Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Auditing






2. DREAD






3. PCI DSS






4. ISO/IEC 21827:2008






5. Least common mechanism






6. Integrity






7. OWASP Code Review Guide






8. Safeguards






9. Authorization






10. ISO/IEC 15408






11. Popular guides developed by OWASP






12. Flaw Hypothesis Method (FHM)






13. OWASP development guide






14. Information Security Models






15. Common best practices significant to Sofware Security






16. Annual Rate of Occurence (ARO)






17. Categories of controls






18. Security design principles






19. Security Policies


20. Risk management process






21. FIPS 197 (Advance Cryptographic standards - AES)






22. Clipping level






23. Confidentiality






24. Session Management






25. OWASP Top 10






26. OCTAVE






27. Phsychological acceptability






28. Least privilege






29. Error and exception management






30. After identification step is...






31. ISO/IEC 9216






32. Residual Risk






33. Security profile of a software






34. Multifactor authentication






35. OWASP testing guide






36. Configurations Parameters Management






37. Vulnerability






38. Exposure factor (EF)






39. Total Risk






40. FIPS 201






41. Availability






42. Compartmentalization






43. Complete mediation






44. Threat






45. ISO/IEC 27006:2007






46. Properties of secure software






47. ISO/IEC 27005:2008






48. Software security risk management methodologies






49. Economy of mechanism






50. Holistic Security in software