Limited Time Offer: Use code CERTLABS10 for 10% off your first subscription!

Free CISSP Practice Test 2026: 20 Sample Questions with Full Explanations

Test your CISSP readiness with 20 scenario-based questions across all 8 domains. Click any answer to reveal the correct response and a detailed explanation.

125
Min Exam Questions
700
Passing Score / 1000
4 hrs
Exam Duration
8
Domains Tested

The CISSP (Certified Information Systems Security Professional) is widely regarded as the gold standard of cybersecurity certifications. Unlike vendor-specific credentials or entry-level exams, CISSP tests your ability to think and make decisions like a seasoned security manager, not just a technician. That means the exam isn't about memorizing protocol numbers or port lists. It's about understanding security from a business and risk management perspective, and choosing the answer that protects the organization best in a given scenario.

This free CertLabz practice test gives you 20 real-style questions spanning all 8 CISSP domains. Each question mimics the format and tone of the actual CAT exam. After selecting an answer, you'll see a full explanation of why the correct answer is right and why the distractors are wrong. Use this to identify your weak domains before upgrading to the full CertLabz CISSP question bank with 250+ scenario-based items, timed mock exams, and blockchain-verified credentials.

How to Use This Practice Test

Read each question carefully. CISSP questions are deliberately designed to have two "good" answers, and the key is choosing the best answer given the context. Think about what a security manager with full budget authority would do, not what a sysadmin would do. After selecting an answer, read the full explanation before moving on.

Your Score: 0 / 0

CISSP Practice Questions: All 8 Domains

Question 1 | Domain 1: Security & Risk Management
A company discovers that a third-party vendor has access to sensitive customer data as part of a service contract. The security manager is creating a formal process to evaluate this risk. Which step should be performed FIRST?
  • A Terminate the vendor contract immediately to eliminate the risk
  • B Conduct a risk assessment to determine the likelihood and impact of the vendor's access
  • C Implement technical controls to monitor all vendor activity in real time
  • D Require the vendor to complete a security questionnaire and attestation
Correct Answer: B. Before taking any action, you must understand the risk. A risk assessment identifies the likelihood and impact of threats, which informs the appropriate response. Terminating the vendor (A) may be premature and costly. Technical monitoring (C) is a control, not a risk identification step. A questionnaire (D) is useful but comes after you've established what risk you're evaluating.
Question 2 | Domain 2: Asset Security
An organization is classifying data stored across its systems. A dataset contains anonymized research data, personally identifiable information, and internal financial projections. What is the correct approach to classifying this dataset?
  • A Classify the entire dataset at the lowest classification level to simplify access controls
  • B Split the dataset into separate stores and classify each component independently
  • C Classify the entire dataset at the highest classification level of any component
  • D Apply no classification until the data custodian reviews each record manually
Correct Answer: C. When data at different classification levels is stored together, the combined dataset must be classified at the highest level of any individual component. This is the conservative, risk-based approach. Downclassifying to the lowest level (A) would expose sensitive PII and financial data inappropriately. Splitting (B) is often impractical and still requires a classification decision. Manual review (D) delays protection and is not a recognized classification standard.
Question 3 | Domain 3: Security Architecture & Engineering
A security architect is evaluating a new cloud deployment. The architecture must ensure that a compromise of one workload cannot propagate to other workloads. Which principle BEST addresses this requirement?
  • A Fail secure
  • B Least privilege
  • C Defense in depth
  • D Isolation and compartmentalization
Correct Answer: D. Isolation and compartmentalization ensure that workloads are separated so that a compromise cannot spread laterally. Least privilege (B) limits what a compromised workload can access but doesn't inherently prevent propagation across workload boundaries. Defense in depth (C) is a broader strategy with multiple layered controls. Fail secure (A) relates to system behavior during a failure, not lateral movement prevention.
Question 4 | Domain 4: Communication & Network Security
An employee working remotely connects to corporate resources over a VPN. Security logs show that after VPN authentication, the user's traffic is being routed through the corporate network regardless of destination. What type of VPN configuration is in use?
  • A Full tunnel VPN
  • B Split tunnel VPN
  • C Site-to-site VPN
  • D SSL/TLS VPN
Correct Answer: A. A full tunnel VPN routes ALL traffic, including internet-bound traffic, through the corporate network. This provides maximum visibility and control but increases bandwidth costs. A split tunnel (B) only routes corporate-bound traffic through the VPN, allowing direct internet access. Site-to-site (C) connects two network locations. SSL/TLS VPN (D) is an authentication/encryption method, not a routing decision.
Question 5 | Domain 5: Identity & Access Management
A financial institution requires that no single employee can both approve a transaction and initiate it. This control BEST represents which security principle?
  • A Least privilege
  • B Separation of duties
  • C Need to know
  • D Job rotation
Correct Answer: B. Separation of duties requires that two or more people complete a sensitive transaction together, preventing any one individual from having end-to-end control over a process. This is a key fraud-prevention control in financial environments. Least privilege (A) limits what a user can access. Need to know (C) limits what information a user can view. Job rotation (D) moves employees between roles periodically to detect fraud over time.
Question 6 | Domain 6: Security Assessment & Testing
A penetration tester has been given full network documentation, IP ranges, and administrator credentials before beginning an engagement. What type of penetration test is this?
  • A Black box test
  • B Gray box test
  • C White box test
  • D Red team exercise
Correct Answer: C. A white box test (also called crystal or glass box) provides the tester with full knowledge of the environment including documentation, source code, and credentials. Black box (A) means no prior knowledge. Gray box (B) means partial knowledge (e.g., credentials but no documentation). A red team exercise (D) typically uses a black or gray box approach to simulate real-world adversaries.
Question 7 | Domain 7: Security Operations
During an incident response, a forensic analyst wants to collect evidence from a running server. In what order should volatile evidence be collected to preserve the most time-sensitive information?
  • A CPU registers and cache, RAM contents, network connections, running processes, disk contents
  • B Disk contents first, then RAM, then network connections
  • C Network connections first, then disk, then RAM
  • D Power off the server immediately to preserve disk state
Correct Answer: A. The Order of Volatility (RFC 3227) guides evidence collection from most volatile to least volatile. CPU registers are lost almost instantly. RAM is lost on power-off. Network connections expire. Running processes disappear. Disk contents are non-volatile. Powering off first (D) destroys RAM evidence, which is often critical in malware investigations.
Question 8 | Domain 8: Software Development Security
A developer is implementing input validation for a web form. To prevent SQL injection, which approach provides the STRONGEST protection?
  • A Input length restriction to 255 characters
  • B Parameterized queries (prepared statements)
  • C Client-side JavaScript input validation
  • D Blacklisting known SQL keywords like DROP and SELECT
Correct Answer: B. Parameterized queries (prepared statements) separate SQL code from data, making SQL injection structurally impossible regardless of input content. Length restriction (A) doesn't prevent injection in short strings. Client-side validation (C) is trivially bypassed by attackers. Blacklisting (D) is incomplete and attackers routinely bypass keyword filters using encoding, case variations, and comments.
Question 9 | Domain 1: Security & Risk Management
A security manager calculates that a specific server has an Asset Value of $500,000, an Exposure Factor of 40%, and an Annualized Rate of Occurrence of 0.5. What is the Annualized Loss Expectancy (ALE)?
  • A $200,000
  • B $250,000
  • C $100,000
  • D $1,000,000
Correct Answer: C. ALE = SLE × ARO, where SLE (Single Loss Expectancy) = Asset Value × Exposure Factor. SLE = $500,000 × 0.40 = $200,000. ALE = $200,000 × 0.5 = $100,000. Memorize this formula. Quantitative risk calculations appear consistently on CISSP. The ALE tells you how much you can spend on a control before it becomes uneconomical.
Question 10 | Domain 5: Identity & Access Management
An organization adopts a model where access decisions are based on user attributes, resource attributes, and environmental conditions rather than predefined roles. Which access control model is being described?
  • A Role-Based Access Control (RBAC)
  • B Mandatory Access Control (MAC)
  • C Discretionary Access Control (DAC)
  • D Attribute-Based Access Control (ABAC)
Correct Answer: D. ABAC uses policies that combine attributes from multiple sources (subject attributes, object attributes, environment) to make dynamic access decisions. RBAC (A) assigns permissions based on job roles. MAC (B) uses system-enforced labels and clearances. DAC (C) lets resource owners decide who can access their resources. ABAC is the most flexible and fine-grained model, increasingly adopted in zero trust architectures.

Ready for the Full CertLabz 250-Question CISSP Bank?

CertLabz includes 250+ scenario-based CISSP practice questions, full-length CAT-format mock exams, flashcard decks, domain-by-domain analytics, and blockchain-verified credentials. Pair it with the CertLabz CISSP Domain Refresher course and the Cybersecurity Analyst Skill Track to close every gap before exam day.

Start Free Trial View Plans Free Certificates

CISSP Domain Weight Breakdown

The CISSP exam weights each domain differently. Understanding the relative importance of each domain helps you allocate your study time effectively. Domain 1 alone covers 16% of the exam, making risk management and governance your highest-leverage area.

Domain 1: Security & Risk Management16%
Domain 2: Asset Security10%
Domain 3: Security Architecture & Engineering13%
Domain 4: Communication & Network Security13%
Domain 5: Identity & Access Management13%
Domain 6: Security Assessment & Testing12%
Domain 7: Security Operations13%
Domain 8: Software Development Security10%

Key CISSP Concepts: Flashcards

Click a card to reveal the answer. Use the arrows to navigate through 8 essential CISSP concept cards.

What is the difference between Due Care and Due Diligence?

Click to reveal

Due Diligence = researching and understanding risks. Due Care = actually implementing appropriate safeguards based on that research. Diligence is the analysis; Care is the action.

What is the Bell-LaPadula model primarily designed to protect?

Click to reveal

Confidentiality. Bell-LaPadula enforces "no read up, no write down". Subjects cannot read data at higher classification or write data to lower classification levels.

What does the Biba integrity model enforce?

Click to reveal

Integrity. Biba enforces "no write up, no read down". Subjects cannot write to higher integrity levels or read from lower integrity levels, preventing corruption of high-integrity data.

What is the CISSP CAT exam format?

Click to reveal

Computerized Adaptive Testing: 125–175 questions, up to 4 hours. Difficulty adapts in real time. Exam ends when the algorithm is 95% confident in your pass/fail status.

What is the ALE formula?

Click to reveal

ALE = SLE × ARO. Where SLE (Single Loss Expectancy) = Asset Value × Exposure Factor (EF), and ARO = Annualized Rate of Occurrence.

What are the three goals of information security (CIA Triad)?

Click to reveal

Confidentiality (protecting data from unauthorized disclosure), Integrity (ensuring data is accurate and unaltered), Availability (ensuring authorized users can access data when needed).

What is the Order of Volatility in digital forensics?

Click to reveal

CPU registers → RAM → Network state → Running processes → Temporary files → Disk → Remote/backup media. Collect most volatile first to preserve the most time-sensitive evidence.

What is the difference between RBAC and ABAC?

Click to reveal

RBAC assigns permissions based on job roles (static, predefined). ABAC uses dynamic policies combining user attributes, resource attributes, and environmental context for fine-grained, flexible access control.

1 / 8

CISSP Study Strategy: What Top Scorers Do Differently

The biggest mistake CISSP candidates make is studying for the wrong exam. Many come from technical backgrounds and approach CISSP like CompTIA Security+, memorizing protocols, port numbers, and algorithm specs. While technical knowledge helps in a few domains, it is not what CISSP tests at its core. CISSP tests whether you think like a security executive who understands risk, governance, and business continuity.

Think Business First

Always ask: what answer protects the business while managing risk appropriately? Security controls must be proportional to risk. Never select an answer that harms business operations unless the alternative creates greater risk.

Identify the Best Answer

CISSP routinely presents four technically correct options. You must select the BEST one. Practice eliminating options that address a symptom rather than the root cause, or that are reactive rather than proactive.

Study All 8 Domains

Many candidates over-invest in technical domains (3, 4, 8) and neglect management domains (1, 2, 6). Domain 1 alone is 16% of the exam. Balanced preparation across all domains is the most reliable strategy.

Train on CertLabz

Use the CertLabz CISSP Domain Refresher course paired with the Cybersecurity Analyst Skill Track to build the management mindset the exam tests. CertLabz delivers 250+ scenario-based questions, full-length CAT-format mock exams, and blockchain-verified credentials so your prep history travels with you to recruiters.

Frequently Asked Questions

Start Free Trial See Pricing Free Certificates
Is this CertLabz CISSP practice test representative of the real exam?
Yes. The CertLabz CISSP practice test follows the scenario-based, managerial-mindset format candidates see on the live CAT exam. Questions cover all eight domains and emphasise risk-based decision making rather than rote recall. Upgrade to the full CertLabz CISSP question bank for 250+ items, timed full-length mock exams, domain analytics, and blockchain-verified credentials.
How many questions are on the actual CISSP exam?
The English CISSP CAT exam delivers 125 to 175 questions in 4 hours, ending when the adaptive algorithm reaches 95% confidence in your pass or fail status. Fixed-form versions deliver 250 questions over 6 hours. CertLabz mock exams replicate both formats so you can rehearse the timing as well as the content.
What score do I need to pass CISSP?
You need 700 of 1000 on a scaled scoring system. Because CAT is adaptive, raw correct counts do not map to the final scaled score. Each question is weighted by difficulty, and your CertLabz performance dashboard tracks domain-level competency the same way the live exam does.
How do I access more free CISSP practice questions?
Start a CertLabz free trial for sample questions from our CISSP bank, or claim a free CertLabz certificate. The full CertLabz subscription unlocks 250+ scenario questions, timed CAT-format mocks, and blockchain-verified credentials.
What CertLabz training pairs best with this practice test?
Pair the CertLabz CISSP Domain Refresher course with the CertLabz Cybersecurity Analyst Skill Track. Together they cover all eight CISSP domains, deliver hands-on scenario labs, and finish with blockchain-verified credentials you can share directly with recruiters. See CertLabz pricing for plan details.
Does CISSP study time count for CompTIA, ISACA, or EC-Council CPE renewal?
Yes. Hours invested studying with CertLabz CISSP material can typically be claimed as continuing professional education credits toward CompTIA CertMaster CE, ISACA CISM or CISA renewal, and EC-Council ECE programmes, subject to each issuer's CPE policy. Always verify with the certifying body before submitting.