Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. NIST standards related to software security






2. Threat






3. Core Security Concept






4. Counter measures






5. Holistic Security in software






6. Economy of mechanism






7. Phsychological acceptability






8. After identification step is...






9. Develop hack resilient software






10. ISO/IEC 27001:2005






11. Popular guides developed by OWASP






12. OCTAVE






13. Examples of Security Standards






14. Security Controls






15. OWASP testing guide






16. Security Risk Management Discipline






17. STRIDE






18. Complete mediation






19. Availability






20. OWASP development guide






21. Exposure factor (EF)






22. Software security risk management methodologies






23. ISO/IEC 9216






24. Take-Grant Model






25. Total Risk






26. Information Security Models






27. Residual Risk






28. Accountability






29. Security Standards






30. Annual Rate of Occurence (ARO)






31. Compartmentalization






32. Challenges in implementing auditing/logging






33. Auditing






34. Technical Controls






35. Categories of controls






36. DREAD






37. PCI DSS






38. Security Policies


39. Error and exception management






40. Least common mechanism






41. ISO/IEC 21827:2008






42. Clipping level






43. OWASP Code Review Guide






44. Confidentiality






45. Risk management process






46. ISO/IEC 27006:2007






47. ISO/IEC 27002:2005






48. Vulnerabilities repositories






49. Access Matrix model


50. ISO /IEC 27000:2009