00:20:00

ISC2 CISSP Practice Test

Certified Information Systems Security Professional

Use the form below to configure your ISC2 CISSP Practice Test. The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for ISC2 CISSP
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

ISC2 CISSP Information

The (ISC)² Certified Information Systems Security Professional (CISSP) exam is one of the most widely recognized credentials in the information security field. It covers an extensive body of knowledge related to cybersecurity, including eight domains: Security and Risk Management, Asset Security, Security Architecture and Engineering, Communication and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, and Software Development Security. This broad scope is designed to validate a candidate’s depth and breadth of knowledge in protecting organizations from increasingly complex cyber threats.

Achieving a CISSP certification signals a strong understanding of industry best practices and the ability to design, implement, and manage a comprehensive cybersecurity program. As a result, the exam is often regarded as challenging, requiring both practical experience and intensive study of each domain’s key principles. Many cybersecurity professionals pursue the CISSP to demonstrate their expertise, enhance their credibility, and open doors to higher-level roles such as Security Manager, Security Consultant, or Chief Information Security Officer.

ISC2 CISSP Logo
  • Free ISC2 CISSP Practice Test

  • 20 Questions
  • Unlimited
  • Security and Risk Management
    Asset Security
    Security Architecture and Engineering
    Communication and Network Security
    Identity and Access Management (IAM)
    Security Assessment and Testing
    Security Operations
    Software Development Security

Free Preview

This test is a free preview, no account required.
Subscribe to unlock all content, keep track of your scores, and access AI features!

Question 1 of 20

A company is implementing new procedures for accessing sensitive financial information. Which of the following practices would best ensure that only authorized personnel can access this data?

  • Require users to create complex passwords for accessing the data.

  • Restrict data access to the IT department.

  • Conduct access reviews annually to ensure that access rights are still valid.

  • Implement role-based access controls to restrict data access based on job functions.

Question 2 of 20

An e-commerce company stores customer order records in a relational database that feeds analytics dashboards and the customer-service portal. Over time, stale shipping addresses and duplicate customer accounts have begun to cause reporting errors and slow queries. The security manager is updating the data-maintenance plan. Which action will BEST ensure the ongoing accuracy and relevance of operational data while still supporting business use?

  • Apply read-only permissions to all production tables

  • Schedule periodic data cleansing and validation to remove duplicates and correct outdated values

  • Rotate the database encryption keys every six months

  • Move order records older than one year to cold storage

Question 3 of 20

A multinational organization with thousands of assets-ranging from laptops and servers to cloud-based databases and proprietary algorithms-has struggled to reconcile discrepancies between purchase orders and what IT and finance believe is actually deployed. Senior management asks the security manager to recommend a single approach that will establish and maintain an accurate inventory of both tangible and intangible assets. Which action BEST meets this goal?

  • Create a licensing repository for patents and trademarks and add physical equipment when time allows.

  • Develop a program that documents every physical and information asset in a centralized register and schedules regular audits to reconcile the records with reality.

  • Add digital assets to the existing annual physical inventory checklist handled by facilities staff.

  • Deploy an automated discovery tool that records all new purchases and existing devices in real time.

Question 4 of 20

A financial services firm recently completed a data classification project, labeling its client investment data as 'Confidential'. The Chief Information Security Officer (CISO) is now tasked with developing corresponding security policies. When establishing the specific handling requirements for this 'Confidential' data, what should the primary objective of these requirements be to align with security best practices and the data's classification?

  • To streamline data access for auditors and regulators to ensure compliance.

  • To optimize data storage and transmission costs by using advanced compression techniques.

  • To ensure the data is protected against unauthorized access and disclosure throughout its lifecycle.

  • To guarantee 99.999% availability for all financial reporting systems using the data.

Question 5 of 20

What is the primary security benefit of formal code verification methods like mathematical proofs?

  • They are easier to implement than standard code reviews

  • They verify the absence of specific classes of vulnerabilities with mathematical certainty

  • They automatically fix identified vulnerabilities

  • They scan code faster than traditional static analysis tools

Question 6 of 20

Which role has the authority to define access and protection policies for data within an organization?

  • Data custodian

  • Data processor

  • Data steward

  • Data owner

Question 7 of 20

What is the process of categorizing data into different classes based on its sensitivity and the impact to the organization if it were disclosed?

  • Information review

  • Data management

  • Asset evaluation

  • Data classification

Question 8 of 20

What term refers to the process of assigning categories to data based on its level of sensitivity and the impact to the organization if that data is disclosed or compromised?

  • Data encoding

  • Data classification

  • Data mapping

Question 9 of 20

During a quarterly internal audit, the newly appointed Chief Privacy Officer discovers that the organization's asset register does not distinguish between publicly available information and data that could cause harm if exposed. She instructs each department to tag its records according to a new classification scheme. Which type of information should the team classify as sensitive rather than public or internal?

  • Company-wide announcements accessible to all employees.

  • Data about the organization's history that is already published.

  • Marketing materials that promote the brand.

  • Employee salary information that is handled with confidentiality measures.

Question 10 of 20

Which of the following statements BEST describes an organization's responsibility when setting data-retention periods?

  • Having an internal data-retention policy is unnecessary because external regulations always override it.

  • Internal data-retention policies must align with applicable legal and regulatory requirements to avoid compliance risks.

  • Organizations can set any retention period they prefer as long as it is shorter than regulatory minimums.

  • As long as internal retention rules are strictly enforced, alignment with external regulations is optional.

Question 11 of 20

Your organization is decommissioning a rack of self-encrypting solid-state drives (SSDs) that once stored highly sensitive customer records. The drives will be released to an outside recycling vendor, but they must first be sanitized so that the data can never be recovered, while still allowing the vendor to reuse the hardware. Which sanitization option BEST fulfills this requirement?

  • Perform a quick format of each partition

  • Physically shred each SSD into small fragments

  • Delete all files and empty the recycle bin

  • Issue the drive's Secure Erase (cryptographic erase) command and verify completion

Question 12 of 20

What refers to the geographical or logical whereabouts of data within an information system?

  • Data integrity

  • Data governance

  • Data residency

  • Data encryption

Question 13 of 20

An organization is replacing its outdated technology systems that are no longer supported. What should be the primary action taken regarding the equipment being retired?

  • Remove the hardware but retain data on it in case it is needed later.

  • Transfer the data to a cloud service directly from the legacy systems after appropriate preparation.

  • Format the hard drives and store the equipment in a secure location as a backup.

  • Ensure the elimination of sensitive data from the hardware before retirement.

Question 14 of 20

A financial services company is migrating a large dataset containing sensitive customer PII to a new cloud platform. A debate has emerged within the project team regarding the specific encryption standards and access control policies that must be applied to the data in its new environment. According to established information security governance principles, which role holds the ultimate authority and accountability for making these decisions on data handling requirements?

  • Data owner

  • Data subject

  • Data custodian

  • Data processor

Question 15 of 20

During a scheduled audit of organizational resources, the security team must ensure that every resource is properly accounted for and assessed. What key action should the team prioritize to ensure thorough management?

  • Collect a comprehensive record of all resources and their risk assessments.

  • Inspect physical safeguards in place for securing critical infrastructure.

  • Implement training programs to increase awareness of information security.

  • Review the current policies regarding personnel access to sensitive systems.

Question 16 of 20

During an audit, a multinational bank discovers that sensitive customer account information exchanged between its web application and back-end services is only protected by basic network firewalls. To reduce the risk of eavesdropping or tampering while the data is moving across public networks, which control should the security architect implement FIRST to provide both confidentiality and integrity for the data in transit?

  • Establish a TLS 1.3 encrypted channel for all customer transactions.

  • Deploy a network-based intrusion prevention system to detect malicious packets.

  • Implement strict role-based access control on the back-end database.

  • Configure secure hashing (SHA-256) of files before transmission.

Question 17 of 20

A financial services organization is decommissioning several servers that were used to process and store highly sensitive customer financial data. The servers contain solid-state drives (SSDs). According to the company's security policy, which is aligned with NIST 800-88, the data on these drives must be made irrecoverable using the method that provides the highest level of assurance. Which of the following procedures BEST meets this requirement?

  • Degaussing the SSDs with a certified, high-power degausser

  • Physically shredding the SSDs to a particle size of 2mm or less

  • Executing a cryptographic erase (CE) command on the drives

  • Performing a multipass overwrite using a DoD 5220.22-M compliant tool

Question 18 of 20

A financial services company schedules nightly backups of customer databases. The backup system initiates a TLS 1.3 tunnel and copies the encrypted backup files from the primary data center in Chicago to a geographically separate disaster-recovery site in Denver. During the actual copy operation across the leased MPLS link, in which data state must the backup files be protected?

  • The data is archived until it reaches the disaster-recovery site.

  • The data is in use while the backup application accesses it.

  • The data is at rest at the primary data center until the transfer ends.

  • The data is in transit during the copy across the network.

Question 19 of 20

Under the GDPR purpose-limitation principle, which practice best helps an organization remain compliant when it designs an online form to collect personal data from customers?

  • Use a blanket consent statement that allows the organization to repurpose the data for any future processing.

  • Document and disclose, before collection, exactly which personal data will be collected and the legitimate purposes for each field.

  • Rely on the corporate privacy policy alone and omit purpose statements on the form to avoid confusing customers.

  • Request every piece of information that could be useful in future projects, provided the data is stored securely.

Question 20 of 20

Who holds the ultimate responsibility for the data within an organization?

  • Data processor

  • Data owner

  • Data subject

  • Data custodian