Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ISO/IEC 27003






2. FIPS140-2 (Security requirement for cryptographic modules)






3. Annual Rate of Occurence (ARO)






4. OWASP Top 10






5. Economy of mechanism






6. Compartmentalization






7. Safeguards






8. Flaw Hypothesis Method (FHM)






9. Vulnerabilities repositories






10. Complete mediation






11. Least privilege






12. Management Controls






13. Popular guides developed by OWASP






14. Core Security Concept






15. Risk management process






16. After identification step is...






17. Residual Risk






18. Annual Loss Expectancy (ALE)






19. Technical Controls






20. EALs levels






21. Properties of secure software






22. Phsychological acceptability






23. ISO/IEC 27002:2005






24. ISO /IEC 27000:2009






25. PCI DSS






26. OCTAVE






27. ISO/IEC 27005:2008






28. Single Loss Expectancy (SLE)






29. Security Risk Management Discipline






30. Information Security Models






31. Open design






32. Availability






33. Common best practices significant to Sofware Security






34. Multifactor authentication






35. ISO/IEC 27001:2005






36. Security profile of a software






37. DREAD






38. Authorization






39. Challenges in implementing auditing/logging






40. Non Repudiation






41. Least common mechanism






42. Confidentiality






43. OWASP development guide






44. ISO/IEC 21827:2008






45. Counter measures






46. FIPS 197 (Advance Cryptographic standards - AES)






47. Vulnerability






48. ISO/IEC 27006:2007






49. Exposure factor (EF)






50. Benefits of coding standards