ISC2 • CISSP
Validates deep technical and managerial competence in information security, covering security and risk management, asset security, security architecture, communication and network security, identity and access management, security assessment, security operations, and software development security.
Questions
850
Duration
180 minutes
Passing Score
700/1000
Difficulty
ProfessionalLast Updated
Feb 2026
The Certified Information Systems Security Professional (CISSP) is a globally recognized advanced certification offered by ISC2 that validates deep technical and managerial competence across the full spectrum of information security. It covers eight comprehensive domains: Security and Risk Management, Asset Security, Security Architecture and Engineering, Communication and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, and Software Development Security. The breadth of coverage ensures certified professionals can think holistically about enterprise security—from cryptographic solutions and network design to incident response, business continuity, and secure software development lifecycles.
Accredited under ISO/IEC Standard 17024 and approved by the U.S. Department of Defense under DoD 8140.03, the CISSP is consistently ranked among the most prestigious and sought-after credentials in cybersecurity. ISC2 periodically updates the exam through a rigorous Job Task Analysis (JTA) process to ensure alignment with the evolving responsibilities of practicing information security professionals. The certification is widely regarded as a benchmark for senior-level security expertise, signaling that holders possess not just technical knowledge but the strategic and managerial acumen required to lead security programs.
CISSP is designed for experienced information security practitioners who have already built a substantial career foundation and are ready to validate senior-level expertise. Primary target roles include Chief Information Security Officers (CISOs), Security Architects, IT Directors and Managers, Security Consultants, Network Architects, and Chief Information Officers. The certification is especially valuable for professionals who operate at the intersection of technical security implementation and organizational governance.
Candidates who do not yet meet the five-year experience requirement but pass the exam may become an Associate of ISC2, earning full CISSP status once the experience threshold is met. This pathway makes the certification accessible to motivated early-career professionals who want to demonstrate their knowledge while building qualifying work history.
ISC2 requires candidates to have a minimum of five years of cumulative, paid, full-time work experience in two or more of the eight CISSP domains. This experience must be verifiable and may be in a variety of security-related roles. Candidates who hold a four-year college degree or a qualifying credential from the ISC2-approved list may waive up to one year of the required experience, reducing the requirement to four years minimum.
While there are no mandatory formal training prerequisites, ISC2 strongly recommends that candidates have hands-on experience across multiple domains before attempting the exam. A solid working knowledge of networking fundamentals, operating systems, risk management frameworks (such as NIST or ISO 27001), cryptography, and access control models is essential. Most successful candidates have backgrounds spanning roles such as security analyst, systems administrator, network engineer, or security engineer before pursuing CISSP.
The CISSP exam is delivered exclusively in Computerized Adaptive Testing (CAT) format across all languages as of April 2024. Under CAT, the exam presents between 100 and 150 items, with the session ending early once the scoring algorithm can determine a candidate's ability relative to the passing threshold with 95% statistical confidence. The maximum time allotted is 3 hours. Item types include multiple-choice questions as well as advanced innovative items such as drag-and-drop and hotspot questions.
The exam is scored on a scale of 0 to 1000, with a passing score of 700. Because the CAT algorithm adjusts difficulty dynamically based on each response, different candidates receive different sets of questions. The exam is administered at Pearson VUE testing centers worldwide and through online proctoring. Maintaining the CISSP credential requires earning 120 Continuing Professional Education (CPE) credits every three years and paying an Annual Maintenance Fee (AMF) to ISC2.
CISSP certification consistently commands some of the highest salaries in the cybersecurity field. According to ISC2 and independent salary surveys, CISSP holders in the United States earn an average of approximately $143,000–$161,000 per year, with total compensation frequently exceeding $175,000. Senior roles such as CISO average $148,000–$195,000, and top earners in major markets exceed $230,000. The certification typically yields a 10–25% salary premium over non-certified peers at equivalent experience levels, and holders earn roughly 30% more than the U.S. Bureau of Labor Statistics median for all information security analysts ($124,910).
The CISSP is one of the top five most-requested certifications in U.S. cybersecurity job postings, with consistently over 9,500 active listings on major job boards requiring or preferring the credential. The BLS projects 33% growth for information security analyst roles through 2033—far above average—and ISC2's 2024 workforce study identifies a global cybersecurity talent gap of 4.76 million professionals, ensuring continued strong demand. Compared to alternatives like the CISM (which focuses more narrowly on management) or the Security+ (which targets entry-level roles), CISSP is uniquely valued for senior roles because it bridges both technical depth and strategic governance across all eight domains.
5 sample questions with correct answers and explanations. Start a practice session to test yourself across all 850 questions.
1. A startup company develops a mobile banking application using agile methodology with two-week sprints. The security team must integrate security activities without disrupting development velocity. The application will handle authentication, funds transfer, and bill payment. Which three security practices best support DevSecOps principles in this environment? (Select three!)
Multiple correct answersExplanation
Static Application Security Testing in CI/CD pipeline provides immediate feedback on code security issues during build process, enabling developers to fix vulnerabilities before merge, embodying shift-left principles. Security user stories integrate security requirements into sprint planning as first-class features with testable acceptance criteria, ensuring security considerations from design phase. Dynamic Application Security Testing against staging provides runtime vulnerability detection before production without blocking releases. Quarterly penetration testing provides point-in-time assessment but misaligns with two-week sprint cadence and doesn't enable rapid feedback. Three-week security review gates contradict agile velocity and DevSecOps automation principles by creating bottlenecks. Annual architecture reviews provide governance but insufficient frequency for rapidly evolving applications. DevSecOps emphasizes automation, continuous security testing, and early integration over manual gates and periodic assessments.
2. A healthcare organization selects an access control model for a new patient portal. Requirements include: physicians access only their assigned patients, nurses access patients on their current ward assignment, administrative staff access billing records based on department plus time-of-day restrictions, and the system must adapt permissions dynamically when staff transfer between departments or shifts without manual role changes. The solution must minimize ongoing administrative overhead. Which access control model best meets these requirements? (Select one!)
Explanation
Attribute-Based Access Control evaluates multiple attributes including user department, shift, ward assignment, and time-of-day in real-time against centralized policies to make dynamic access decisions. When staff transfer departments or change shifts, their attributes update automatically and ABAC policies immediately reflect the new access rights without manual reconfiguration. ABAC handles complex, context-dependent scenarios with lower administrative overhead than role-based alternatives. Role-Based Access Control would require creating numerous fine-grained roles for every combination of department, shift, and ward assignment, causing role explosion and high maintenance overhead. Discretionary Access Control places management burden on resource owners to maintain access control lists for thousands of patients, creating unsustainable administrative overhead. Mandatory Access Control uses hierarchical sensitivity labels suitable for military/government confidentiality requirements but lacks the flexibility for dynamic healthcare access patterns based on assignments and time context.
3. A healthcare organization develops a mobile health application that processes patient diagnostic data. Privacy regulations require that data be protected throughout its entire lifecycle. The security architect must ensure confidentiality controls are implemented proactively from the initial design phase, embedded into system architecture rather than added later, and maintained from collection through destruction. Which privacy principle should guide the architecture? (Select one!)
Explanation
Privacy by Design is a framework developed by Ann Cavoukian with seven foundational principles including proactive not reactive, privacy as the default setting, privacy embedded into design, and end-to-end lifecycle protection. GDPR Article 25 codifies Privacy by Design as data protection by design and by default. This principle requires building privacy into system architecture from the beginning rather than bolting it on afterward. Privacy Impact Assessment is a process for evaluating privacy risks but is not an architectural design principle. Minimum necessary standard limits data access based on roles but does not address proactive lifecycle design. Data minimization limits collection but is only one component of comprehensive Privacy by Design rather than the overarching architectural principle.
4. An enterprise security architect evaluates wireless authentication mechanisms for corporate devices requiring strong mutual authentication and resistance to credential theft. The solution must provide the highest security for enterprise environments. Which EAP method provides the STRONGEST authentication? (Select one!)
Explanation
EAP-TLS provides the strongest wireless authentication by requiring certificates on both client and server for mutual authentication, eliminating password vulnerabilities and credential theft risks. EAP-TTLS creates a secure tunnel but still relies on weaker password authentication inside the tunnel. PEAP with MSCHAPv2 is vulnerable to dictionary attacks against the password hash. EAP-FAST was designed for legacy systems lacking certificate infrastructure and provides weaker security than certificate-based approaches.
5. A security architect designs network segmentation for a hospital environment. Medical devices in operating rooms communicate with hospital information systems storing patient records. Radiology workstations send imaging data to PACS servers. Administrative systems process billing and insurance claims. The architect wants to implement microsegmentation that minimizes lateral movement if an administrative workstation is compromised. Which traffic pattern requires the MOST restrictive controls? (Select one!)
Explanation
East-west traffic between administrative and medical device networks requires the most restrictive controls because it represents lateral movement between different security zones with vastly different risk profiles. Medical devices often run outdated operating systems with limited security controls and directly affect patient safety, while administrative systems have higher exposure to phishing and malware. Compromising administrative systems should not provide a pathway to medical devices, requiring strict segmentation and zero trust principles. North-south traffic between administrative systems and insurance portals is expected and necessary for business operations. East-west traffic within the same radiology segment is necessary for operational workflow. North-south traffic to the DMZ from external providers is already controlled by perimeter security and does not represent lateral movement from a compromised internal system.
One-time access to this exam