Skip to content
Equizzing
Home
Quiz Categories
Linux Entry Level LPI Level 1 LPI Level 2 LPI Level 3
Contact

Quiz CISSP

Recent Comments

  1. Jan Dowsky on which type of Layer 2 attack can you intercept traffic …
  2. Joao on Which happens if the swap file of a virtual machine is …
  3. P.C.S.O.R. on What could cause this error?
  4. mur on Which two statements about administrative access to the Cisco Secure ACS SE are true?
  5. rubik on Which GPOs will apply to User2 when the user signs in t…

Quiz CISSP

Quiz CISSP, Certified Information Systems Security Professional (update September 5th,2013)

Which of the following is a true statement pertaining to memory addressing?

Which best describes the simple security rule?

Which best describes the *-integrity axiom?

What type of rating does the Common Criteria give to products?

What type of attack is taking place when a higher-level subject writes data to a storage area and a lower-level subject reads it?

In secure computing systems, why is there a logical form of separation used between processes?

When is the security of a system most effective and economical?

What is the best description of a security kernel from a security point of view?

The trusted computing base (TCB) controls which of the following?

What is the main purpose of implementing and using a guard?

Posts navigation

Previous 1 … 850 851 852 … 989 Next
Equizzing
    Privacy Policy

© 2026 Equizzing