CSSLP 2025 PREP – DOMAIN 5 – SECURE
SOFTWARE TESTING QUESTIONS AND
ANSWERS
1. Testing different versions of an application to verify patches don't break
something is referred to as what?
A. Penetration testing
B. Simulation testing
C. Fuzz testing
D. Regression testing - ANSWER D. Regression testing is used to ensure
patches don't break different versions of an application.
2. What is testing an application in an environment that mirrors the production
environment called?
A. Simulation testing
B. Fuzz testing
C. Scanning
, D. Penetration testing - ANSWER A. Simulation testing mimics the
production environment.
3. What all does not comes under cryptographic function testing?
A. Using of secret encryption methodologies
B. Key distribution
C. Cryptographic algorithm
D. Proper Generation of random numbers - ANSWER A. Secret encryption
methodologies are not part of cryptographic testing
4. What is the automated counted pert of particular attributes of any applications
and a network?
A. Penetration testing
B. Scanning
C. Fuzz testing
D. Simulation testing - ANSWER B. Scanning can be used to automate the
enumeration of system elements.
5. To test a system for input validation errors what type of test will be most
extensive?
A. Scanning
B. Penetration testing
SOFTWARE TESTING QUESTIONS AND
ANSWERS
1. Testing different versions of an application to verify patches don't break
something is referred to as what?
A. Penetration testing
B. Simulation testing
C. Fuzz testing
D. Regression testing - ANSWER D. Regression testing is used to ensure
patches don't break different versions of an application.
2. What is testing an application in an environment that mirrors the production
environment called?
A. Simulation testing
B. Fuzz testing
C. Scanning
, D. Penetration testing - ANSWER A. Simulation testing mimics the
production environment.
3. What all does not comes under cryptographic function testing?
A. Using of secret encryption methodologies
B. Key distribution
C. Cryptographic algorithm
D. Proper Generation of random numbers - ANSWER A. Secret encryption
methodologies are not part of cryptographic testing
4. What is the automated counted pert of particular attributes of any applications
and a network?
A. Penetration testing
B. Scanning
C. Fuzz testing
D. Simulation testing - ANSWER B. Scanning can be used to automate the
enumeration of system elements.
5. To test a system for input validation errors what type of test will be most
extensive?
A. Scanning
B. Penetration testing