00:15:00

ISC2 CISSP Practice Test

Certified Information Systems Security Professional

Use the form below to configure your ISC2 CISSP Practice Test. The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for ISC2 CISSP
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

ISC2 CISSP Information

The (ISC)² Certified Information Systems Security Professional (CISSP) exam is one of the most widely recognized credentials in the information security field. It covers an extensive body of knowledge related to cybersecurity, including eight domains: Security and Risk Management, Asset Security, Security Architecture and Engineering, Communication and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, and Software Development Security. This broad scope is designed to validate a candidate’s depth and breadth of knowledge in protecting organizations from increasingly complex cyber threats.

Achieving a CISSP certification signals a strong understanding of industry best practices and the ability to design, implement, and manage a comprehensive cybersecurity program. As a result, the exam is often regarded as challenging, requiring both practical experience and intensive study of each domain’s key principles. Many cybersecurity professionals pursue the CISSP to demonstrate their expertise, enhance their credibility, and open doors to higher-level roles such as Security Manager, Security Consultant, or Chief Information Security Officer.

Free ISC2 CISSP Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    Security and Risk Management
    Asset Security
    Security Architecture and Engineering
    Communication and Network Security
    Identity and Access Management (IAM)
    Security Assessment and Testing
    Security Operations
    Software Development Security
Question 1 of 15

A global organization has determined that its primary security governance requirement is to create a comprehensive model that connects high-level business objectives with specific technical security implementations. Which security control framework would be BEST suited for these requirements?

  • Sherwood Applied Business Security Architecture

  • Control Objectives for Information and Related Technology

  • National Institute of Standards and Technology framework

  • International Organization for Standardization framework

Question 2 of 15

During the initial phase of a mission-critical financial system development, the security architect must determine which of the following approaches is BEST for gathering stakeholders' security requirements?

  • Conduct facilitated workshops with key stakeholders representing different business functions

  • Delegate security requirement gathering to department heads who will submit their needs independently

  • Deploy automated scanning tools to generate a list of security requirements based on industry standards

  • Review past security breach reports from similar financial institutions to define requirements

Question 3 of 15

What is key escrow in cryptographic systems?

  • A procedure to securely transfer keys between systems

  • A method to derive multiple keys from a single master key

  • A technique to encrypt the same data with multiple keys

  • A practice where a trusted third party holds copies of encryption keys

Question 4 of 15

An organization is implementing an identity solution that allows users to authenticate once and access both on-premises applications and cloud-based SaaS platforms. Which component is essential in this hybrid architecture?

  • Security token service

  • Credential translation module

  • Cloud access security broker

  • Directory synchronization agent

Question 5 of 15

Which strategy best enhances the recovery capabilities for critical data following a system outage?

  • Updating backups once a week in one location

  • Creating backups on physical media stored onsite

  • Employing varied storage methods to protect data across locations

  • Utilizing a remote backup solution

Question 6 of 15

Which role is primarily responsible for ensuring that data is handled appropriately throughout its lifecycle?

  • Data processor

  • Data owner

  • Data subject

  • Data custodian

Question 7 of 15

A company is implementing new procedures for accessing sensitive financial information. Which of the following practices would best ensure that only authorized personnel can access this data?

  • Implement role-based access controls to restrict data access based on job functions.

  • Restrict data access to the IT department.

  • Require users to create complex passwords for accessing the data.

  • Conduct access reviews annually to ensure that access rights are still valid.

Question 8 of 15

A multinational corporation is preparing to expand operations into new international markets. Which of the following requirements should the security executive prioritize FIRST?

  • Local privacy legislation compliance

  • Corporate security infrastructure harmonization

  • Industry-specific security certification

  • Supply chain security assessment

Question 9 of 15

What is the primary purpose of fuzz testing software as part of a security assessment?

  • To identify vulnerabilities by sending unexpected or random inputs

  • To validate input sanitization routines against known attack patterns

  • To verify the integrity of compiled binaries against their source code

  • To perform dynamic taint analysis of data flows within an application

Question 10 of 15

What is the primary purpose of conducting a tabletop exercise for disaster recovery planning?

  • To conduct recovery processes to validate effectiveness

  • To confirm team members can execute their roles effectively

  • To evaluate and refine response strategies through discussion

  • To practice technical skills in real-time environments

Question 11 of 15

During which phase of the Software Development Lifecycle (SDLC) should security requirements first be defined?

  • Testing phase

  • Design phase

  • Requirements phase

  • Implementation phase

Question 12 of 15

During a disaster recovery operation, who is primarily responsible for coordinating the recovery activities and ensuring that the disaster recovery plan is executed according to established procedures?

  • Chief Security Officer

  • Incident Response Team Leader

  • Disaster Recovery Coordinator

  • Business Continuity Manager

Question 13 of 15

An organization is decommissioning several storage devices, including traditional Hard Disk Drives (HDDs) and Solid-State Drives (SSDs). A technician is instructed to use degaussing for media sanitization. For which type of media would this technique be ineffective?

  • Magnetic tapes

  • Floppy disks

  • Hard Disk Drives (HDDs)

  • Solid-State Drives (SSDs)

Question 14 of 15

A financial services company is developing a new mobile banking application that will interact with their existing backend systems through multiple APIs. During the security assessment phase, the security team needs to evaluate these APIs for potential security vulnerabilities. Which of the following testing approaches would be BEST for identifying authentication bypass vulnerabilities in the application's APIs?

  • Schema validation testing of API request and response formats

  • Load testing the APIs to measure their performance under stress

  • Port scanning the backend servers hosting the APIs

  • Fuzzing the API endpoints with unexpected input values

Question 15 of 15

A global corporation is implementing a secure remote access solution for network administrators who need to perform system maintenance from various locations, including home networks and public Wi-Fi. The security team wants to ensure that all administrative sessions are properly authenticated, encrypted, and logged. Which of the following remote access solutions would best meet these requirements?

  • VPN connection with standard domain credentials

  • SSH with multi-factor authentication

  • Telnet with enhanced password policies

  • Remote Desktop Protocol over TLS