Open the practice app for CISSP. Start with domain-focused scenario drills, then mix full-length mocks. Judgment-heavy questions that match CISSP’s architect/manager voice.
On this page
Interactive Practice Center
Start a practice session for CISSP — Certified Information Systems Security Professional below, or open the full app in a new tab.
For the best experience, open the full app in a new tab and navigate with swipes/gestures or the mouse wheel—just like on your phone or tablet.
Tip: Begin with 20–25 question domain drills (risk, architecture, IAM, network/cloud, ops/IR, SDLC). Shift to scenario sets and finally full mocks. Aim for consistent ~75–80% on mixed sets before scheduling.
Suggested progression
Domain drills (daily): 2× 20–25 questions focused on one CBK domain (rotate through all 8 over 4–5 days).
Scenario sets (alternate days): 1× 20–25 items emphasizing architecture tradeoffs, governance/risk choices, and IR decision ordering.
Mixed sets (weekly): 1× 30–40 items blending 3–4 domains to test transfer and prioritization.
Full mocks (final 2 weeks): 2–3 complete exams mirroring CISSP’s tone and coverage. Review every miss and tag weak objectives.
Timeboxing
Domain set: ~35–40 minutes
Scenario set: ~40–50 minutes
Mixed set: ~60–70 minutes
Full mock: ~120 minutes (leave a buffer for flagged items)
Scoring & review
Mark + return: Flag time sinks; finish the set, then review flags.
Two-bullet rule: For each miss, write (1) why your option was wrong, (2) why the correct option better fits policy, risk appetite, and scalability.
Spaced repetition: Re-test that topic within 24–48 hours.
Pattern log: Track recurring miss themes: RBAC vs ABAC vs MAC/DAC, scan vs pen test, contain vs eradicate, PKI revocation, zero trust segmentation.
Fast remediations (common weak spots)
Risk decisions: Choose mitigate/transfer/avoid/accept based on business impact; cite RTO/RPO for continuity tradeoffs.
Architecture picks: Prefer preventive, auditable, scalable controls (segment, least privilege, verified access) over ad-hoc tools.
IAM confusion:
SAML = web SSO assertions; OAuth 2.0 = delegation; OIDC = login on OAuth.
Use PAM/JIT for admins; log & record sessions; revoke promptly (joiner/mover/leaver).
Crypto/PKI: TLS 1.3 with ECDHE + AEAD; understand OCSP/CRL and stapling; pick cert types correctly (DV/OV/EV, SAN, wildcard, code-signing, client).
Ops/IR:Contain → Eradicate → Recover; preserve evidence (order of volatility) when policy requires; maintain chain of custody.
Assessment & testing:VA scan = breadth/identification; Pen test = authorized exploitation to prove impact (scope/ROE).