00:20:00

ISC2 CISSP Practice Test

Certified Information Systems Security Professional

Use the form below to configure your ISC2 CISSP Practice Test. The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for ISC2 CISSP
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

ISC2 CISSP Information

The (ISC)² Certified Information Systems Security Professional (CISSP) exam is one of the most widely recognized credentials in the information security field. It covers an extensive body of knowledge related to cybersecurity, including eight domains: Security and Risk Management, Asset Security, Security Architecture and Engineering, Communication and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, and Software Development Security. This broad scope is designed to validate a candidate’s depth and breadth of knowledge in protecting organizations from increasingly complex cyber threats.

Achieving a CISSP certification signals a strong understanding of industry best practices and the ability to design, implement, and manage a comprehensive cybersecurity program. As a result, the exam is often regarded as challenging, requiring both practical experience and intensive study of each domain’s key principles. Many cybersecurity professionals pursue the CISSP to demonstrate their expertise, enhance their credibility, and open doors to higher-level roles such as Security Manager, Security Consultant, or Chief Information Security Officer.

Free ISC2 CISSP Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 20
  • Time: Unlimited
  • Included Topics:
    Security and Risk Management
    Asset Security
    Security Architecture and Engineering
    Communication and Network Security
    Identity and Access Management (IAM)
    Security Assessment and Testing
    Security Operations
    Software Development Security
Question 1 of 20

In the context of secure development operations, what is the PRIMARY purpose of immutable infrastructure?

  • To prevent configuration drift and unauthorized changes

  • To establish verifiable deployment artifacts for compliance audits

  • To ensure consistent security controls across all environments

  • To implement zero-trust architecture principles in cloud environments

Question 2 of 20

Following the containment of a data breach, a root cause analysis has identified the specific vulnerabilities that were exploited. What is the most important next step to prevent a recurrence of this incident?

  • Notify stakeholders of the data breach and the findings of the analysis.

  • Increase monitoring of network activities to detect future anomalies.

  • Conduct a full security audit of all systems to identify other potential issues.

  • Implement security measures to correct the identified vulnerabilities.

Question 3 of 20

A company is implementing new procedures for accessing sensitive financial information. Which of the following practices would best ensure that only authorized personnel can access this data?

  • Conduct access reviews annually to ensure that access rights are still valid.

  • Implement role-based access controls to restrict data access based on job functions.

  • Require users to create complex passwords for accessing the data.

  • Restrict data access to the IT department.

Question 4 of 20

A technology company discovers that a competitor has implemented a similar technical solution that was previously developed and secured by the first company. The legal team wants to pursue the strongest legal remedy based on how the company had originally protected this innovation. What form of intellectual property protection would provide the most robust legal standing for this case?

  • Trademark

  • Trade Secret

  • Patent

  • Copyright

Question 5 of 20

A company experiences a security breach where the attacker accessed multiple systems after initially discovering an unpatched server during a wide-scale internet sweep. This type of cybercrime is best classified as:

  • Opportunistic attack

  • Zero-day exploit

  • Social engineering attack

  • Advanced Persistent Threat

Question 6 of 20

A global organization has engaged multiple hardware support vendors who require periodic access to network infrastructure across several data centers. Which security implementation best addresses both vendor access management and the organization's risk posture?

  • Proxied connections with session recording

  • Dedicated VPN connections with pre-shared keys

  • Just-in-time access control with automated revocation

  • Network segmentation with role-based firewalls

Question 7 of 20

A security architect is designing a solution for a financial transaction system that requires proof of the sender's identity and prevents the sender from denying they sent a message. Which security pillar is the architect primarily addressing?

  • Integrity

  • Confidentiality

  • Nonrepudiation

  • Authenticity

Question 8 of 20

Which of the following best describes the primary purpose of a security sandbox?

  • A production testing area where developers debug application code before deployment

  • A tool for scanning network traffic to identify known malware signatures

  • An isolated environment to run and analyze untrusted code without risking production systems

  • A decoy system designed to attract hackers away from legitimate resources

Question 9 of 20

A software development team at a financial services company is building a new customer portal. During a code review, a security architect notices that the developers are using string formatting to construct database queries with data from user-submitted web forms. The architect is concerned about the risk of SQL injection. Which of the following recommendations would be the MOST effective and robust long-term solution to mitigate this specific vulnerability class in the application?

  • Secure logging

  • Parameterized queries

  • Input sanitization

  • Error handling

Question 10 of 20

Which approach is most effective for identifying potentially malicious activities using behavioral analysis?

  • Monitoring user input patterns without context

  • Establishing a baseline of regular user activity to identify deviations

  • Collecting data on user actions after an incident occurs

  • Using historical access logs to track user activities

Question 11 of 20

What is a key advantage of implementing a system that allows for access to numerous services based on a single login session?

  • It generates separate authentication tokens for each service to improve security management.

  • It encourages users to change their passwords regularly to enhance security across services.

  • It reduces the need for strong passwords by requiring authentication once.

  • It simplifies the login process, allowing users to access various services with fewer required logins.

Question 12 of 20

What is the best approach to effectively manage the inventory of an organization's resources?

  • Record physical assets during periodic inventory checks and include digital assets.

  • Focus on managing intangible assets and consider physical resources.

  • Utilize automated tools for tracking acquisitions, encompassing recent and existing assets.

  • Implement a strategy that involves documenting physical and information assets, then conduct regular audits to ensure accuracy across different asset types.

Question 13 of 20

A financial services firm is conducting a full-interruption disaster recovery test, simulating a complete failure of its primary data center. This outage includes the company's internal email servers. The CISO needs to ensure the geographically distributed technical recovery team can coordinate actions and receive immediate updates on system restoration progress. Which communication method would BEST support the real-time needs of the recovery team during this test?

  • Utilize a pre-configured, out-of-band, cloud-based group messaging channel.

  • Create a restricted-access group on a public social media platform.

  • Rely on individual SMS messages between the team lead and each member for updates.

  • Establish a continuous conference call bridge for all team members for the test duration.

Question 14 of 20

What term refers to the process of assigning categories to data based on its level of sensitivity and the impact to the organization if that data is disclosed or compromised?

  • Data encoding

  • Data mapping

  • Data classification

Question 15 of 20

What is the MOST appropriate strategy for managing the security risks of end-of-life software that can no longer be updated or patched?

  • Implementing additional security controls to isolate and protect the vulnerable software

  • Replacing the software with a supported alternative

  • Continuing to use the software without changes

  • Hiring developers to create custom patches for the software

Question 16 of 20

What is the MOST secure method for managing third-party libraries and dependencies in a software development project?

  • Using a private repository manager with vulnerability scanning and version control

  • Allowing developers to manually download and commit libraries to the project

  • Downloading libraries directly from vendor repositories to a private developer repository

  • Copying all required libraries from the vendor repository into the project's source code repository before beginning a new build

Question 17 of 20

A global financial organization is experiencing difficulties with their current logging and monitoring solution. The security team spends excessive time manually correlating security events from multiple sources, resulting in delayed incident detection. The CISO wants to implement a solution that provides real-time analysis capabilities and centralizes all security data. Which of the following solutions would best address these requirements?

  • User and Entity Behavior Analytics (UEBA)

  • Intrusion Detection System (IDS)

  • Security Information and Event Management (SIEM)

  • Log Management tool

Question 18 of 20

As part of a new customer-facing web application, a development team has incorporated dozens of open-source libraries drawn from public repositories. The security manager must ensure these third-party components remain secure throughout the system's life cycle despite limited resources. Which action BEST satisfies this requirement within modern secure-development best practices?

  • Implementing a software composition analysis process with ongoing vulnerability monitoring

  • Forking all open-source components and maintaining them internally

  • Using only open-source libraries that have been extensively peer-reviewed

  • Avoiding the use of all open-source software

Question 19 of 20

What is the most effective approach to ensure data remains secure while being transferred between systems?

  • Apply data masking techniques to obscure data

  • Implement just-in-time network access

  • Enable strict network subnetting

  • Implement encryption to secure the data being sent over the network

Question 20 of 20

A development team is implementing secure coding practices. Which of the following represents the MOST serious security flaw that should be addressed immediately?

  • Using HTTP instead of HTTPS for the application's admin portal

  • Lack of proper error handling in a file upload feature

  • Hard-coded credentials in the application source code

  • Insufficient input validation on a user registration form