/* */

Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Residual Risk






2. STRIDE






3. Non Repudiation






4. Session Management






5. Develop hack resilient software






6. Phsychological acceptability






7. Operation Controls






8. DREAD






9. Vulnerabilities repositories






10. ISO/IEC 27003






11. Access Matrix model


12. Auditing






13. Take-Grant Model






14. Total Risk






15. OWASP development guide






16. OWASP testing guide






17. Implementation challenges






18. Vulnerability






19. ISO/IEC 15408






20. General security concept






21. Safeguards






22. Accountability






23. Properties of secure software






24. ISO/IEC 27006:2007






25. Examples of Security Standards






26. EALs levels






27. Categories of controls






28. Flaw Hypothesis Method (FHM)






29. Security Risk Management Discipline






30. ISO/IEC 27005:2008






31. Counter measures






32. NIST standards related to software security






33. Annual Rate of Occurence (ARO)






34. Least privilege






35. FIPS 197 (Advance Cryptographic standards - AES)






36. Error and exception management






37. ISO/IEC 27002:2005






38. OWASP Top 10






39. Popular guides developed by OWASP






40. Software security risk management methodologies






41. Open design






42. Economy of mechanism






43. Least common mechanism






44. Information Security Models






45. Confidentiality






46. Authentication






47. Authorization






48. Availability






49. Core Security Concept






50. Exposure factor (EF)






//