ISC2 • CISSP
Validates deep technical and managerial competence in information security, covering security and risk management, asset security, security architecture, communication and network security, identity and access management, security assessment, security operations, and software development security.
Questions
850
Duration
180 minutes
Passing Score
700/1000
Difficulty
ProfessionalLast Updated
Feb 2026
The Certified Information Systems Security Professional (CISSP) is a globally recognized advanced certification offered by ISC2 that validates deep technical and managerial competence across the full spectrum of information security. It covers eight comprehensive domains: Security and Risk Management, Asset Security, Security Architecture and Engineering, Communication and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, and Software Development Security. The breadth of coverage ensures certified professionals can think holistically about enterprise security—from cryptographic solutions and network design to incident response, business continuity, and secure software development lifecycles.
Accredited under ISO/IEC Standard 17024 and approved by the U.S. Department of Defense under DoD 8140.03, the CISSP is consistently ranked among the most prestigious and sought-after credentials in cybersecurity. ISC2 periodically updates the exam through a rigorous Job Task Analysis (JTA) process to ensure alignment with the evolving responsibilities of practicing information security professionals. The certification is widely regarded as a benchmark for senior-level security expertise, signaling that holders possess not just technical knowledge but the strategic and managerial acumen required to lead security programs.
CISSP is designed for experienced information security practitioners who have already built a substantial career foundation and are ready to validate senior-level expertise. Primary target roles include Chief Information Security Officers (CISOs), Security Architects, IT Directors and Managers, Security Consultants, Network Architects, and Chief Information Officers. The certification is especially valuable for professionals who operate at the intersection of technical security implementation and organizational governance.
Candidates who do not yet meet the five-year experience requirement but pass the exam may become an Associate of ISC2, earning full CISSP status once the experience threshold is met. This pathway makes the certification accessible to motivated early-career professionals who want to demonstrate their knowledge while building qualifying work history.
ISC2 requires candidates to have a minimum of five years of cumulative, paid, full-time work experience in two or more of the eight CISSP domains. This experience must be verifiable and may be in a variety of security-related roles. Candidates who hold a four-year college degree or a qualifying credential from the ISC2-approved list may waive up to one year of the required experience, reducing the requirement to four years minimum.
While there are no mandatory formal training prerequisites, ISC2 strongly recommends that candidates have hands-on experience across multiple domains before attempting the exam. A solid working knowledge of networking fundamentals, operating systems, risk management frameworks (such as NIST or ISO 27001), cryptography, and access control models is essential. Most successful candidates have backgrounds spanning roles such as security analyst, systems administrator, network engineer, or security engineer before pursuing CISSP.
The CISSP exam is delivered exclusively in Computerized Adaptive Testing (CAT) format across all languages as of April 2024. Under CAT, the exam presents between 100 and 150 items, with the session ending early once the scoring algorithm can determine a candidate's ability relative to the passing threshold with 95% statistical confidence. The maximum time allotted is 3 hours. Item types include multiple-choice questions as well as advanced innovative items such as drag-and-drop and hotspot questions.
The exam is scored on a scale of 0 to 1000, with a passing score of 700. Because the CAT algorithm adjusts difficulty dynamically based on each response, different candidates receive different sets of questions. The exam is administered at Pearson VUE testing centers worldwide and through online proctoring. Maintaining the CISSP credential requires earning 120 Continuing Professional Education (CPE) credits every three years and paying an Annual Maintenance Fee (AMF) to ISC2.
CISSP certification consistently commands some of the highest salaries in the cybersecurity field. According to ISC2 and independent salary surveys, CISSP holders in the United States earn an average of approximately $143,000–$161,000 per year, with total compensation frequently exceeding $175,000. Senior roles such as CISO average $148,000–$195,000, and top earners in major markets exceed $230,000. The certification typically yields a 10–25% salary premium over non-certified peers at equivalent experience levels, and holders earn roughly 30% more than the U.S. Bureau of Labor Statistics median for all information security analysts ($124,910).
The CISSP is one of the top five most-requested certifications in U.S. cybersecurity job postings, with consistently over 9,500 active listings on major job boards requiring or preferring the credential. The BLS projects 33% growth for information security analyst roles through 2033—far above average—and ISC2's 2024 workforce study identifies a global cybersecurity talent gap of 4.76 million professionals, ensuring continued strong demand. Compared to alternatives like the CISM (which focuses more narrowly on management) or the Security+ (which targets entry-level roles), CISSP is uniquely valued for senior roles because it bridges both technical depth and strategic governance across all eight domains.
1. A financial services company is developing a business continuity plan. The CFO has determined that the billing system must be restored within 4 hours of an outage, and the company can tolerate losing no more than 30 minutes of transaction data. After restoration, it will take 1 hour to verify system integrity before resuming operations. What is the Maximum Tolerable Downtime (MTD) for this scenario? (Select one!)
2. A government agency requires a security model that prevents users with Secret clearance from reading Top Secret documents and prevents users from writing information to lower classification levels. Which security model should be implemented? (Select one!)
3. During a security assessment, you discover that database administrators can both create user accounts and grant those accounts elevated privileges without oversight. Which two security principles are being violated? (Select two!)
Select all that apply4. A company needs to sanitize 500 solid-state drives (SSDs) that contained classified data before repurposing them for a new project. The security team proposes using a seven-pass overwrite utility. What is the PRIMARY concern with this approach? (Select one!)
5. An e-commerce application uses AES-256 encryption to protect customer credit card data stored in the database. During a breach investigation, attackers were able to extract and decrypt the data using a compromised database administrator account. Which security service was NOT provided by the encryption implementation? (Select one!)
All exams included • Cancel anytime