Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Security design principles






2. Economy of mechanism






3. Security profile of a software






4. Popular guides developed by OWASP






5. OWASP development guide






6. Phsychological acceptability






7. OWASP Top 10






8. Operation Controls






9. After identification step is...






10. Authentication






11. ISO/IEC 27002:2005






12. ISO/IEC 27001:2005






13. Least privilege






14. ISO/IEC 21827:2008






15. FIPS 197 (Advance Cryptographic standards - AES)






16. Vulnerabilities repositories






17. ISO /IEC 27000:2009






18. Multifactor authentication






19. Challenges in implementing auditing/logging






20. Categories of controls






21. Residual Risk






22. Information Security Models






23. ISO/IEC 27003






24. Configurations Parameters Management






25. Risk management process






26. Integrity






27. Auditing






28. FIPS140-2 (Security requirement for cryptographic modules)






29. Access Matrix model


30. Software security risk management methodologies






31. Single Loss Expectancy (SLE)






32. Properties of secure software






33. Confidentiality






34. Examples of Security Standards






35. Benefits of coding standards






36. OWASP Code Review Guide






37. EALs levels






38. Security Controls






39. Threat






40. Counter measures






41. Implementation challenges






42. DREAD






43. ISO/IEC 9216






44. Accountability






45. Error and exception management






46. Core Security Concept






47. Availability






48. General security concept






49. Exposure factor (EF)






50. Security Policies