Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. EALs levels






2. Availability






3. Compartmentalization






4. NIST standards related to software security






5. OWASP testing guide






6. Open design






7. Information Security Models






8. OWASP Top 10






9. Develop hack resilient software






10. Implementation challenges






11. Configurations Parameters Management






12. Security profile of a software






13. Least privilege






14. FIPS 197 (Advance Cryptographic standards - AES)






15. After identification step is...






16. ISO/IEC 27005:2008






17. ISO/IEC 27003






18. FIPS 201






19. Vulnerability






20. DREAD






21. Vulnerabilities repositories






22. Security Standards






23. Multifactor authentication






24. Exposure factor (EF)






25. Risk management process






26. ISO/IEC 21827:2008






27. Session Management






28. Least common mechanism






29. Security Risk Management Discipline






30. ISO/IEC 27006:2007






31. Core Security Concept






32. Total Risk






33. ISO/IEC 15408






34. Integrity






35. OWASP Code Review Guide






36. Holistic Security in software






37. Flaw Hypothesis Method (FHM)






38. Examples of Security Standards






39. Single point failure






40. ISO /IEC 27000:2009






41. PCI DSS






42. Counter measures






43. Error and exception management






44. Benefits of coding standards






45. STRIDE






46. Threat






47. ISO/IEC 27002:2005






48. Properties of secure software






49. Residual Risk






50. OWASP development guide