Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Counter measures






2. Non Repudiation






3. Complete mediation






4. Develop hack resilient software






5. Compartmentalization






6. Properties of secure software






7. Common best practices significant to Sofware Security






8. ISO /IEC 27000:2009






9. Popular guides developed by OWASP






10. Safeguards






11. Information Security Models






12. Challenges in implementing auditing/logging






13. Least common mechanism






14. Annual Loss Expectancy (ALE)






15. ISO/IEC 27002:2005






16. OWASP development guide






17. ISO/IEC 27005:2008






18. Clipping level






19. Economy of mechanism






20. Vulnerability






21. ISO/IEC 9216






22. General security concept






23. ISO/IEC 15408






24. Take-Grant Model






25. Security profile of a software






26. Examples of Security Standards






27. Security Standards






28. Least privilege






29. ISO/IEC 27003






30. PCI DSS






31. FIPS140-2 (Security requirement for cryptographic modules)






32. Technical Controls






33. Total Risk






34. STRIDE






35. ISO/IEC 21827:2008






36. Confidentiality






37. Phsychological acceptability






38. Open design






39. Flaw Hypothesis Method (FHM)






40. OWASP Code Review Guide






41. Categories of controls






42. Core Security Concept






43. Configurations Parameters Management






44. Operation Controls






45. Risk management process






46. Session Management






47. Availability






48. Management Controls






49. Security design principles






50. FIPS 197 (Advance Cryptographic standards - AES)