Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. After identification step is...






2. OWASP development guide






3. OWASP Code Review Guide






4. Categories of controls






5. ISO/IEC 21827:2008






6. Technical Controls






7. Clipping level






8. Configurations Parameters Management






9. Safeguards






10. FIPS140-2 (Security requirement for cryptographic modules)






11. EALs levels






12. Popular guides developed by OWASP






13. Benefits of coding standards






14. Management Controls






15. Authentication






16. Information Security Models






17. Single point failure






18. Implementation challenges






19. ISO/IEC 27006:2007






20. Annual Loss Expectancy (ALE)






21. Availability






22. Flaw Hypothesis Method (FHM)






23. ISO/IEC 27005:2008






24. Common best practices significant to Sofware Security






25. Counter measures






26. Error and exception management






27. ISO /IEC 27000:2009






28. OWASP testing guide






29. Security profile of a software






30. ISO/IEC 27003






31. Software security risk management methodologies






32. ISO/IEC 15408






33. Examples of Security Standards






34. Vulnerability






35. FIPS 201






36. Develop hack resilient software






37. Integrity






38. Annual Rate of Occurence (ARO)






39. Complete mediation






40. Least privilege






41. Properties of secure software






42. Economy of mechanism






43. Authorization






44. STRIDE






45. OCTAVE






46. Threat






47. Multifactor authentication






48. Core Security Concept






49. Vulnerabilities repositories






50. Accountability