Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Popular guides developed by OWASP






2. Flaw Hypothesis Method (FHM)






3. Annual Loss Expectancy (ALE)






4. Least common mechanism






5. Threat






6. Compartmentalization






7. ISO/IEC 27002:2005






8. OCTAVE






9. Configurations Parameters Management






10. DREAD






11. Safeguards






12. Management Controls






13. Security profile of a software






14. Security Risk Management Discipline






15. Annual Rate of Occurence (ARO)






16. Single point failure






17. Error and exception management






18. FIPS 197 (Advance Cryptographic standards - AES)






19. Security Controls






20. Integrity






21. ISO/IEC 27006:2007






22. Implementation challenges






23. Exposure factor (EF)






24. Authorization






25. Complete mediation






26. Economy of mechanism






27. Availability






28. Vulnerabilities repositories






29. ISO /IEC 27000:2009






30. Counter measures






31. Least privilege






32. Session Management






33. PCI DSS






34. Technical Controls






35. EALs levels






36. FIPS 201






37. Holistic Security in software






38. Benefits of coding standards






39. Common best practices significant to Sofware Security






40. Phsychological acceptability






41. Non Repudiation






42. Software security risk management methodologies






43. Authentication






44. Accountability






45. Operation Controls






46. Multifactor authentication






47. OWASP testing guide






48. Residual Risk






49. FIPS140-2 (Security requirement for cryptographic modules)






50. Security Policies