Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Multifactor authentication






2. Authentication






3. Threat






4. Common best practices significant to Sofware Security






5. Operation Controls






6. Non Repudiation






7. FIPS140-2 (Security requirement for cryptographic modules)






8. Information Security Models






9. Accountability






10. ISO/IEC 27005:2008






11. Integrity






12. Core Security Concept






13. Security Controls






14. General security concept






15. Single Loss Expectancy (SLE)






16. Counter measures






17. Error and exception management






18. Take-Grant Model






19. Auditing






20. Complete mediation






21. Examples of Security Standards






22. Least common mechanism






23. Risk management process






24. Security Standards






25. EALs levels






26. Software security risk management methodologies






27. Session Management






28. OWASP Top 10






29. Residual Risk






30. OCTAVE






31. PCI DSS






32. Flaw Hypothesis Method (FHM)






33. OWASP testing guide






34. Security Policies

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


35. ISO /IEC 27000:2009






36. FIPS 197 (Advance Cryptographic standards - AES)






37. Safeguards






38. Configurations Parameters Management






39. Benefits of coding standards






40. Popular guides developed by OWASP






41. Properties of secure software






42. Vulnerability






43. Implementation challenges






44. Least privilege






45. NIST standards related to software security






46. Vulnerabilities repositories






47. Total Risk






48. ISO/IEC 27002:2005






49. Economy of mechanism






50. ISO/IEC 9216