Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Open design






2. ISO/IEC 27002:2005






3. Common best practices significant to Sofware Security






4. Compartmentalization






5. Non Repudiation






6. Clipping level






7. ISO/IEC 21827:2008






8. Security Standards






9. EALs levels






10. ISO/IEC 27001:2005






11. Multifactor authentication






12. Session Management






13. Holistic Security in software






14. After identification step is...






15. Accountability






16. OWASP testing guide






17. ISO /IEC 27000:2009






18. Access Matrix model

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


19. Exposure factor (EF)






20. General security concept






21. Phsychological acceptability






22. Security Policies

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


23. Residual Risk






24. Challenges in implementing auditing/logging






25. Benefits of coding standards






26. PCI DSS






27. Authorization






28. OCTAVE






29. Implementation challenges






30. Risk management process






31. Properties of secure software






32. Vulnerabilities repositories






33. Security Risk Management Discipline






34. ISO/IEC 27006:2007






35. Develop hack resilient software






36. Operation Controls






37. Annual Rate of Occurence (ARO)






38. Least common mechanism






39. Threat






40. Take-Grant Model






41. OWASP Top 10






42. Vulnerability






43. OWASP Code Review Guide






44. Core Security Concept






45. Authentication






46. Management Controls






47. Safeguards






48. NIST standards related to software security






49. FIPS 197 (Advance Cryptographic standards - AES)






50. Flaw Hypothesis Method (FHM)