Test your basic knowledge |

CSSLP: Certified Secure Software Lifecycle Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Phsychological acceptability






2. Security design principles






3. Open design






4. Annual Rate of Occurence (ARO)






5. Benefits of coding standards






6. Security Standards






7. Single Loss Expectancy (SLE)






8. Management Controls






9. Complete mediation






10. Clipping level






11. Authorization






12. Auditing






13. Total Risk






14. Single point failure






15. NIST standards related to software security






16. Vulnerabilities repositories






17. Vulnerability






18. After identification step is...






19. DREAD






20. ISO/IEC 27005:2008






21. STRIDE






22. Least privilege






23. ISO /IEC 27000:2009






24. Compartmentalization






25. Take-Grant Model






26. OWASP Top 10






27. ISO/IEC 27006:2007






28. Security Controls






29. Integrity






30. OWASP Code Review Guide






31. Security Risk Management Discipline






32. Properties of secure software






33. Operation Controls






34. Challenges in implementing auditing/logging






35. ISO/IEC 21827:2008






36. Holistic Security in software






37. General security concept






38. OWASP development guide






39. Non Repudiation






40. FIPS 197 (Advance Cryptographic standards - AES)






41. Flaw Hypothesis Method (FHM)






42. Software security risk management methodologies






43. Common best practices significant to Sofware Security






44. Security profile of a software






45. Develop hack resilient software






46. Threat






47. ISO/IEC 9216






48. Accountability






49. FIPS140-2 (Security requirement for cryptographic modules)






50. Exposure factor (EF)