00:20:00

ISC2 CISSP Practice Test

Certified Information Systems Security Professional

Use the form below to configure your ISC2 CISSP Practice Test. The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for ISC2 CISSP
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

ISC2 CISSP Information

The (ISC)² Certified Information Systems Security Professional (CISSP) exam is one of the most widely recognized credentials in the information security field. It covers an extensive body of knowledge related to cybersecurity, including eight domains: Security and Risk Management, Asset Security, Security Architecture and Engineering, Communication and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, and Software Development Security. This broad scope is designed to validate a candidate’s depth and breadth of knowledge in protecting organizations from increasingly complex cyber threats.

Achieving a CISSP certification signals a strong understanding of industry best practices and the ability to design, implement, and manage a comprehensive cybersecurity program. As a result, the exam is often regarded as challenging, requiring both practical experience and intensive study of each domain’s key principles. Many cybersecurity professionals pursue the CISSP to demonstrate their expertise, enhance their credibility, and open doors to higher-level roles such as Security Manager, Security Consultant, or Chief Information Security Officer.

ISC2 CISSP Logo
  • Free ISC2 CISSP Practice Test

  • 20 Questions
  • Unlimited
  • Security and Risk Management
    Asset Security
    Security Architecture and Engineering
    Communication and Network Security
    Identity and Access Management (IAM)
    Security Assessment and Testing
    Security Operations
    Software Development Security
Question 1 of 20

A security architect at a financial services company is designing the access control mechanism for a new collaborative research platform. The platform must allow data analysts, who create proprietary research documents, to independently manage permissions and share their work with specific colleagues on their project team. Which access control model BEST supports this requirement of owner-managed permissions?

  • Role-Based Access Control (RBAC)

  • Mandatory Access Control (MAC)

  • Rule-Based Access Control

  • Discretionary Access Control (DAC)

Question 2 of 20

An organization wants to implement a solution that will verify endpoint security posture before granting network access. The solution should check for up-to-date antivirus, patch levels, and host firewall status before allowing devices to connect to the corporate network. What is the BEST technology to address this requirement?

  • Network Access Control (NAC)

  • Network segmentation

  • Virtual Private Network (VPN)

  • Intrusion Detection and Prevention System (IDS/IPS)

Question 3 of 20

What is the primary security concern unique to distributed systems compared to centralized systems?

  • Increased attack surface due to multiple processing nodes

  • Authentication of users to single sign-on systems

  • Data encryption at rest requirements

  • Password complexity management

Question 4 of 20

During a routine penetration test, your security team discovers a previously unknown zero-day vulnerability in a widely used enterprise software platform deployed throughout your organization. The flaw permits unauthenticated remote code execution on affected servers. Although the team has created a temporary mitigation, it has not yet been rolled out to every system. Which disclosure strategy BEST adheres to responsible and ethical practices?

  • Publish technical details of the vulnerability on security blogs and social media to warn users of the software

  • Notify the vendor privately with technical details and allow them time to develop a patch before public disclosure

  • Apply a mitigation to your systems and keep the vulnerability information within your organization

  • Report the vulnerability to regulatory authorities and then contact the vendor

Question 5 of 20

A security professional is advising executives who frequently travel internationally with sensitive company data. Which of the following represents the BEST travel security practice regarding their laptops?

  • Back up all data to cloud storage before departure

  • Use clean or loaner devices with minimal data required for the trip

  • Install advanced encryption on personal devices before traveling

  • Register devices with local embassies at the destination

Question 6 of 20

During a corporate security incident investigation, a security analyst needs to create an exact duplicate of a suspect's hard drive for forensic analysis. Which of the following approaches is the BEST choice for maintaining evidence admissibility?

  • Copying visible files to an external drive for analysis

  • Creating a bit-by-bit image using write blockers

  • Taking screenshots of active processes and file directories

  • Running a virus scan on the original drive to identify malware

Question 7 of 20

A financial services company is developing a new mobile application. The security team has proposed that every user action, including non-transactional views like checking a balance, must be re-authenticated with both a password and a time-based one-time password (TOTP). The product manager argues that this excessive friction will lead users to abandon the app or find insecure workarounds. Which statement BEST represents the security principle the product manager is advocating for in this scenario?

  • Security mechanisms should be visibly present to discourage attackers

  • Security mechanisms should be complex enough to demonstrate thorough protection

  • Security mechanisms should be designed primarily to make users feel protected

  • Security mechanisms should be transparent enough that they don't unnecessarily impede legitimate users

Question 8 of 20

An organization is planning to migrate their application infrastructure to a public cloud provider using a Virtual Private Cloud (VPC) architecture. The security team wants to ensure proper network segmentation and isolation between different application tiers. Which VPC design feature would BEST satisfy this requirement?

  • VPN gateways with encrypted tunnels

  • Edge locations with distribution policies

  • Subnets with associated network ACLs and security groups

  • Transit gateways with route tables

Question 9 of 20

During the recovery phase of a major data breach incident, the security team has restored critical systems from backups and verified data integrity. What is the BEST next step to take before returning systems to production?

  • Apply security configurations and patches or updates that were missing before the incident

  • Restore user access to systems and data

  • Update the incident status in the tracking system

  • Document recovery actions taken in the incident report

Question 10 of 20

During a digital forensic investigation of a suspected intellectual property theft, which investigative technique establishes a documented process that tracks who has handled evidence from the moment of collection through analysis and final presentation?

  • Data carving

  • Chain of custody

  • Hash verification

  • Timeline analysis

Question 11 of 20

A security architect at a large financial services company is designing a new system for high-value transactions. To mitigate the risk of internal fraud, the design mandates that no single employee can initiate, approve, and finalize a transfer. Instead, these actions must be assigned to different individuals based on their defined job functions. Which security principle is most directly and fundamentally addressed by this design requirement?

  • Segregation of Duties

  • Defense in Depth

  • Least Privilege

  • Role-based Access Control

Question 12 of 20

A financial services company is designing the physical security for its new data center, which will house sensitive customer data and critical servers. The chief security officer's primary goal is to prevent unauthorized physical access by implementing the most effective and resilient strategy. Which of the following approaches should the security architect recommend?

  • An advanced IP-based surveillance system with AI-powered threat detection to monitor all areas of the data center.

  • Biometric iris scanners at the data center's main entrance as the sole mechanism for entry.

  • A 24/7 on-site security guard force responsible for visually verifying all individuals entering and exiting the facility.

  • A defense-in-depth strategy combining mantraps, multifactor authentication (card + PIN) at the data hall entrance, and individually locked server cages.

Question 13 of 20

A global enterprise is developing a strategy to secure its diverse information repositories containing varying levels of sensitive content. Which of the following approaches would be BEST for controlling access to their information assets?

  • Requiring management authorization for information retrieval

  • Applying uniform encryption across corporate assets

  • Implementing network segmentation for information repositories

  • Implementing tiered protection controls based on information sensitivity levels

Question 14 of 20

An organization's security team has collected digital evidence during an investigation of a potential data breach. Which of the following is the BEST approach for storing this evidence to maintain its admissibility in court?

  • Implement a secure storage facility with access controls, documentation of evidence handling, and physical protection measures

  • Utilize remote cloud storage with encryption and authentication safeguards

  • Conduct integrity verification by updating file timestamps to confirm system operation

  • Create copies of digital evidence and distribute them to security team members for parallel analysis

Question 15 of 20

During a merger, your company must transmit large archives of personally identifiable information (PII) from a secure on-premises data center to a partner's private cloud over the public Internet. Regulatory requirements mandate that confidentiality and integrity be preserved even if network traffic is intercepted. Which control provides the MOST effective protection for these files while they are in transit between the two environments?

  • Implement just-in-time (JIT) network access for the destination servers

  • Establish an IPsec VPN or TLS session to encrypt the data during transmission

  • Restrict transfer pathways to pre-approved subnets using network segmentation

  • Mask sensitive fields in the data sets before initiating the transfer

Question 16 of 20

Which approach provides stronger security by default when controlling application execution on organizational systems?

  • Whitelisting

  • Hybrid listing

  • Blacklisting

  • Graylisting

Question 17 of 20

A security operations center (SOC) analyst receives a high-priority alert for an email with a suspicious, unknown executable file sent to a senior executive. To analyze the file's behavior and potential threat without jeopardizing the production network or the user's workstation, which of the following is the most appropriate initial action for the analyst to take?

  • Execute the file within an isolated virtual environment to observe its behavior.

  • Forward the executable to a third-party antivirus vendor for signature creation.

  • Run a full antivirus scan on the executive's workstation.

  • Immediately delete the email from the executive's inbox to prevent execution.

Question 18 of 20

An organization is looking to enhance its security posture by improving the management of credentials for privileged accounts, such as domain administrators and root users. Which of the following approaches provides the most comprehensive security controls for this specific use case?

  • Enforcing multi-factor authentication (MFA) for all administrative account logons through a federated identity provider.

  • Mandating the use of long, complex passwords for all privileged accounts, with a policy requiring rotation every 90 days.

  • Implementing a Privileged Access Management (PAM) solution that includes credential vaulting, session monitoring, and automated password rotation.

  • Storing all privileged credentials in a dedicated enterprise password vault shared among authorized administrators.

Question 19 of 20

A global financial institution is decommissioning an old data center containing legacy systems with sensitive customer financial data. The CISO has asked you to develop a secure disposal plan for these systems. Which approach would BEST ensure the institution meets its security and compliance obligations?

  • Transfer necessary data to new systems and securely destroy hardware components with physical destruction methods

  • Conduct a data classification review, then apply appropriate sanitization methods based on data sensitivity and storage media

  • Perform system backups as required then format storage devices

  • Outsource the disposal to a reputable third-party vendor that meets security and compliance standards

Question 20 of 20

A security consultant discovers a critical vulnerability in a client's system during an assessment. After notifying the client, they learn the client plans to delay patching for 6 months due to business priorities, despite the significant risk. According to the ISC2 Code of Professional Ethics, what is the BEST action for the consultant to take?

  • Report the vulnerability to relevant regulatory authorities due to the client's decision to delay patching

  • Inform other security professionals about the vulnerability to determine the appropriate response

  • Implement patches without informing the client to safeguard against potential breaches

  • Document the risk, offer remediation recommendations, and have management acknowledge the risk