/* */

Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ISO/IEC 21827:2008






2. General security concept






3. Auditing






4. Security design principles






5. Software security risk management methodologies






6. Threat






7. Information Security Models






8. Security Standards






9. Challenges in implementing auditing/logging






10. Benefits of coding standards






11. PCI DSS






12. Risk management process






13. Compartmentalization






14. Safeguards






15. Take-Grant Model






16. EALs levels






17. STRIDE






18. Vulnerabilities repositories






19. Integrity






20. Technical Controls






21. Develop hack resilient software






22. Single Loss Expectancy (SLE)






23. Availability






24. Implementation challenges






25. FIPS140-2 (Security requirement for cryptographic modules)






26. After identification step is...






27. Multifactor authentication






28. NIST standards related to software security






29. Core Security Concept






30. Error and exception management






31. ISO/IEC 27001:2005






32. ISO/IEC 27003






33. Configurations Parameters Management






34. Security profile of a software






35. Economy of mechanism






36. Phsychological acceptability






37. Properties of secure software






38. FIPS 201






39. Access Matrix model


40. ISO /IEC 27000:2009






41. ISO/IEC 9216






42. ISO/IEC 27002:2005






43. Security Risk Management Discipline






44. Clipping level






45. Categories of controls






46. Least common mechanism






47. OWASP Top 10






48. ISO/IEC 27005:2008






49. Flaw Hypothesis Method (FHM)






50. Popular guides developed by OWASP






//