Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Flaw Hypothesis Method (FHM)






2. ISO/IEC 27003






3. Challenges in implementing auditing/logging






4. Security Controls






5. FIPS 201






6. Popular guides developed by OWASP






7. Develop hack resilient software






8. Take-Grant Model






9. Configurations Parameters Management






10. ISO /IEC 27000:2009






11. General security concept






12. Software security risk management methodologies






13. Multifactor authentication






14. Security profile of a software






15. Residual Risk






16. Non Repudiation






17. Properties of secure software






18. Total Risk






19. Error and exception management






20. STRIDE






21. Confidentiality






22. Complete mediation






23. Clipping level






24. Examples of Security Standards






25. Availability






26. ISO/IEC 27006:2007






27. Vulnerability






28. Single Loss Expectancy (SLE)






29. ISO/IEC 21827:2008






30. Single point failure






31. DREAD






32. Security Policies


33. OWASP development guide






34. ISO/IEC 27001:2005






35. EALs levels






36. Annual Loss Expectancy (ALE)






37. Integrity






38. NIST standards related to software security






39. Economy of mechanism






40. Counter measures






41. Information Security Models






42. Categories of controls






43. ISO/IEC 27002:2005






44. Security Standards






45. OWASP Code Review Guide






46. Authorization






47. Least privilege






48. OWASP Top 10






49. OCTAVE






50. Holistic Security in software