Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. After identification step is...






2. Annual Rate of Occurence (ARO)






3. Compartmentalization






4. ISO/IEC 27002:2005






5. Develop hack resilient software






6. Categories of controls






7. Exposure factor (EF)






8. PCI DSS






9. Phsychological acceptability






10. Session Management






11. Implementation challenges






12. DREAD






13. Least privilege






14. Vulnerabilities repositories






15. Core Security Concept






16. OCTAVE






17. Common best practices significant to Sofware Security






18. FIPS140-2 (Security requirement for cryptographic modules)






19. ISO/IEC 27003






20. Technical Controls






21. ISO/IEC 21827:2008






22. Security design principles






23. Clipping level






24. Access Matrix model


25. Confidentiality






26. OWASP Top 10






27. FIPS 197 (Advance Cryptographic standards - AES)






28. Complete mediation






29. Risk management process






30. Configurations Parameters Management






31. STRIDE






32. Single point failure






33. Take-Grant Model






34. Benefits of coding standards






35. NIST standards related to software security






36. General security concept






37. OWASP Code Review Guide






38. Residual Risk






39. Authentication






40. Single Loss Expectancy (SLE)






41. Popular guides developed by OWASP






42. OWASP testing guide






43. Open design






44. Security Risk Management Discipline






45. Multifactor authentication






46. Annual Loss Expectancy (ALE)






47. Examples of Security Standards






48. Operation Controls






49. Vulnerability






50. Counter measures