Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Least privilege






2. Software security risk management methodologies






3. Risk management process






4. Total Risk






5. Holistic Security in software






6. Take-Grant Model






7. Annual Rate of Occurence (ARO)






8. Implementation challenges






9. Authentication






10. ISO /IEC 27000:2009






11. Operation Controls






12. Counter measures






13. Non Repudiation






14. Threat






15. Benefits of coding standards






16. General security concept






17. ISO/IEC 9216






18. Access Matrix model

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


19. NIST standards related to software security






20. Residual Risk






21. ISO/IEC 27006:2007






22. Open design






23. OWASP development guide






24. Compartmentalization






25. Session Management






26. Develop hack resilient software






27. Challenges in implementing auditing/logging






28. Annual Loss Expectancy (ALE)






29. OWASP Code Review Guide






30. Single Loss Expectancy (SLE)






31. Popular guides developed by OWASP






32. ISO/IEC 27003






33. Exposure factor (EF)






34. Information Security Models






35. OWASP Top 10






36. Configurations Parameters Management






37. DREAD






38. Error and exception management






39. Auditing






40. Properties of secure software






41. Security profile of a software






42. Confidentiality






43. Vulnerability






44. Security Policies

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


45. Vulnerabilities repositories






46. Categories of controls






47. FIPS140-2 (Security requirement for cryptographic modules)






48. Flaw Hypothesis Method (FHM)






49. Common best practices significant to Sofware Security






50. EALs levels