Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Benefits of coding standards






2. Operation Controls






3. ISO/IEC 27002:2005






4. Single point failure






5. Clipping level






6. Information Security Models






7. Residual Risk






8. Least privilege






9. ISO/IEC 27006:2007






10. Security design principles






11. Compartmentalization






12. Security profile of a software






13. Software security risk management methodologies






14. Implementation challenges






15. FIPS140-2 (Security requirement for cryptographic modules)






16. ISO/IEC 27003






17. Least common mechanism






18. Security Risk Management Discipline






19. Core Security Concept






20. FIPS 197 (Advance Cryptographic standards - AES)






21. Configurations Parameters Management






22. Take-Grant Model






23. OCTAVE






24. PCI DSS






25. After identification step is...






26. Multifactor authentication






27. EALs levels






28. Popular guides developed by OWASP






29. Annual Rate of Occurence (ARO)






30. OWASP development guide






31. Single Loss Expectancy (SLE)






32. Safeguards






33. Availability






34. ISO /IEC 27000:2009






35. Security Policies


36. Authentication






37. Total Risk






38. Threat






39. Common best practices significant to Sofware Security






40. Counter measures






41. NIST standards related to software security






42. Exposure factor (EF)






43. Economy of mechanism






44. Flaw Hypothesis Method (FHM)






45. Open design






46. Categories of controls






47. Phsychological acceptability






48. Session Management






49. Develop hack resilient software






50. Risk management process