CSSLP Domain 5 – Secure Software Testin Flashcards

(26 cards)

1
Q

Question

A

Model Answer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. What is the main purpose of security testing in the SDLC?
A

To ensure that software functions as intended while preventing, detecting, and mitigating vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. What is the difference between functional and non-functional testing?
A

Functional testing verifies software features; non-functional testing checks performance, scalability, and security attributes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. What is the goal of white-box testing?
A

To test internal logic, structure, and code paths with full knowledge of the source code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. What is the goal of black-box testing?
A

To test system behavior and outputs without any knowledge of internal code or structure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. What is gray-box testing?
A

A hybrid approach where testers have partial knowledge of internal workings to simulate insider threats or limited-access attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. What is regression testing?
A

Re-running functional and security tests after code changes to ensure no new vulnerabilities or bugs were introduced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. What is fuzz testing?
A

An automated testing technique that sends large volumes of random or malformed input to detect vulnerabilities or crashes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. What is fault injection testing?
A

Introducing deliberate faults or errors into a system to evaluate how well it handles failures and recovers securely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. What is penetration testing?
A

A simulated attack designed to exploit vulnerabilities and assess the effectiveness of security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. What are the main stages of a penetration test?
A

Reconnaissance, Scanning, Exploitation, and Reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. What is the difference between scanning and penetration testing?
A

Scanning identifies potential vulnerabilities; penetration testing attempts to exploit them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. What is a test harness?
A

A testing framework that defines test data, tools, and configurations used to evaluate software performance and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. What is the OSSTMM?
A

Open Source Security Testing Methodology Manual — a peer-reviewed framework for performing standardized security testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. What is SSE-CMM?
A

Systems Security Engineering Capability Maturity Model — used to assess and improve an organization’s security engineering processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. What are test data management best practices?
A

Avoid using production data, anonymize sensitive information, and protect test data with the same security controls as production data.

17
Q
  1. Why is attack surface validation important?
A

It confirms that all exposed entry points are identified and protected according to design and threat models.

18
Q
  1. What is crypto validation testing?
A

Verification that cryptographic modules and algorithms meet standards such as FIPS 140-3 for secure implementation.

19
Q
  1. What is the purpose of simulation testing?
A

To recreate real-world environments and user conditions for evaluating security, performance, and reliability.

20
Q
  1. How can security defects be prioritized?
A

By using risk scoring models like CVSS (Common Vulnerability Scoring System) that rank vulnerabilities by impact and exploitability.

21
Q
  1. What is the difference between a defect, flaw, and vulnerability?
A

Defect: coding error; Flaw: design weakness; Vulnerability: exploitable condition due to a defect or flaw.

22
Q
  1. What is continuous testing?
A

Automated integration of tests into CI/CD pipelines to detect issues early in the development process.

23
Q
  1. What is a bug bar?
A

A predefined threshold for acceptable levels of security defects before release; defines when a build can pass or fail testing.

24
Q
  1. Why is independent verification and validation (IV&V) important?
A

It ensures unbiased assessment of software security by a third party not involved in development.

25
24. What are common challenges in security testing?
Incomplete threat models, lack of skilled testers, insufficient test coverage, and time/resource constraints.
26
25. What are synthetic transactions?
Simulated user actions used to monitor system performance and detect issues in production-like environments.