






20. Software security risk management methodologies






21. Vulnerabilities repositories






22. Technical Controls






23. Multifactor authentication






24. ISO/IEC 27003






25. ISO/IEC 9216






26. Security Controls






27. Error and exception management






28. OCTAVE






29. Total Risk






30. ISO /IEC 27000:2009






31. Confidentiality






32. OWASP Top 10






33. Authorization






34. Annual Rate of Occurence (ARO)






35. Categories of controls






36. Common best practices significant to Sofware Security






37. Popular guides developed by OWASP






38. Develop hack resilient software






39. Security profile of a software






40. Security Policies


41. Risk management process






42. Non Repudiation






43. Clipping level






44. Examples of Security Standards






45. Holistic Security in software






46. Benefits of coding standards






47. Vulnerability






48. Least privilege






49. ISO/IEC 27001:2005






50. FIPS 201