Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
CISSP (ISC)² Certification Practice Exams and Tests
CISSP (ISC)² Certification Practice Exams and Tests

CISSP (ISC)² Certification Practice Exams and Tests: Over 1,000 practice questions and explanations covering all 8 CISSP domains for the May 2021 exam version

By Ted Jordan
$35.99 $24.99
Book Sep 2021 396 pages 1st Edition
eBook
$35.99 $24.99
Print
$43.99
Subscription
$15.99 Monthly
eBook
$35.99 $24.99
Print
$43.99
Subscription
$15.99 Monthly

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Buy Now

Product Details


Publication date : Sep 13, 2021
Length 396 pages
Edition : 1st Edition
Language : English
ISBN-13 : 9781800561373
Table of content icon View table of contents Preview book icon Preview Book

CISSP (ISC)² Certification Practice Exams and Tests

Chapter I: Scheduling the CISSP Exam

The CISSP exam is seen as one of the world's most respected cyber security certifications. Fortune 1000 companies, the US Federal Government, and the US Department of Defense require individuals to have the certification to advance their career in cyber security. The United Kingdom's National Academic Recognition Information Centre states that the CISSP qualification assessment of knowledge and skills is as good as a master's degree (learn more here: https://www.mercurysolutions.co/blog/cissp-certification-is-equivalent-to-masters-degree-now).

In this introductory chapter, we provide the steps to schedule the exam, find a testing center, and best use this book to put you in the greatest situation for passing and achieving the CISSP certification. We will cover the following:

  • Creating an (ISC)2 account
  • Finding a nearby Pearson Vue testing center
  • Maintaining your CISSP certification
  • The CISSP experiential requirements...

Creating an (ISC)² account

The first step to scheduling the exam is to create an account with the testing provider, Pearson Vue Testing Services. Pearson Vue has over 25 years of certification testing experience and works with (ISC)² so that you can schedule and take your exam at one of their many partner testing provider centers.

The first step is to create an account with (ISC)² on the Pearson Vue partner page here: https://home.pearsonvue.com/isc2.

Finding a nearby Pearson Vue testing center

After your Pearson Vue/(ISC)² account is created, log in and select View Exams, and then select the CISSP: Certified Information Systems Security Professional exam to schedule. (There is an option for Online Exams to take at home, but this is not available for the CISSP exam.)

Select your preferred language, and review the testing policies as needed. These will contain information pertaining to COVID-19 and mask-wearing while at the testing center. Also, the candidate needs to bring two pieces of identification to the testing center; otherwise, the candidate is failed without a refund.

Look your best at the testing center because, as stated in the testing policies, they will take a photograph and a palm vein scan that stays with your (ISC)² account.

The testing policies also include information about rescheduling and cancellation fees. Find the full list of terms and conditions here: https://www.isc2.org/uploadedFiles/Certification_Programs...

Maintaining your CISSP certification

The certification is not a lifetime credential and expires after 3 years. There are two options to retain the certification beyond that period. Either take the exam every 3 years or complete Continuing Professional Education hours (CPE hours). Details are found here: https://www.isc2.org/-/media/ISC2/Certifications/CPE/CPE---Handbook.ashx.

Continuing professional education credits are granted for the following:

  • Attending information system security related training classes
  • Reading or publishing information system security related articles or books
  • Attending information system security conferences
  • Attending information system security classes
  • Preparing to teach a course on information system security
  • A work-related project that is not part of your normal work duties
  • Taking a higher education course
  • Volunteering in information system security for non-profit organizations
  • Self-study preparing for a certification...

The CISSP experiential requirements

Not only does the candidate need to pass the exam, but they must meet the CISSP experience requirements found here: https://www.isc2.org/Certifications/CISSP/experience-requirements.

Candidates must have at least 5 years of work experience in at least 2 of the 8 domains. If the candidate does not have the work experience, they may become an Associate CISSP and are allowed up to 6 years to achieve the 5-year work experience requirement. Also, a college degree and some certifications count toward 1 of the 5 years of work experience.

The eight domains are as follows:

  • Domain 1: Security and Risk Management
  • Domain 2: Asset Security
  • Domain 3: Security Architecture and Engineering
  • Domain 4: Communication and Network Security
  • Domain 5: Identity and Access Management (IAM)
  • Domain 6: Security Assessment and Testing
  • Domain 7: Security Operations
  • Domain 8: Software Development Security

Don't think that you...

Domain 1: Security and Risk Management

1.1 Understand, adhere to, and promote professional ethics:

  • (ISC)2 Code of Professional Ethics
  • Organizational code of ethics

1.2 Understand and apply security concepts:

  • Confidentiality, integrity, and availability, authenticity, and nonrepudiation

1.3 Evaluate and apply security governance principles:

  • Alignment of the security function to business strategy, goals, mission, and objectives
  • Organizational processes (for example, acquisitions, divestitures, governance committees)
  • Organizational roles and responsibilities
  • Security control frameworks
  • Due care/due diligence

1.4 Determine compliance and other requirements:

  • Contractual, legal, industry standards, and regulatory requirements
  • Privacy requirements

1.5 Understand legal and regulatory issues that pertain to information security in a holistic context:

  • Cybercrimes and data breaches
  • Licensing and Intellectual...

Domain 2: Asset Security

2.1 Identify and classify information and assets:

  • Data classification
  • Asset classification

2.2 Establish information and asset handling requirements:

  • Information and asset ownership
  • Asset inventory (for example, tangible or intangible)
  • Asset management

2.3 Provision resources securely

2.4 Manage the data life cycle:

  • Data roles (for example, owners, controllers, custodians, processors, and users/subjects)
  • Data collection
  • Data location
  • Data maintenance
  • Data retention
  • Data remanence
  • Data destruction

2.5 Ensure appropriate asset retention (for example, End-of-Life (EOL) or End-of-Support (EOS))

2.6 Determine data security controls and compliance requirements:

  • Data states (for example, in use, in transit, or at rest)
  • Scoping and tailoring
  • Standards selection
  • Data protection methods (for example, Digital Rights Management (DRM), Data Loss Prevention (DLP), or...

Domain 3: Security Architecture and Engineering

3.1 Research, implement, and manage engineering processes using secure design principles:

  • Threat modeling
  • Least privilege
  • Defense in depth
  • Secure defaults
  • Fail securely
  • Separation of Duties (SoD)
  • Keep it simple
  • Zero trust
  • Privacy by design
  • Trust but verify
  • Shared responsibility

3.2 Understand the fundamental concepts of security models (for example, Biba, Star Model, and Bell-LaPadula)

3.3 Select controls based upon systems security requirements

3.4 Understand security capabilities of Information Systems (IS) (for example, memory protection, Trusted Platform Module (TPM), and encryption/decryption)

3.5 Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements:

  • Client-based systems
  • Server-based systems
  • Database systems
  • Cryptographic systems
  • Industrial Control Systems (ICS)
  • Cloud-based systems (for example...

Domain 4: Communication and Network Security

4.1 Assess and implement secure design principles in network architectures:

  • Open System Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) models
  • Internet Protocol (IP) networking (for example, Internet Protocol Security (IPSec) or Internet Protocol (IP) v4/6)
  • Secure protocols
  • Implications of multilayer protocols
  • Converged protocols (for example, Fiber Channel Over Ethernet (FCoE), Internet Small Computer Systems Interface (iSCSI), and Voice over Internet Protocol (VoIP))
  • Micro-segmentation (for example, Software Defined Networks (SDN), Virtual eXtensible Local Area Network (VXLAN), encapsulation, and Software-Defined Wide Area Network (SD-WAN))
  • Wireless networks (for example, Li-Fi, Wi-Fi, Zigbee, and satellite)
  • Cellular networks (for example, 4G, and 5G)
  • Content Distribution Networks (CDN)

4.2 Secure network components:

  • Operation of hardware (for example...

Domain 5: Identity and Access Management (IAM)

5.1 Control physical and logical access to assets:

  • Information
  • Systems
  • Devices
  • Facilities
  • Applications

5.2 Manage identification and authentication of people, devices, and services:

  • Identity Management (IdM) implementation
  • Single/Multi-Factor Authentication (MFA)
  • Accountability
  • Session management
  • Registration, proofing, and establishment of identity
  • Federated Identity Management (FIM)
  • Credential management systems
  • Single Sign On (SSO)
  • Just-In-Time (JIT)

5.3 Federated identity with a third-party service:

  • On-premise
  • Cloud
  • Hybrid

5.4 Implement and manage authorization mechanisms:

  • Role Based Access Control (RBAC)
  • Rule based access control
  • Mandatory Access Control (MAC)
  • Discretionary Access Control (DAC)
  • Attribute Based Access Control (ABAC)
  • Risk based access control

5.5 Manage the identity and access provisioning...

Domain 6: Security Assessment and Testing

6.1 Design and validate assessment, test, and audit strategies:

  • Internal
  • External
  • Third-party

6.2 Conduct security control testing:

  • Vulnerability assessment
  • Penetration testing
  • Log reviews
  • Synthetic transactions
  • Code review and testing
  • Misuse case testing
  • Test coverage analysis
  • Interface testing
  • Breach attack simulations
  • Compliance checks

6.3 Collect security process data (for example, technical and administrative):

  • Account management
  • Management review and approval
  • Key performance and risk indicators
  • Backup verification data
  • Training and awareness
  • Disaster Recovery (DR) and Business Continuity (BC)

6.4 Analyze test output and generate reports:

  • Remediation
  • Exception handling
  • Ethical disclosure

6.5 Conduct or facilitate security audits:

  • Internal
  • External
  • Third-party

Domain 7: Security Operations

7.1 Understand and comply with investigations:

  • Evidence collection and handling
  • Reporting and documentation
  • Investigative techniques
  • Digital forensics tools, tactics, and procedures
  • Artifacts (for example, a computer, network, or mobile device)

7.2 Conduct logging and monitoring activities:

  • Intrusion detection and prevention
  • Security Information and Event Management (SIEM)
  • Continuous monitoring
  • Egress monitoring
  • Log management
  • Threat intelligence (for example, threat feeds or threat hunting)
  • User and Entity Behavior Analytics (UEBA)

7.3 Perform Configuration Management (CM) (for example, provisioning, baselining, or automation)

7.4 Apply foundational security operations concepts:

  • Need-to-know/least privilege
  • Separation of Duties (SoD) and responsibilities
  • Privileged account management
  • Job rotation
  • Service Level Agreements (SLAs)

7.5 Apply resource protection...

Domain 8: Software Development Security

8.1 Understand and integrate security in the Software Development Life Cycle (SDLC):

  • Development methodologies (for example, Agile, Waterfall, DevOps, or DevSecOps)
  • Maturity models (for example, the Capability Maturity Model (CMM) or the Software Assurance Maturity Model (SAMM))
  • Operation and maintenance
  • Change management
  • Integrated Product Team (IPT)

8.2 Identify and apply security controls in software development ecosystems:

  • Programming languages
  • Libraries
  • Tool sets
  • Integrated Development Environment (IDE)
  • Runtime
  • Continuous Integration and Continuous Delivery (CI/CD)
  • Security Orchestration, Automation, and Response (SOAR)
  • Software Configuration Management (SCM)
  • Code repositories
  • Application security testing (for example, Static Application Security Testing (SAST) or Dynamic Application Security Testing (DAST))

8.3 Assess the effectiveness of software security...

How to use this book

To best prepare for taking the CISSP exam, it is recommended you attempt practice exam 1 first, at the end of the book. Take 2 hours to complete the exam. Make sure to grade yourself.

Use the domain guide at the end of the exam, and determine which domains you need the most help with. Study further by reviewing the Learn more links that are provided with some of the questions to brush up on domains you are weak on.

This book has 100 practice questions for each domain, so review those practice questions to become stronger in those domains, and become better at test taking. For example, make sure to not spend more than 1 to 2 minutes per question so that when taking the real exam, you will not run out of time.

The real exam has up to 150 questions, with 3 hours to complete it, but if you demonstrate the required information security skills earlier, the exam may end at question 100, 120, or even 137. The exam ends once you demonstrate the required knowledge...

Summary

To best prepare for the CISSP exam, study the practice questions in this book, and complete the full practice exams at the end of the book:

  • The CISSP exam has a 5-year experience requirement, and if you have been working in information systems for at least 10 years, it should be straightforward to satisfy the work experience requirement.
  • Once you earn the CISSP, you can retain it with CPE credit, or you can take the exam again in 3 years.
  • Good luck on the exam, and please let us know how well you did on Twitter or YouTube: @JordanTeamLearn.
Left arrow icon Right arrow icon

Key benefits

  • Get ready to take the CISSP exam with the help of practice questions covering all concepts tested in the exam
  • Discover and fill the gaps in your knowledge with detailed explanations of answers
  • Take two full practice exams that simulate CISSP version May 2021

Description

The CISSP exam is for security professionals who understand that poor security can put a company out of business. The exam covers eight important security domains - risk management, security architecture, data security, network security, identity management, auditing, security operations, and software development security. Designed to cover all the concepts tested in the CISSP exam, CISSP (ISC)2 Certification Practice Exams and Tests will assess your knowledge of information security and introduce you to the tools you need to master to pass the CISSP exam (version May 2021). With more than 100 questions for every CISSP domain, this book will test your understanding and fill the gaps in your knowledge with the help of descriptive answers and detailed explanations. You'll also find two complete practice exams that simulate the real CISSP exam, along with answers. By the end of this book, you'll be ready to take and pass the (ISC)2 CISSP exam and achieve the Certified Information Systems Security Professional certification putting you in the position to build a career as a security engineer, security manager, or chief information security officer (CISO)

What you will learn

Understand key principles of security, risk management, and asset security Become well-versed with topics focused on the security architecture and engineering domain Test your knowledge of IAM and communication using practice questions Study the concepts of security assessment, testing, and operations Find out which security controls are applied in software development security Find out how you can advance your career by acquiring this gold-standard certification

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Buy Now

Product Details


Publication date : Sep 13, 2021
Length 396 pages
Edition : 1st Edition
Language : English
ISBN-13 : 9781800561373

Table of Contents

13 Chapters
Preface Chevron down icon Chevron up icon
Chapter I: Scheduling the CISSP Exam Chevron down icon Chevron up icon
Chapter 1: Security and Risk Management Domain 1 Practice Questions Chevron down icon Chevron up icon
Chapter 2: Asset Security Domain 2 Practice Questions Chevron down icon Chevron up icon
Chapter 3: Security Architecture and Engineering Domain 3 Practice Questions Chevron down icon Chevron up icon
Chapter 4: Communication and Network Security Domain 4 Practice Questions Chevron down icon Chevron up icon
Chapter 5: Identity and Access Management Domain 5 Practice Questions Chevron down icon Chevron up icon
Chapter 6: Security Assessment and Testing Domain 6 Practice Questions Chevron down icon Chevron up icon
Chapter 7: Security Operations Domain 7 Practice Questions Chevron down icon Chevron up icon
Chapter 8: Software Development Security Domain 8 Practice Questions Chevron down icon Chevron up icon
Chapter 9: Full Practice Exam Exam 1 Chevron down icon Chevron up icon
Chapter 10: Full Practice Exam Exam 2 Chevron down icon Chevron up icon
Other Books You May Enjoy Chevron down icon Chevron up icon

Customer reviews

Filter icon Filter
Top Reviews
Rating distribution
Empty star icon Empty star icon Empty star icon Empty star icon Empty star icon 0
(0 Ratings)
5 star 0%
4 star 0%
3 star 0%
2 star 0%
1 star 0%

Filter reviews by


No reviews found
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an eBook? Chevron down icon Chevron up icon

Where there is an eBook version of a title available, you can buy it from the book details for that title. Add either the standalone eBook or the eBook and print book bundle to your shopping cart. Your eBook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalised PDF download file. This link will remain active for 30 days. You can download backup copies of the file by logging in to your account at any time.

If you already have Adobe reader installed, then clicking on the link will download and open the PDF file directly. If you don't, then save the PDF file on your machine and download the Reader to view it.

Please Note: Packt eBooks are non-returnable and non-refundable.

Packt eBook and Licensing When you buy an eBook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it we have tried to balance the need for the ebook to be usable for you the reader with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your eBook for your own use onto any machine
  • You may not pass copies of the eBook on to anyone else
How can I make a purchase on your website? Chevron down icon Chevron up icon

If you want to purchase a video course, eBook or Bundle (Print+eBook) please follow below steps:

  1. Register on our website using your email address and the password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title. 
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Cart, or PayPal)
Where can I access support around an eBook? Chevron down icon Chevron up icon
  • If you experience a problem with using or installing Adobe Reader, the contact Adobe directly.
  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us
What eBook formats do Packt support? Chevron down icon Chevron up icon

Our eBooks are currently available in a variety of formats such as PDF and ePubs. In the future, this may well change with trends and development in technology, but please note that our PDFs are not Adobe eBook Reader format, which has greater restrictions on security.

You will need to use Adobe Reader v9 or later in order to read Packt's PDF eBooks.

What are the benefits of eBooks? Chevron down icon Chevron up icon
  • You can get the information you need immediately
  • You can easily take them with you on a laptop
  • You can download them an unlimited number of times
  • You can print them out
  • They are copy-paste enabled
  • They are searchable
  • There is no password protection
  • They are lower price than print
  • They save resources and space
What is an eBook? Chevron down icon Chevron up icon

Packt eBooks are a complete electronic version of the print edition, available in PDF and ePub formats. Every piece of content down to the page numbering is the same. Because we save the costs of printing and shipping the book to you, we are able to offer eBooks at a lower cost than print editions.

When you have purchased an eBook, simply login to your account and click on the link in Your Download Area. We recommend you saving the file to your hard drive before opening it.

For optimal viewing of our eBooks, we recommend you download and install the free Adobe Reader version 9.