Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. STRIDE






2. ISO/IEC 27002:2005






3. Properties of secure software






4. Threat






5. Security Policies


6. FIPS 197 (Advance Cryptographic standards - AES)






7. Security design principles






8. Holistic Security in software






9. Core Security Concept






10. ISO /IEC 27000:2009






11. Access Matrix model


12. ISO/IEC 9216






13. Counter measures






14. Implementation challenges






15. Annual Loss Expectancy (ALE)






16. OWASP Code Review Guide






17. Popular guides developed by OWASP






18. Residual Risk






19. Annual Rate of Occurence (ARO)






20. FIPS140-2 (Security requirement for cryptographic modules)






21. ISO/IEC 15408






22. OCTAVE






23. Authentication






24. Accountability






25. DREAD






26. Common best practices significant to Sofware Security






27. Software security risk management methodologies






28. Categories of controls






29. Confidentiality






30. Least privilege






31. Security Risk Management Discipline






32. Safeguards






33. Session Management






34. Develop hack resilient software






35. Open design






36. Single point failure






37. Operation Controls






38. Benefits of coding standards






39. NIST standards related to software security






40. FIPS 201






41. Availability






42. After identification step is...






43. Integrity






44. Examples of Security Standards






45. ISO/IEC 27003






46. EALs levels






47. Clipping level






48. Compartmentalization






49. Flaw Hypothesis Method (FHM)






50. Configurations Parameters Management