Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Least common mechanism






2. OWASP Code Review Guide






3. OCTAVE






4. Clipping level






5. Common best practices significant to Sofware Security






6. FIPS 201






7. Compartmentalization






8. Accountability






9. Configurations Parameters Management






10. ISO/IEC 9216






11. Authentication






12. Holistic Security in software






13. Total Risk






14. Popular guides developed by OWASP






15. Core Security Concept






16. Least privilege






17. Take-Grant Model






18. Single Loss Expectancy (SLE)






19. OWASP Top 10






20. Annual Rate of Occurence (ARO)






21. ISO/IEC 27002:2005






22. EALs levels






23. Phsychological acceptability






24. General security concept






25. Multifactor authentication






26. Residual Risk






27. Technical Controls






28. Management Controls






29. Software security risk management methodologies






30. OWASP testing guide






31. Develop hack resilient software






32. Auditing






33. Vulnerability






34. Confidentiality






35. Authorization






36. Access Matrix model


37. Security Controls






38. Safeguards






39. Security Policies


40. Single point failure






41. Session Management






42. Flaw Hypothesis Method (FHM)






43. Challenges in implementing auditing/logging






44. Exposure factor (EF)






45. ISO /IEC 27000:2009






46. ISO/IEC 27005:2008






47. ISO/IEC 27001:2005






48. FIPS140-2 (Security requirement for cryptographic modules)






49. Integrity






50. Error and exception management