Match SQL injection, buffer overflow, XSS, DevSecOps, OWASP Top 10, Secure SDLC, and API gateways.
Drag & Match 🔄Sort 35 characteristics into the right SDLC model: Agile, Scrum, Waterfall, Spiral, V-Model, Iterative, and RAD.
Categorize 📋Drag all 7 ISC2 CBK phases into the correct order, master V&V vs Accreditation, and tackle a 10-question CISSP drill.
Drag & Drop ⚖️Sort 12 real-world scenarios into Verification, Validation, Certification, or Accreditation/ATO. 3 lives, instant feedback, touch support.
Drag & DropMatch CMMI levels 1–5 to their definitions. Repeatable = memory (not docs). Defined = documented, standardized. A classic exam trap.
Drag & Match 🎯What's in scope? What's out? ISC2 vs ISACA perspectives. Threat modeling is NOT bug fixing. 5 scenario-based CISSP questions.
MCQ Quiz