Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Flaw Hypothesis Method (FHM)






2. Total Risk






3. Holistic Security in software






4. NIST standards related to software security






5. Security Controls






6. Error and exception management






7. OWASP Top 10






8. Annual Loss Expectancy (ALE)






9. Availability






10. Security design principles






11. General security concept






12. Auditing






13. Integrity






14. ISO/IEC 27002:2005






15. After identification step is...






16. Benefits of coding standards






17. OWASP testing guide






18. Exposure factor (EF)






19. Authentication






20. Management Controls






21. FIPS140-2 (Security requirement for cryptographic modules)






22. OWASP development guide






23. ISO/IEC 27005:2008






24. Technical Controls






25. Security Policies


26. Security Risk Management Discipline






27. Challenges in implementing auditing/logging






28. Safeguards






29. Software security risk management methodologies






30. Operation Controls






31. Complete mediation






32. OCTAVE






33. ISO/IEC 15408






34. OWASP Code Review Guide






35. Compartmentalization






36. Categories of controls






37. Least common mechanism






38. PCI DSS






39. Confidentiality






40. Single point failure






41. Least privilege






42. Security Standards






43. Information Security Models






44. Phsychological acceptability






45. ISO/IEC 21827:2008






46. Common best practices significant to Sofware Security






47. Vulnerability






48. EALs levels






49. Configurations Parameters Management






50. Threat