Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. STRIDE






2. Properties of secure software






3. Availability






4. Error and exception management






5. Authorization






6. Access Matrix model


7. Clipping level






8. ISO/IEC 27005:2008






9. Accountability






10. ISO/IEC 21827:2008






11. Develop hack resilient software






12. Counter measures






13. Risk management process






14. Vulnerability






15. OWASP Code Review Guide






16. Integrity






17. Safeguards






18. Management Controls






19. OWASP Top 10






20. ISO/IEC 9216






21. Economy of mechanism






22. OWASP testing guide






23. Annual Rate of Occurence (ARO)






24. Take-Grant Model






25. Single Loss Expectancy (SLE)






26. Non Repudiation






27. Information Security Models






28. Categories of controls






29. FIPS 201






30. EALs levels






31. Open design






32. Phsychological acceptability






33. Exposure factor (EF)






34. Authentication






35. Vulnerabilities repositories






36. Residual Risk






37. Complete mediation






38. Holistic Security in software






39. Security design principles






40. NIST standards related to software security






41. Security Controls






42. Operation Controls






43. General security concept






44. Examples of Security Standards






45. Software security risk management methodologies






46. Threat






47. ISO/IEC 15408






48. Annual Loss Expectancy (ALE)






49. Common best practices significant to Sofware Security






50. Total Risk