/* */

Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Develop hack resilient software






2. ISO/IEC 27002:2005






3. Popular guides developed by OWASP






4. Technical Controls






5. Accountability






6. Authorization






7. Annual Loss Expectancy (ALE)






8. Categories of controls






9. OWASP testing guide






10. Availability






11. ISO/IEC 15408






12. Risk management process






13. Annual Rate of Occurence (ARO)






14. Safeguards






15. Security Risk Management Discipline






16. ISO/IEC 27005:2008






17. STRIDE






18. PCI DSS






19. Core Security Concept






20. Security profile of a software






21. Implementation challenges






22. Challenges in implementing auditing/logging






23. Access Matrix model


24. Benefits of coding standards






25. DREAD






26. Single Loss Expectancy (SLE)






27. OWASP Top 10






28. Economy of mechanism






29. Session Management






30. OCTAVE






31. Vulnerabilities repositories






32. Configurations Parameters Management






33. Single point failure






34. ISO /IEC 27000:2009






35. Threat






36. Auditing






37. Examples of Security Standards






38. ISO/IEC 9216






39. Least common mechanism






40. OWASP Code Review Guide






41. Properties of secure software






42. ISO/IEC 27001:2005






43. NIST standards related to software security






44. Holistic Security in software






45. General security concept






46. Total Risk






47. Common best practices significant to Sofware Security






48. Counter measures






49. Phsychological acceptability






50. Confidentiality






//