/* */

Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Availability






2. Core Security Concept






3. Risk management process






4. Integrity






5. Error and exception management






6. Vulnerability






7. FIPS 201






8. Security Policies


9. Management Controls






10. Single Loss Expectancy (SLE)






11. OWASP development guide






12. Software security risk management methodologies






13. OWASP Top 10






14. Examples of Security Standards






15. Exposure factor (EF)






16. After identification step is...






17. ISO/IEC 9216






18. Residual Risk






19. Security Controls






20. Threat






21. Security design principles






22. Least privilege






23. Auditing






24. Configurations Parameters Management






25. Total Risk






26. Security Standards






27. Vulnerabilities repositories






28. OWASP testing guide






29. Technical Controls






30. Authorization






31. Session Management






32. Non Repudiation






33. OWASP Code Review Guide






34. Properties of secure software






35. Authentication






36. Flaw Hypothesis Method (FHM)






37. Single point failure






38. Access Matrix model


39. STRIDE






40. Annual Loss Expectancy (ALE)






41. Open design






42. Confidentiality






43. ISO/IEC 21827:2008






44. ISO/IEC 15408






45. Least common mechanism






46. OCTAVE






47. Security Risk Management Discipline






48. Counter measures






49. Compartmentalization






50. Develop hack resilient software






//