Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Security Policies


2. Operation Controls






3. EALs levels






4. Multifactor authentication






5. Holistic Security in software






6. Authorization






7. Security Standards






8. Popular guides developed by OWASP






9. Single point failure






10. Management Controls






11. NIST standards related to software security






12. DREAD






13. Challenges in implementing auditing/logging






14. Risk management process






15. Non Repudiation






16. Session Management






17. Counter measures






18. Safeguards






19. Auditing






20. ISO/IEC 21827:2008






21. Flaw Hypothesis Method (FHM)






22. ISO/IEC 27005:2008






23. Residual Risk






24. Categories of controls






25. Security Controls






26. Configurations Parameters Management






27. After identification step is...






28. Threat






29. FIPS 201






30. Availability






31. Examples of Security Standards






32. FIPS 197 (Advance Cryptographic standards - AES)






33. Develop hack resilient software






34. ISO/IEC 27002:2005






35. General security concept






36. Vulnerabilities repositories






37. OWASP Top 10






38. ISO /IEC 27000:2009






39. Compartmentalization






40. Information Security Models






41. Access Matrix model


42. Exposure factor (EF)






43. OWASP testing guide






44. STRIDE






45. OWASP development guide






46. ISO/IEC 27006:2007






47. OWASP Code Review Guide






48. Benefits of coding standards






49. Vulnerability






50. Open design