Skip to main content
ISC2 ⭐ Premium ⭐ Featured

ISC2 Certified Information Systems Security Professional (CISSP)

By Webmaster Certland English 📝 340 questions ❤️ 0 likes

Practice exam for the ISC2 CISSP certification. Covers security and risk management, asset security, security architecture, communication and network security, identity and access management, security assessment, security operations, and software development security.

⭐ Premium Updated Mar 2026

Unlock all 340 ISC2 Certified Information Systems Security Professional (CISSP) questions

Full simulation · Detailed explanations · Unlimited attempts

  • 340 questions — ~5 full-length simulations
  • Detailed explanations — why each answer is right or wrong
  • Unlimited attempts — retake as many times as needed
  • Smart Practice + Focus Mode + no ads
340
Questions
All certifications
from $4.90/mo

Sample Questions — ISC2 Certified Information Systems Security Professional (CISSP)

5 free sample questions from this practice exam. Correct answers are highlighted.

1. A newly hired security analyst asks their manager which of the four canons in the ISC2 Code of Professional Ethics takes the highest priority when all four come into conflict. Which answer correctly identifies the FIRST canon and its meaning?

A Protect society, the common good, necessary public trust and confidence, and the infrastructure ✓ Correct
B Act honorably, honestly, justly, responsibly, and legally
C Provide diligent and competent service to principals
D Advance and protect the profession

2. A security administrator discovers that a colleague is selling confidential client records on the dark web. Under the ISC2 Code of Professional Ethics, what is the administrator's MOST appropriate first action?

A Confront the colleague privately and give them an opportunity to stop before escalating
B Report the activity to management and the appropriate legal authorities immediately ✓ Correct
C Do nothing, as the colleague's activities occur outside of work hours
D Conduct an independent investigation to gather full evidence before reporting

3. An organization stores encrypted financial records in a cloud environment. Users can only access data they are explicitly authorized to view, and all access is logged. Which property of the CIA triad is PRIMARILY demonstrated by the access control mechanism?

A Confidentiality ✓ Correct
B Integrity
C Availability
D Accountability

4. A hospital's electronic health record system uses cryptographic hash functions to detect whether patient records have been modified since they were last saved. Which security property does this mechanism PRIMARILY support?

A Confidentiality
B Integrity ✓ Correct
C Availability
D Non-repudiation

5. A CISO is developing the company's information security policy hierarchy. She wants to create a document that mandates the use of AES-256 encryption for all data at rest across every business unit. What type of document is she creating?

A Policy
B Guideline
C Standard ✓ Correct
D Procedure

Want to test yourself for real?

Create a free account and run our exam simulation engine.

Free No credit card
  • Simulation engine
  • Up to 10 questions per attempt
  • Score & basic stats
Create free account Already have an account? Sign in
Best
Premium Premium
  • All 340 questions
  • Detailed explanations
  • Smart Practice + Focus Mode
⭐ Get Premium

Information

Questions 340
Time 3h
Difficulty Hard
Minimum Score 70.00%


💰 ROI

Official exam $749.00
CertLand $4.90/mo
Prepare for $749 for less than a coffee/mo

Study Guides & Articles

Related Exams

Discussion

No comments yet. Be the first to start the discussion!

Sign in to join the discussion.