Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Examples of Security Standards






2. Take-Grant Model






3. General security concept






4. Annual Loss Expectancy (ALE)






5. Technical Controls






6. Holistic Security in software






7. Vulnerabilities repositories






8. Properties of secure software






9. Annual Rate of Occurence (ARO)






10. Single point failure






11. Non Repudiation






12. Threat






13. Vulnerability






14. Confidentiality






15. Economy of mechanism






16. PCI DSS






17. Benefits of coding standards






18. Integrity






19. Categories of controls






20. Challenges in implementing auditing/logging






21. Single Loss Expectancy (SLE)






22. Security Risk Management Discipline






23. Configurations Parameters Management






24. Develop hack resilient software






25. Security profile of a software






26. Complete mediation






27. Access Matrix model


28. ISO/IEC 9216






29. OWASP testing guide






30. OWASP development guide






31. Residual Risk






32. DREAD






33. Multifactor authentication






34. STRIDE






35. Authorization






36. Safeguards






37. Exposure factor (EF)






38. ISO/IEC 27002:2005






39. NIST standards related to software security






40. Security design principles






41. Operation Controls






42. After identification step is...






43. Total Risk






44. Counter measures






45. Availability






46. Information Security Models






47. Security Standards






48. Compartmentalization






49. Least privilege






50. Core Security Concept