Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Authentication






2. Configurations Parameters Management






3. Benefits of coding standards






4. Single Loss Expectancy (SLE)






5. NIST standards related to software security






6. Total Risk






7. ISO/IEC 27002:2005






8. Session Management






9. Security Controls






10. Error and exception management






11. Common best practices significant to Sofware Security






12. Vulnerabilities repositories






13. PCI DSS






14. DREAD






15. ISO/IEC 27003






16. Residual Risk






17. Software security risk management methodologies






18. Annual Loss Expectancy (ALE)






19. Core Security Concept






20. Examples of Security Standards






21. OWASP development guide






22. Holistic Security in software






23. Properties of secure software






24. Safeguards






25. Open design






26. Popular guides developed by OWASP






27. Develop hack resilient software






28. Exposure factor (EF)






29. EALs levels






30. Flaw Hypothesis Method (FHM)






31. ISO/IEC 27006:2007






32. OWASP testing guide






33. FIPS140-2 (Security requirement for cryptographic modules)






34. OCTAVE






35. Accountability






36. Availability






37. Annual Rate of Occurence (ARO)






38. General security concept






39. Phsychological acceptability






40. OWASP Top 10






41. ISO/IEC 21827:2008






42. Management Controls






43. Counter measures






44. Security design principles






45. ISO /IEC 27000:2009






46. After identification step is...






47. OWASP Code Review Guide






48. Security Risk Management Discipline






49. Challenges in implementing auditing/logging






50. Threat