Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. OWASP Top 10






2. Annual Loss Expectancy (ALE)






3. FIPS140-2 (Security requirement for cryptographic modules)






4. Benefits of coding standards






5. NIST standards related to software security






6. Clipping level






7. ISO/IEC 27003






8. ISO/IEC 27005:2008






9. Vulnerabilities repositories






10. Authorization






11. Access Matrix model

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


12. Auditing






13. Examples of Security Standards






14. Operation Controls






15. OWASP development guide






16. EALs levels






17. Compartmentalization






18. Threat






19. Software security risk management methodologies






20. ISO/IEC 27006:2007






21. Categories of controls






22. Accountability






23. Authentication






24. Develop hack resilient software






25. Single point failure






26. ISO/IEC 27001:2005






27. Challenges in implementing auditing/logging






28. Information Security Models






29. Non Repudiation






30. Annual Rate of Occurence (ARO)






31. OWASP testing guide






32. Security profile of a software






33. Counter measures






34. Security Controls






35. Core Security Concept






36. Security design principles






37. Risk management process






38. Open design






39. OWASP Code Review Guide






40. Vulnerability






41. Multifactor authentication






42. Integrity






43. Flaw Hypothesis Method (FHM)






44. Security Standards






45. OCTAVE






46. Exposure factor (EF)






47. Residual Risk






48. Session Management






49. Error and exception management






50. Single Loss Expectancy (SLE)