Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ISO/IEC 27002:2005






2. Least common mechanism






3. Session Management






4. Security Controls






5. Software security risk management methodologies






6. Complete mediation






7. Properties of secure software






8. Auditing






9. Compartmentalization






10. Take-Grant Model






11. Annual Loss Expectancy (ALE)






12. Single Loss Expectancy (SLE)






13. Configurations Parameters Management






14. After identification step is...






15. Operation Controls






16. Common best practices significant to Sofware Security






17. Open design






18. Accountability






19. Least privilege






20. ISO/IEC 9216






21. Availability






22. OWASP development guide






23. EALs levels






24. Multifactor authentication






25. Integrity






26. Error and exception management






27. Access Matrix model


28. FIPS 201






29. Vulnerabilities repositories






30. Phsychological acceptability






31. FIPS140-2 (Security requirement for cryptographic modules)






32. Counter measures






33. Confidentiality






34. Non Repudiation






35. ISO/IEC 21827:2008






36. DREAD






37. ISO/IEC 27006:2007






38. Security Policies


39. Clipping level






40. General security concept






41. ISO /IEC 27000:2009






42. FIPS 197 (Advance Cryptographic standards - AES)






43. Technical Controls






44. ISO/IEC 27001:2005






45. Information Security Models






46. STRIDE






47. OWASP Top 10






48. Authentication






49. Risk management process






50. Exposure factor (EF)