Skip to main content
Cybersecurity ⭐ Premium

ISC2 Certified Information Systems Security Professional (CISSP) - 340 Questions

By Webmaster Certland ❤️ 0 likes

Practice exam for the ISC2 CISSP certification. Covers security and risk management, asset security, security architecture, communication and network security, identity and access management, security assessment, security operations, and software development security.

🔒

Premium Content

This exam is exclusive to Premium users. Upgrade to get unlimited access!

Become Premium

👁️ Free Preview (5 of 340 questions)

1. A newly hired security analyst asks their manager which of the four canons in the ISC2 Code of Professional Ethics takes the highest priority when all four come into conflict. Which answer correctly identifies the FIRST canon and its meaning?

A Protect society, the common good, necessary public trust and confidence, and the infrastructure
B Act honorably, honestly, justly, responsibly, and legally
C Provide diligent and competent service to principals
D Advance and protect the profession

2. A security administrator discovers that a colleague is selling confidential client records on the dark web. Under the ISC2 Code of Professional Ethics, what is the administrator's MOST appropriate first action?

A Confront the colleague privately and give them an opportunity to stop before escalating
B Report the activity to management and the appropriate legal authorities immediately
C Do nothing, as the colleague's activities occur outside of work hours
D Conduct an independent investigation to gather full evidence before reporting

3. An organization stores encrypted financial records in a cloud environment. Users can only access data they are explicitly authorized to view, and all access is logged. Which property of the CIA triad is PRIMARILY demonstrated by the access control mechanism?

A Confidentiality
B Integrity
C Availability
D Accountability

4. A hospital's electronic health record system uses cryptographic hash functions to detect whether patient records have been modified since they were last saved. Which security property does this mechanism PRIMARILY support?

A Confidentiality
B Integrity
C Availability
D Non-repudiation

5. A CISO is developing the company's information security policy hierarchy. She wants to create a document that mandates the use of AES-256 encryption for all data at rest across every business unit. What type of document is she creating?

A Policy
B Guideline
C Standard
D Procedure

Want to test yourself for real?

Create a free account and run our exam simulation engine.

Free No credit card
  • Simulation engine
  • Up to 10 questions per attempt
  • Score & basic stats
Create free account Already have an account? Sign in
Best
Premium 7-day trial
  • All 340 questions
  • Detailed explanations
  • Smart Practice + Focus Mode
⭐ Start 7-day free trial

Information

Questions 340
Time 3h
Difficulty Hard
Minimum Score 70.00%

🤍 Like

Related Exams

Discussion

No comments yet. Be the first to start the discussion!

Sign in to join the discussion.