Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Compartmentalization






2. DREAD






3. Examples of Security Standards






4. PCI DSS






5. ISO/IEC 21827:2008






6. Annual Rate of Occurence (ARO)






7. Counter measures






8. Auditing






9. Security profile of a software






10. Risk management process






11. Operation Controls






12. Error and exception management






13. Phsychological acceptability






14. General security concept






15. Multifactor authentication






16. ISO/IEC 27005:2008






17. Integrity






18. Information Security Models






19. OCTAVE






20. Benefits of coding standards






21. Security Risk Management Discipline






22. ISO /IEC 27000:2009






23. Economy of mechanism






24. OWASP Top 10






25. Complete mediation






26. Availability






27. Popular guides developed by OWASP






28. Clipping level






29. Flaw Hypothesis Method (FHM)






30. OWASP testing guide






31. Annual Loss Expectancy (ALE)






32. Threat






33. Management Controls






34. ISO/IEC 15408






35. Implementation challenges






36. Categories of controls






37. Access Matrix model


38. Configurations Parameters Management






39. ISO/IEC 9216






40. Single point failure






41. NIST standards related to software security






42. Confidentiality






43. FIPS 201






44. Common best practices significant to Sofware Security






45. After identification step is...






46. Authentication






47. Properties of secure software






48. Least privilege






49. Security Policies


50. Single Loss Expectancy (SLE)