00:15:00

ISC2 CISSP Practice Test

Certified Information Systems Security Professional

Use the form below to configure your ISC2 CISSP Practice Test. The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for ISC2 CISSP
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

ISC2 CISSP Information

The (ISC)² Certified Information Systems Security Professional (CISSP) exam is one of the most widely recognized credentials in the information security field. It covers an extensive body of knowledge related to cybersecurity, including eight domains: Security and Risk Management, Asset Security, Security Architecture and Engineering, Communication and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, and Software Development Security. This broad scope is designed to validate a candidate’s depth and breadth of knowledge in protecting organizations from increasingly complex cyber threats.

Achieving a CISSP certification signals a strong understanding of industry best practices and the ability to design, implement, and manage a comprehensive cybersecurity program. As a result, the exam is often regarded as challenging, requiring both practical experience and intensive study of each domain’s key principles. Many cybersecurity professionals pursue the CISSP to demonstrate their expertise, enhance their credibility, and open doors to higher-level roles such as Security Manager, Security Consultant, or Chief Information Security Officer.

Free ISC2 CISSP Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    Security and Risk Management
    Asset Security
    Security Architecture and Engineering
    Communication and Network Security
    Identity and Access Management (IAM)
    Security Assessment and Testing
    Security Operations
    Software Development Security
Question 1 of 15

True or False: A system that implements the 'fail securely' principle should default to granting access when authentication mechanisms fail.

  • True

  • False

Question 2 of 15

Which security concept ensures that information is accessible and usable upon demand by authorized entities?

  • Confidentiality

  • Authenticity

  • Integrity

  • Availability

Question 3 of 15

A healthcare organization is developing a new patient portal system. The CISO has instructed the project team to follow a proactive rather than reactive approach to data protection throughout the development lifecycle. Which approach best demonstrates the principle the CISO is emphasizing?

  • Conducting a comprehensive data flow assessment during the requirements phase to identify potential risks before architecture decisions are made

  • Creating detailed compliance documentation that will be reviewed by legal counsel before system deployment

  • Adding detailed audit logging capabilities to track user activities once the system goes live

  • Implementing strong encryption protocols after the system architecture has been finalized

Question 4 of 15

A company implements a process where employee access is removed solely from their email and shared drives upon termination. Given this approach, they believe they have sufficiently secured sensitive company data. Is this approach adequate?

  • False

  • True

Question 5 of 15

During the recovery phase of a major data breach incident, the security team has restored critical systems from backups and verified data integrity. What is the BEST next step to take before returning systems to production?

  • Restore user access to systems and data

  • Apply security configurations and patches or updates that were missing before the incident

  • Document recovery actions taken in the incident report

  • Update the incident status in the tracking system

Question 6 of 15

A multinational corporation has discovered that its customer database contains duplicate records, outdated address information, and inconsistent formatting across different regional branches. Which data maintenance practice would BEST address these issues?

  • Data cleansing

  • Data encryption

  • Data compression

  • Data normalization

Question 7 of 15

A financial institution is implementing an HPC cluster to process large datasets for real-time fraud detection. Which security control would be MOST appropriate for addressing the unique security challenges of this HPC environment?

  • Implementing resource isolation through containerization

  • Enabling hardware-level encryption for data exchanges

  • Allowing elevated root access for system administrators

  • Applying perimeter-based network monitoring

Question 8 of 15

An organization is developing handling procedures for sensitive data. What is the primary purpose of establishing information and asset handling requirements?

  • To transfer liability from the organization to individual employees

  • To reduce the overall cost of information technology operations

  • To maximize the value of data through extensive sharing

  • To ensure consistent protection of information assets throughout their lifecycle

Question 9 of 15

A financial services company is developing a new mobile banking application that will interact with their existing backend systems through multiple APIs. During the security assessment phase, the security team needs to evaluate these APIs for potential security vulnerabilities. Which of the following testing approaches would be BEST for identifying authentication bypass vulnerabilities in the application's APIs?

  • Load testing the APIs to measure their performance under stress

  • Port scanning the backend servers hosting the APIs

  • Fuzzing the API endpoints with unexpected input values

  • Schema validation testing of API request and response formats

Question 10 of 15

Which of the following best describes the primary purpose of a security sandbox?

  • A production testing area where developers debug application code before deployment

  • An isolated environment to run and analyze untrusted code without risking production systems

  • A decoy system designed to attract hackers away from legitimate resources

  • A tool for scanning network traffic to identify known malware signatures

Question 11 of 15

A company experienced a data breach after failing to patch a known vulnerability for six months. During litigation, they would most likely be found to have failed which of the following?

  • Business impact analysis

  • Due diligence

  • Due care

  • Code of ethics

Question 12 of 15

A healthcare organization wants to implement an access control system that can make decisions based on the patient's relationship to the healthcare provider, time of day, location of access attempt, and sensitivity of the medical records. Which access control model would BEST meet these requirements?

  • Mandatory Access Control (MAC)

  • Attribute-based Access Control (ABAC)

  • Role-based Access Control (RBAC)

  • Discretionary Access Control (DAC)

Question 13 of 15

What approach significantly enhances security for accessing applications by requiring verification through multiple channels?

  • Using various forms of verification for access

  • Limiting access by IP address

  • Accessing with a username and password

  • Allowing access based on device recognition

Question 14 of 15

Portable USB storage devices should be given unrestricted physical access to sensitive computing environments because most organizations have endpoint security controls already in place.

  • True

  • False

Question 15 of 15

What is the MOST appropriate security testing approach for identifying time-of-check to time-of-use (TOCTOU) vulnerabilities?

  • Dependency scanning

  • Fuzzing

  • Static code analysis

  • Race condition testing