00:20:00

ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Test

Use the form below to configure your ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Test. The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Information

What is the CSSLP Certification

The Certified Secure Software Lifecycle Professional (CSSLP) from ISC2 validates that a software professional can integrate security best practices into every phase of the development life cycle. While many security credentials focus on infrastructure or operations, CSSLP zeroes in on building security in from the first requirements workshop through retirement of an application. Holding the certification signals to employers and customers that you can help reduce vulnerabilities, meet compliance mandates, and ultimately ship more resilient software.

How the Exam Is Structured

The current CSSLP exam is a computer-based test containing 125 multiple-choice questions delivered over a three-hour session. A scaled score of 700 out of 1,000 is required to pass. Content is distributed across eight domains that mirror the secure software development life cycle: 1) Secure Software Concepts, 2) Secure Software Requirements, 3) Secure Software Architecture & Design, 4) Secure Software Implementation, 5) Secure Software Testing, 6) Secure Lifecycle Management, 7) Secure Software Deployment, Operations & Maintenance, and 8) Secure Software Supply Chain. Because any topic in these domains is fair game, candidates need both breadth and depth of knowledge across process models, threat modeling, secure coding, DevSecOps pipelines, and supply-chain risk management.

The Power of Practice Exams

One of the most effective ways to close a knowledge gap and build exam-day confidence is to take high-quality practice exams. Timed drills acclimate you to the three-hour pacing and help you learn how long you can spend on each question before moving on. Equally important, comprehensive explanations (not just answer keys) reveal why a particular choice is correct, which deepens conceptual understanding and highlights recurring exam patterns. Aim to review every explanation—even the questions you answer correctly—to reinforce core principles and discover alternate ways a concept can be tested. Track scores over multiple attempts; trending upward is a reliable indicator that your study plan is working.

Preparation Tips

Begin your study schedule at least eight to twelve weeks out, mapping the official ISC2 exam outline to specific learning resources such as the (ISC)² CSSLP CBK, OWASP documentation, and language-specific secure-coding references. After you’ve covered each domain, fold in practice exams and use their analytics to guide targeted review sessions. In the final two weeks, simulate the exam environment: mute notifications, sit for a full three-hour block, and practice reading every question twice before locking in an answer. Coupled with real-world experience and a disciplined study routine, these strategies position you to walk into the testing center—and out with the CSSLP credential—on your first attempt.

ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Logo
  • Free ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Test

  • 20 Questions
  • Unlimited time
  • Secure Software Concepts
    Secure Software Lifecycle Management
    Secure Software Requirements
    Secure Software Architecture and Design
    Secure Software Implementation
    Secure Software Testing
    Secure Software Deployment, Operations, Maintenance
    Secure Software Supply Chain
Question 1 of 20

During an Agile project retrospective, the secure software lead is asked to redesign the organization's security-awareness program so that it meets role-based training expectations. Which approach most effectively fulfills the requirement to provide role-appropriate security training for developers, testers, and project managers?

  • Email the organization's secure coding standard to all staff and ask them to acknowledge that they have read it.

  • Require every team member to earn the same external penetration-testing certification regardless of their job function.

  • Create separate curricula that link security learning objectives to each role's tasks-for example, secure coding labs for developers, vulnerability test-case workshops for testers, and risk-based planning sessions for project managers.

  • Hold one annual, company-wide presentation on general security topics such as password hygiene and phishing, with no differentiation among roles.

Question 2 of 20

During contract negotiations for a cloud-hosted authentication service, your organization insists that the provider stream security logs to your SIEM and apply critical security patches within an agreed period. Which contractual instrument is BEST suited to formalize and enforce these ongoing monitoring and vulnerability-response requirements?

  • A non-disclosure agreement outlining confidentiality and proprietary information handling

  • An intellectual-property assignment transferring ownership of custom-developed code

  • A code-escrow clause ensuring release of source code if the supplier becomes insolvent

  • A service-level agreement that specifies log delivery formats, frequency, and remediation timelines

Question 3 of 20

During security testing of a payment microservice in a staging cluster, you must confirm that the service fails safely if its hardware security module (HSM) suddenly becomes unreachable. Which testing action represents a targeted fault-injection test aimed at exercising this specific failure mode?

  • Launch a high-volume set of random, malformed TLS handshake messages at the microservice to see how it handles unexpected input.

  • Perform a static code review to look for unhandled exceptions around every HSM API invocation.

  • Intercept the microservice's calls to the HSM and programmatically force each request to time out before a response is returned.

  • Shut down the microservice's network interface card to observe how it behaves when all outbound traffic is blocked.

Question 4 of 20

During a quarterly review, a development manager asks for a single metric that shows how quickly the team fixes vulnerabilities identified by automated security scans in the CI/CD pipeline. Which metric will most directly satisfy this request and enable tracking of improvement over time?

  • Vulnerability density per thousand lines of code

  • Number of security champions assigned per scrum team

  • Percentage of code covered by unit tests

  • Mean Time to Remediate (MTTR) vulnerabilities

Question 5 of 20

During planning for a new application that will be developed using a sequential Waterfall model, the security lead decides to add one security activity to each phase. Which activity is correctly matched to its Waterfall phase?

  • Conducting penetration testing during the design phase

  • Running static application security testing (SAST) during the implementation/coding phase

  • Defining security requirements during the coding/implementation phase

  • Performing threat modeling during the verification/testing phase

Question 6 of 20

While designing firmware updates for smart door locks in a corporate campus, you must ensure the locks are fail safe. If the update process crashes mid-way, which behavior best embodies the fail-safe principle?

  • The lock disables all authentication checks and accepts any remote open command for troubleshooting.

  • The lock automatically unlocks so occupants and technicians can enter and fix the issue.

  • The lock stays locked and can be opened only with a physical master key until the firmware is successfully restored.

  • The lock reboots every minute and retries the update, temporarily disabling normal lock functions.

Question 7 of 20

During an architecture review of a ride-sharing mobile app, you notice the client uploads raw GPS coordinates every five seconds, even when running in the background, to pre-match available rides. Which architectural change most effectively mitigates privacy risks associated with this implicit data collection while still allowing the feature to function?

  • Perform on-device processing of GPS data and send only coarse, tokenized area identifiers needed for ride matching.

  • Increase retention of uploaded location records to 90 days to support analytics and fraud investigations.

  • Route location uploads through a separate, dedicated API gateway isolated from other services.

  • Protect the GPS payload with TLS 1.3 encryption during transmission to the backend.

Question 8 of 20

During vendor due diligence for incorporating open-source libraries, you must reference an internationally recognized standard that defines requirements for an open-source license compliance program within the software supply chain. Which ISO/IEC standard should you cite?

  • ISO/IEC 5230 OpenChain Specification

  • ISO/IEC 27034 Application Security

  • ISO/IEC 27036-4 ICT Supply Chain Security

  • ISO/IEC 12207 Software Life-Cycle Processes

Question 9 of 20

A development team is building an online banking API that must decide at run-time whether a user may transfer money between two accounts. The decision depends on current balances, daily limits, account ownership, and in-memory fraud flags. Which implementation best illustrates an imperative (programmatic) security approach for this need?

  • Set container securityContext fields to restrict network egress to the banking core and rely on the platform to block unauthorized calls.

  • Attach a pre-defined cloud IAM role to the container so only principals with that role can invoke any API endpoint.

  • Define allowed source and destination account pairs in a YAML policy file that the API gateway enforces at deployment time.

  • Write a validation routine inside the transferFunds() method that checks the requester's role, account ownership, real-time balances, and fraud flags before executing the transaction.

Question 10 of 20

Your DevOps team is retiring a cloud-hosted microservice that stored protected health information (PHI) on provider-managed, hardware-encrypted SSD volumes. Because you cannot physically access or degauss the drives, you must satisfy NIST SP 800-88 purge requirements to ensure the data is permanently unrecoverable. Which destruction technique is most appropriate in this situation?

  • Degauss the underlying storage media to eliminate residual magnetism.

  • Delete the application files and empty the operating system's recycle bin.

  • Issue a cryptographic erase that destroys the drive's encryption keys, rendering all stored data unreadable.

  • Overwrite the entire volume once with zeros using a disk utility such as dd.

Question 11 of 20

While hardening its CI/CD pipeline, a DevSecOps team decides to add a runtime control that can detect and block cross-site scripting attempts as they arrive from external clients. Which mechanism directly fulfills this requirement?

  • Sign each container image and verify the signature prior to deployment.

  • Deploy a cloud-based Web Application Firewall in front of the application to filter HTTP requests in real time.

  • Perform software composition analysis to identify vulnerable third-party libraries before packaging.

  • Run static application security testing on the codebase during the build phase.

Question 12 of 20

Your organization runs a containerized web application on a managed Kubernetes cluster. To strengthen continuous monitoring, you must configure security telemetry sent to the SIEM so that attempted runtime privilege-escalation inside any container is detected as soon as it happens. Which data source should you prioritize forwarding?

  • Application access logs produced by the web servers in each container

  • Virtual network flow logs captured from the cluster's network interfaces

  • Kernel-level system call events collected by a container runtime or eBPF sensor

  • Scheduled configuration snapshots exported from the Kubernetes API server

Question 13 of 20

During a security assessment of an internally developed RESTful microservice, you suspect there are API endpoints not included in the official design documentation. What test activity would be most effective for uncovering this undocumented functionality before production release?

  • Conduct black-box fuzzing that mutates URL paths and HTTP verbs to enumerate undisclosed endpoints

  • Execute unit tests derived from user story acceptance criteria

  • Run stress testing with production-like load to measure service scalability

  • Perform static analysis of source code to identify insecure cryptographic implementations

Question 14 of 20

While planning security for a new tele-medicine platform, the lead architect requests a threat-modeling approach that is explicitly risk-centric, walks through seven ordered stages from defining business objectives to selecting countermeasures, and incorporates attack simulation to quantify likelihood. Which methodology best fits these criteria?

  • Process for Attack Simulation and Threat Analysis (PASTA)

  • Common Vulnerability Scoring System (CVSS)

  • STRIDE

  • Security Content Automation Protocol (SCAP)

Question 15 of 20

A developer is updating an e-commerce site to display customer-supplied product reviews in an HTML template. The reviews are saved in the database without modification. To stop attackers from injecting malicious scripts that execute in shoppers' browsers, which control should the developer add to the presentation layer?

  • Obfuscate the site's JavaScript files with a packer during the build process.

  • Require multi-factor authentication for users who submit reviews.

  • Reject any review whose length exceeds a predefined maximum.

  • Apply HTML entity encoding to the review text immediately before it is written to the page.

Question 16 of 20

Your organization is deploying a new SIEM that will ingest security event data in near real-time from application servers located in branch offices connected over the public Internet. To prevent both eavesdropping on the log contents and the insertion of forged log messages while they are in transit, which log-transfer design should you recommend?

  • Send standard UDP syslog on port 514 across a dedicated management VLAN to limit exposure.

  • Use RFC 5425 syslog over TLS with mutual certificate authentication between every server and the SIEM.

  • Attach an HMAC to each log entry but forward them over unencrypted TCP to minimize overhead.

  • Batch log files hourly, compress them, and upload via FTP over an IP-whitelisted channel to the SIEM.

Question 17 of 20

Your team must share user activity logs with a third-party analytics vendor. To reduce privacy risk while still allowing regulators to trace events back to individuals if necessary, the security architect proposes pseudonymizing the user IDs. Which requirement below best satisfies the definition of pseudonymization in this context?

  • Replace each user ID with a random unique token and store the mapping table in an encrypted repository accessible only to a small, authorized team.

  • Hash each user ID with a random salt and permanently delete the salt before sharing the data set.

  • Mask each user ID by showing only the last four characters to the analytics vendor.

  • Encrypt the entire log file with AES-256 and keep the encryption key in the same cloud account as the data.

Question 18 of 20

Your organization plans to adopt the OWASP Software Assurance Maturity Model (SAMM) to guide improvements to its secure software development process. According to SAMM's recommended rollout approach, which activity should the team perform first before setting any security objectives or defining an improvement roadmap?

  • Perform a baseline self-assessment to measure current maturity against SAMM security practices

  • Launch mandatory secure coding training for all development staff across the organization

  • Introduce a public bug-bounty program to discover previously unknown vulnerabilities

  • Deploy automated static application security testing (SAST) in every continuous integration pipeline

Question 19 of 20

During sprint planning, a development team wants to pull several open-source libraries from a public repository to speed delivery of a payment module. Based on SAFECode software assurance best-practice guidance, which approach most effectively reduces the risk of introducing insecure or malicious third-party components?

  • Pin each dependency to a specific version in the build script so the code base never changes without explicit developer action.

  • Select only the most downloaded libraries in the repository, assuming high adoption indicates stronger community vetting.

  • Scan every candidate library for known vulnerabilities and maintain ongoing monitoring and re-assessment as part of the project's secure supply-chain process.

  • Require that all third-party libraries carry an open-source license so their source code can be inspected if problems arise.

Question 20 of 20

Your development team is drafting requirements for a new analytics microservice that will replicate EU customer profiles to a cloud region in Singapore. Which requirement best addresses cross-border privacy obligations that apply to this data movement?

  • Conclude Standard Contractual Clauses with the cloud host before exporting personal data.

  • Store the replica as compressed, read-only snapshots retained for five years.

  • Encrypt replicated tables with AES-256 and manage keys in a hardware security module.

  • Send replication traffic over a private dedicated inter-region link controlled by the CSP.