Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Single Loss Expectancy (SLE)






2. Holistic Security in software






3. Security Policies

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


4. Security profile of a software






5. Security Risk Management Discipline






6. After identification step is...






7. Common best practices significant to Sofware Security






8. Annual Loss Expectancy (ALE)






9. Develop hack resilient software






10. Authorization






11. Risk management process






12. Availability






13. Economy of mechanism






14. Information Security Models






15. DREAD






16. Integrity






17. General security concept






18. Least common mechanism






19. FIPS 197 (Advance Cryptographic standards - AES)






20. OWASP development guide






21. Least privilege






22. Popular guides developed by OWASP






23. OWASP testing guide






24. Software security risk management methodologies






25. ISO/IEC 27006:2007






26. ISO/IEC 27002:2005






27. OWASP Code Review Guide






28. Counter measures






29. FIPS 201






30. ISO/IEC 15408






31. ISO /IEC 27000:2009






32. ISO/IEC 27005:2008






33. Open design






34. Compartmentalization






35. Vulnerability






36. OWASP Top 10






37. ISO/IEC 9216






38. ISO/IEC 21827:2008






39. Properties of secure software






40. OCTAVE






41. Authentication






42. Configurations Parameters Management






43. Complete mediation






44. Safeguards






45. Flaw Hypothesis Method (FHM)






46. Auditing






47. PCI DSS






48. Vulnerabilities repositories






49. Operation Controls






50. NIST standards related to software security