Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Multifactor authentication






2. Clipping level






3. Error and exception management






4. General security concept






5. Configurations Parameters Management






6. Core Security Concept






7. After identification step is...






8. Software security risk management methodologies






9. Phsychological acceptability






10. Security Risk Management Discipline






11. ISO/IEC 15408






12. OCTAVE






13. ISO/IEC 27005:2008






14. Security design principles






15. PCI DSS






16. ISO/IEC 21827:2008






17. Technical Controls






18. Non Repudiation






19. ISO /IEC 27000:2009






20. Take-Grant Model






21. Counter measures






22. Security Controls






23. Open design






24. Security Standards






25. OWASP Code Review Guide






26. Operation Controls






27. Annual Rate of Occurence (ARO)






28. Examples of Security Standards






29. Implementation challenges






30. Confidentiality






31. Exposure factor (EF)






32. OWASP development guide






33. OWASP testing guide






34. Popular guides developed by OWASP






35. Holistic Security in software






36. Availability






37. ISO/IEC 9216






38. Vulnerabilities repositories






39. FIPS 201






40. Economy of mechanism






41. Challenges in implementing auditing/logging






42. Access Matrix model


43. Safeguards






44. ISO/IEC 27001:2005






45. Flaw Hypothesis Method (FHM)






46. Threat






47. Common best practices significant to Sofware Security






48. Vulnerability






49. NIST standards related to software security






50. Least common mechanism