Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. OWASP Code Review Guide






2. DREAD






3. ISO/IEC 27006:2007






4. Threat






5. Security design principles






6. ISO/IEC 15408






7. Information Security Models






8. General security concept






9. Safeguards






10. Economy of mechanism






11. Implementation challenges






12. Categories of controls






13. Authentication






14. Counter measures






15. ISO/IEC 27002:2005






16. Security Policies

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


17. Complete mediation






18. Compartmentalization






19. OWASP development guide






20. FIPS 197 (Advance Cryptographic standards - AES)






21. Total Risk






22. Security Controls






23. Auditing






24. OWASP testing guide






25. Least privilege






26. OCTAVE






27. ISO/IEC 9216






28. EALs levels






29. Multifactor authentication






30. Core Security Concept






31. Configurations Parameters Management






32. Annual Rate of Occurence (ARO)






33. PCI DSS






34. Session Management






35. Flaw Hypothesis Method (FHM)






36. Examples of Security Standards






37. Single point failure






38. Operation Controls






39. Security Risk Management Discipline






40. Common best practices significant to Sofware Security






41. ISO/IEC 27003






42. Open design






43. ISO/IEC 21827:2008






44. Accountability






45. Software security risk management methodologies






46. After identification step is...






47. STRIDE






48. Confidentiality






49. Risk management process






50. Holistic Security in software