Skip to content

CISSP Study Path -- Certified Information Systems Security Professional

Study Path Overview

This comprehensive 12-week study path prepares you for the ISC2 CISSP (Certified Information Systems Security Professional) exam. It maps all 8 CBK domains to specific Nexus SecOps chapters, labs, and scenarios, and includes 80 practice questions with detailed explanations.

Certification: CISSP (ISC2) Exam Format: CAT (Computerized Adaptive Testing) -- 100 to 150 questions Duration: 3 hours Passing Score: 700 out of 1000 (scaled) Cost: USD 749 (as of 2026) Prerequisites: 5 years of cumulative paid work experience in 2 or more of the 8 domains Endorsement: Required by an existing ISC2 member within 9 months of passing


Table of Contents

  1. About CISSP
  2. The 8 Domains
  3. Domain Mapping to Nexus Chapters
  4. 12-Week Study Schedule
  5. Practice Questions -- 80 Total
  6. Exam Day Tips
  7. Post-Exam -- Endorsement and Maintenance
  8. Resources and References

About CISSP

What is CISSP?

The Certified Information Systems Security Professional (CISSP) is a globally recognized certification offered by (ISC)2 (International Information System Security Certification Consortium). It is widely regarded as the gold standard for information security professionals and validates your ability to design, implement, and manage a best-in-class cybersecurity program.

Why CISSP?

  • Industry Recognition: Often listed as a mandatory or preferred certification for senior security roles.
  • DoD 8570/8140 Approval: Meets IAT Level III, IAM Level II and III, and IASAE I and II requirements.
  • ANSI/ISO/IEC 17024 Accredited: One of the most rigorous security certifications.
  • Salary Impact: CISSP holders in North America earn an average of USD 140,000+ per year.
  • Global Reach: Recognized in over 170 countries.

The Common Body of Knowledge (CBK)

The CISSP exam is built around the ISC2 Common Body of Knowledge (CBK), a framework of universally accepted industry knowledge and best practices. The CBK is divided into 8 domains, each covering a specific area of information security.

The CBK is updated periodically (the current version took effect April 15, 2024, and remains in force through 2026). Candidates must demonstrate mastery across all 8 domains, not just depth in one.

Exam Format -- CAT

CISSP uses Computerized Adaptive Testing (CAT) for English-language exams:

  • Question count: Variable, between 100 and 150 questions
  • Time limit: 3 hours
  • Item types: Multiple choice and advanced innovative items (drag-and-drop, hotspot)
  • Adaptive scoring: The test adjusts difficulty based on your performance
  • Pass/fail: Determined by your ability estimate, not raw question count
  • Non-English exams: Linear format, 250 questions, 6 hours

CAT Exam Mechanics

The CAT algorithm presents harder questions if you answer correctly and easier ones if you answer incorrectly. You cannot go back to previously answered questions. The exam ends when the algorithm has 95% confidence in your pass/fail status, or when you reach 150 questions, or when time expires.

Many candidates finish in under 120 questions. Do not panic if your exam ends at question 100 -- it may mean the algorithm determined you clearly passed (or clearly failed) early.

Prerequisites

To earn the CISSP, you must:

  1. Have 5 years of cumulative paid work experience in 2 or more of the 8 CBK domains.
    • A 4-year college degree OR approved credential waives 1 year.
    • Part-time work (20-34 hours/week) counts proportionally.
    • Internships count if documented.
  2. Pass the CISSP exam (700/1000 scaled score).
  3. Agree to the ISC2 Code of Ethics.
  4. Get endorsed by an active ISC2 certified professional within 9 months of passing.
  5. Pay the Annual Maintenance Fee (AMF) of USD 135.
  6. Earn 40 CPE credits per year (120 over a 3-year cycle).

Associate of ISC2

If you pass the exam but lack the required experience, you become an Associate of ISC2 for up to 6 years while you accumulate the experience. Once you have 5 years, you submit documentation and become a full CISSP.

The Endorsement Process

After passing the exam, ISC2 emails you an endorsement application. An existing CISSP (or other qualifying ISC2 member) must verify your work history and attest that you meet the ethical and professional standards of the certification.

  • Timeline: Complete within 9 months of passing.
  • Endorser: Must be an active ISC2 certified professional who can validate your experience.
  • If no endorser: ISC2 itself can serve as your endorser after additional documentation review.

Annual Maintenance

To maintain your CISSP:

  • Earn 40 CPE (Continuing Professional Education) credits per year -- 120 over 3 years.
  • Pay USD 135 Annual Maintenance Fee (AMF).
  • Abide by the ISC2 Code of Ethics.

CPEs can be earned through:

  • Attending conferences (RSA, Black Hat, DEF CON, SANS).
  • Reading security books (submit title and publisher).
  • Writing articles, blogs, or whitepapers.
  • Teaching or presenting on security topics.
  • Completing vendor training.
  • Contributing to ISC2 committees.

The 8 Domains

The CISSP CBK is structured around 8 domains, each with a specific weight on the exam.

# Domain Weight Focus
1 Security and Risk Management 15% Governance, risk, compliance, ethics
2 Asset Security 10% Data classification, handling, retention
3 Security Architecture and Engineering 13% Models, cryptography, physical security
4 Communication and Network Security 13% Network design, protocols, channels
5 Identity and Access Management (IAM) 13% Identification, authentication, authorization
6 Security Assessment and Testing 12% Audits, testing, reporting
7 Security Operations 13% Investigations, IR, DR, BC
8 Software Development Security 11% Secure SDLC, DevSecOps, software controls
pie title CISSP Domain Weights
    "D1: Security and Risk Management" : 15
    "D2: Asset Security" : 10
    "D3: Security Architecture and Engineering" : 13
    "D4: Communication and Network Security" : 13
    "D5: Identity and Access Management" : 13
    "D6: Security Assessment and Testing" : 12
    "D7: Security Operations" : 13
    "D8: Software Development Security" : 11

Domain 1: Security and Risk Management (15%)

The largest domain. Covers foundational concepts.

Key topics:

  • Professional ethics: ISC2 Code of Ethics, organizational code of ethics.
  • CIA Triad: Confidentiality, Integrity, Availability (plus Authenticity, Non-repudiation).
  • Security governance: Alignment with business strategy, organizational processes.
  • Compliance and legal: GDPR, HIPAA, PCI DSS, SOX, CCPA, privacy laws.
  • Investigations: Administrative, criminal, civil, regulatory, industry standards.
  • Security policies: Policy, standard, procedure, guideline, baseline.
  • Business continuity: BIA (Business Impact Analysis), RTO, RPO, MTD, WRT.
  • Personnel security: Candidate screening, NDAs, onboarding, offboarding.
  • Risk management: Quantitative and qualitative risk analysis, ALE, SLE, ARO.
  • Threat modeling: STRIDE, PASTA, VAST, Trike, Attack Trees.
  • Supply chain risk: Hardware, software, service providers, Third-Party Risk Management (TPRM).
  • Security awareness: Training programs, social engineering tests, metrics.

Key Formulas

  • SLE (Single Loss Expectancy) = Asset Value x Exposure Factor
  • ARO (Annualized Rate of Occurrence) = Frequency per year
  • ALE (Annualized Loss Expectancy) = SLE x ARO
  • ROSI (Return on Security Investment) = ((ALE_before - ALE_after) - Control Cost) / Control Cost

Domain 2: Asset Security (10%)

Smallest domain but critical. Covers data lifecycle.

Key topics:

  • Information and asset classification: Public, Internal, Confidential, Restricted, Top Secret.
  • Data ownership: Data owner, data custodian, data steward, data subject, data processor.
  • Asset handling: Marking, labeling, storing, transporting, destroying.
  • Data lifecycle: Create, Store, Use, Share, Archive, Destroy (CSUSAD).
  • Data states: At rest, in transit, in use.
  • Data security controls: Encryption, DLP, DRM, tokenization, anonymization.
  • Data retention and destruction: Legal holds, secure deletion, degaussing, shredding.
  • Privacy: PII, PHI, GDPR data subject rights, data minimization.

Domain 3: Security Architecture and Engineering (13%)

Deep technical domain. Heavy on cryptography.

Key topics:

  • Security models: Bell-LaPadula (confidentiality), Biba (integrity), Clark-Wilson (well-formed transactions), Brewer-Nash (Chinese Wall).
  • Evaluation criteria: TCSEC (Orange Book), ITSEC, Common Criteria (EAL1-EAL7).
  • System architecture: Rings of protection, trusted computing base (TCB), reference monitor.
  • Cryptography: Symmetric (AES, DES, 3DES), asymmetric (RSA, ECC, ECDSA), hashing (SHA-2, SHA-3, MD5).
  • PKI: Certificate Authorities, Registration Authorities, CRLs, OCSP, X.509.
  • Cryptographic attacks: Brute force, birthday, rainbow table, MITM, known plaintext, chosen ciphertext.
  • Physical security: Perimeter, facility, internal controls (fences, locks, lighting, CCTV, mantraps).
  • Fire suppression: Class A/B/C/D/K fires, wet/dry pipe, pre-action, deluge.
  • Secure design principles: Least privilege, defense in depth, secure defaults, fail-safe.

Domain 4: Communication and Network Security (13%)

Classic networking domain with a security lens.

Key topics:

  • OSI and TCP/IP models: 7 layers (Physical, Data Link, Network, Transport, Session, Presentation, Application).
  • Network protocols: TCP, UDP, IP, ICMP, ARP, DNS, DHCP.
  • Secure protocols: TLS 1.3, IPsec, SSH, HTTPS, SFTP, SNMPv3.
  • Network topology: Bus, star, ring, mesh, hybrid.
  • Segmentation: VLANs, subnets, DMZ, microsegmentation, Zero Trust.
  • Network attacks: DDoS, ARP spoofing, DNS poisoning, session hijacking, MITM.
  • Wireless: 802.11 standards, WPA2/WPA3, Bluetooth, cellular, NFC.
  • Firewalls: Packet filter, stateful, application proxy, NGFW, WAF.
  • IDS/IPS: Signature-based, anomaly-based, NIDS, HIDS.
  • VPN: Site-to-site, remote access, IPsec (AH, ESP), SSL/TLS VPN.
  • Converged protocols: iSCSI, FCoE, VoIP, InfiniBand.
  • Software-defined networking (SDN) and NFV.

Domain 5: Identity and Access Management (13%)

Focused on who gets what access, when, and how.

Key topics:

  • Identification vs authentication vs authorization vs accounting (IAAA).
  • Authentication factors: Something you know, have, are, do, where you are.
  • MFA: TOTP, HOTP, push, FIDO2/WebAuthn, hardware tokens (YubiKey).
  • Biometrics: FRR, FAR, CER/EER, enrollment, retention.
  • SSO: Kerberos (KDC, TGT, tickets), SAML, OAuth 2.0, OIDC.
  • Federated identity: SAML assertions, IdP, SP, RP.
  • Access control models: DAC, MAC, RBAC, ABAC, rule-based.
  • Session management: Session tokens, timeout, revocation.
  • Account provisioning: JML (Joiner, Mover, Leaver), privileged access management (PAM).
  • Directory services: LDAP, Active Directory, Azure AD / Entra ID.
  • Access control attacks: Privilege escalation, pass-the-hash, Kerberoasting, credential stuffing.

Domain 6: Security Assessment and Testing (12%)

Validating controls work as designed.

Key topics:

  • Assessment strategies: Internal, external, third-party.
  • Security testing: Vulnerability scans, penetration testing (black/gray/white box), red team, purple team.
  • Code review: Static (SAST), dynamic (DAST), interactive (IAST), manual review.
  • Testing reports: Executive summary, technical findings, risk ratings, remediation.
  • Log reviews: SIEM, log correlation, alerting, retention.
  • Synthetic transactions: Application monitoring, uptime checks.
  • Compliance audits: SOC 1/2/3, ISO 27001, PCI DSS ROC/SAQ.
  • KPIs and KRIs: Key Performance Indicators, Key Risk Indicators.
  • Continuous monitoring: NIST SP 800-137, ConMon.

Domain 7: Security Operations (13%)

Day-to-day operational security.

Key topics:

  • Investigations: Evidence collection, chain of custody, forensics, digital evidence.
  • Logging and monitoring: Security Operations Center (SOC), SIEM, UEBA, EDR.
  • Incident management: Detection, response, mitigation, reporting, recovery, remediation, lessons learned.
  • Disaster recovery (DR): Hot site, warm site, cold site, mobile site, reciprocal agreement.
  • Business continuity (BC): BIA, RTO, RPO, MTD, WRT, BCP testing.
  • Backup strategies: Full, differential, incremental, synthetic, 3-2-1 rule.
  • Patch and vulnerability management: Patch testing, emergency patching, CVSS.
  • Change management: RFC, CAB, emergency changes, rollback.
  • Configuration management: Baselines, drift detection, SCAP.
  • Physical security: Site selection, guards, dogs, surveillance, badges, piggybacking prevention.

Domain 8: Software Development Security (11%)

Building secure software.

Key topics:

  • SDLC models: Waterfall, Agile, Spiral, DevOps, DevSecOps.
  • Security in SDLC: Requirements, design, implementation, testing, deployment, maintenance.
  • Secure coding: Input validation, output encoding, parameterized queries, error handling.
  • OWASP Top 10: Injection, broken auth, XSS, XXE, insecure deserialization, SSRF.
  • Secure design patterns: Least privilege, defense in depth, fail securely.
  • Application security testing: SAST, DAST, IAST, SCA, dependency scanning.
  • API security: OWASP API Top 10, authentication, rate limiting, input validation.
  • DevSecOps: CI/CD security gates, shift-left, IaC scanning.
  • Database security: ACID, views, stored procedures, polyinstantiation, aggregation, inference.
  • Maturity models: SAMM (Software Assurance Maturity Model), BSIMM.

Domain Mapping to Nexus Chapters

This section maps each CISSP domain to specific Nexus SecOps chapters. Study the Nexus chapters first to build intuition, then use a dedicated CISSP prep book to fill gaps.

Domain 1 Mapping -- Security and Risk Management

CISSP Topic Nexus Chapter
Governance, privacy, risk ch13-security-governance-privacy-risk.md
Threat modeling Chapter 54 -- Threat Modeling
Security program leadership ch40-security-program-leadership.md
Privacy engineering Chapter 55 -- Privacy Engineering
Compliance (GDPR, HIPAA, PCI DSS) ch13-security-governance-privacy-risk.md

Domain 2 Mapping -- Asset Security

CISSP Topic Nexus Chapter
Data classification and handling ch13-security-governance-privacy-risk.md
Data lifecycle and retention Chapter 55 -- Privacy Engineering
DLP, tokenization ch40-security-program-leadership.md

Domain 3 Mapping -- Security Architecture and Engineering

CISSP Topic Nexus Chapter
Applied cryptography ch32-cryptography-applied.md
Cloud architecture ch20-cloud-attack-defense.md
Security architecture patterns ch31-network-security-architecture.md

Domain 4 Mapping -- Communication and Network Security

CISSP Topic Nexus Chapter
Network security architecture ch31-network-security-architecture.md
Cloud networking ch20-cloud-attack-defense.md
TLS, IPsec, VPN ch32-cryptography-applied.md

Domain 5 Mapping -- Identity and Access Management

CISSP Topic Nexus Chapter
Identity and access security ch33-identity-access-security.md
SSO, SAML, OIDC ch33-identity-access-security.md
Kerberos, LDAP, AD ch33-identity-access-security.md

Domain 6 Mapping -- Security Assessment and Testing

CISSP Topic Nexus Chapter
Security program leadership ch40-security-program-leadership.md
DevSecOps pipeline testing ch35-devsecops-pipeline.md
Purple team exercises Purple Team Framework

Domain 7 Mapping -- Security Operations

CISSP Topic Nexus Chapter
Incident response lifecycle ch09-incident-response-lifecycle.md
Cloud forensics Chapter 57 -- Cloud Forensics
Disaster recovery, business continuity ch40-security-program-leadership.md

Domain 8 Mapping -- Software Development Security

CISSP Topic Nexus Chapter
DevSecOps pipeline ch35-devsecops-pipeline.md
Application security ch35-devsecops-pipeline.md
API security API Security Chapter
graph TD
    A[CISSP Exam] --> D1[Domain 1: Risk Mgmt 15%]
    A --> D2[Domain 2: Asset Security 10%]
    A --> D3[Domain 3: Architecture 13%]
    A --> D4[Domain 4: Network 13%]
    A --> D5[Domain 5: IAM 13%]
    A --> D6[Domain 6: Assessment 12%]
    A --> D7[Domain 7: Operations 13%]
    A --> D8[Domain 8: Software 11%]

    D1 --> Ch13[Ch13: Governance]
    D1 --> Ch40[Ch40: Leadership]
    D1 --> Ch54[Ch54: Threat Modeling]
    D1 --> Ch55[Ch55: Privacy]

    D2 --> Ch13
    D2 --> Ch55

    D3 --> Ch32[Ch32: Cryptography]
    D3 --> Ch31[Ch31: Network Arch]
    D3 --> Ch20[Ch20: Cloud]

    D4 --> Ch31
    D4 --> Ch20
    D4 --> Ch32

    D5 --> Ch33[Ch33: IAM]

    D6 --> Ch40
    D6 --> Ch35[Ch35: DevSecOps]

    D7 --> Ch09[Ch09: IR Lifecycle]
    D7 --> Ch57[Ch57: Cloud Forensics]
    D7 --> Ch40

    D8 --> Ch35

    style A fill:#4a5568,color:#fff
    style Ch09 fill:#2d3748,color:#fff
    style Ch13 fill:#2d3748,color:#fff
    style Ch20 fill:#2d3748,color:#fff
    style Ch31 fill:#2d3748,color:#fff
    style Ch32 fill:#2d3748,color:#fff
    style Ch33 fill:#2d3748,color:#fff
    style Ch35 fill:#2d3748,color:#fff
    style Ch40 fill:#2d3748,color:#fff

12-Week Study Schedule

Study Strategy

Plan for 15-20 hours per week of focused study. CISSP is a marathon, not a sprint. The exam tests breadth, so do not get tunnel vision on one domain.

Use the Sybex Official Study Guide (9th edition) and the CISSP All-in-One Exam Guide (Shon Harris / Fernando Maymi) as your primary references. Supplement with Nexus chapters for practical intuition.

gantt
    title CISSP 12-Week Study Schedule
    dateFormat  YYYY-MM-DD
    axisFormat  Week %W

    section Foundation
    Week 1: Domain 1 Part 1       :w1, 2026-01-05, 7d
    Week 2: Domain 1 Part 2 + D2  :w2, after w1, 7d

    section Architecture
    Week 3: Domain 3 Part 1 (Models) :w3, after w2, 7d
    Week 4: Domain 3 Part 2 (Crypto) :w4, after w3, 7d

    section Network and IAM
    Week 5: Domain 4 Part 1       :w5, after w4, 7d
    Week 6: Domain 4 Part 2 + D5 Part 1 :w6, after w5, 7d
    Week 7: Domain 5 Part 2       :w7, after w6, 7d

    section Assessment and Ops
    Week 8: Domain 6              :w8, after w7, 7d
    Week 9: Domain 7 Part 1       :w9, after w8, 7d
    Week 10: Domain 7 Part 2 + D8 Part 1 :w10, after w9, 7d

    section Finish
    Week 11: Domain 8 Part 2 + Review :w11, after w10, 7d
    Week 12: Full Review + Practice Exams :w12, after w11, 7d

Week 1 -- Domain 1 Part 1: Governance and Risk

Goal: Understand the foundations of security governance.

Daily reading targets (2-3 hours/day):

  • Monday: ISC2 Code of Ethics, CIA Triad, AAA, least privilege, separation of duties. Read Sybex Ch 1 (pp 1-30).
  • Tuesday: Security governance, frameworks (ISO 27001, NIST CSF, COBIT). Sybex Ch 1 (pp 30-60).
  • Wednesday: Compliance (GDPR, HIPAA, PCI DSS, SOX). Sybex Ch 4 (pp 130-170).
  • Thursday: Personnel security, background checks, NDAs. Sybex Ch 2.
  • Friday: Risk management frameworks (NIST SP 800-30/37/39). Sybex Ch 2 (pp 60-95).
  • Saturday: Quantitative risk analysis. Practice SLE/ALE/ARO calculations (20 problems).
  • Sunday: Review + 20 Domain 1 practice questions.

Nexus chapters: ch13-security-governance-privacy-risk.md, ch40-security-program-leadership.md.

Week 2 -- Domain 1 Part 2 + Domain 2

Goal: Complete risk management; master asset security.

Daily targets:

  • Monday: Qualitative risk analysis, risk treatment (accept, avoid, transfer, mitigate). Sybex Ch 2.
  • Tuesday: Threat modeling (STRIDE, PASTA, Trike, VAST, Attack Trees). Nexus Ch 54.
  • Wednesday: BIA, RTO, RPO, MTD, WRT. Sybex Ch 3.
  • Thursday: Supply chain risk, third-party risk management. Sybex Ch 1 (pp 90-105).
  • Friday: Begin Domain 2. Data classification (public, internal, confidential, restricted). Sybex Ch 5.
  • Saturday: Data roles (owner, custodian, steward, subject, controller, processor). Data lifecycle.
  • Sunday: Data retention, destruction, DLP. Review + 30 practice questions.

Nexus chapters: ch13-security-governance-privacy-risk.md, Chapter 55 -- Privacy Engineering.

Week 3 -- Domain 3 Part 1: Security Models and Architecture

Goal: Master formal security models and evaluation criteria.

Daily targets:

  • Monday: Bell-LaPadula (no read up, no write down). Sybex Ch 8.
  • Tuesday: Biba (no read down, no write up). Clark-Wilson (well-formed transactions).
  • Wednesday: Brewer-Nash (Chinese Wall), Graham-Denning, Harrison-Ruzzo-Ullman.
  • Thursday: TCSEC (Orange Book) levels. ITSEC. Common Criteria (EAL1-EAL7).
  • Friday: Trusted Computing Base (TCB), reference monitor, security kernel.
  • Saturday: Rings of protection, process isolation, memory management.
  • Sunday: Review + 20 practice questions. Build a mental map of all models.

Models Are Heavily Tested

Expect multiple questions comparing Bell-LaPadula to Biba. Remember the mnemonics: - Bell-LaPadula = Confidentiality (no read up, no write down). - Biba = Integrity (no read down, no write up).

Week 4 -- Domain 3 Part 2: Cryptography

Goal: Build deep intuition for cryptographic systems.

Daily targets:

  • Monday: Symmetric encryption (AES, DES, 3DES, RC4, Blowfish). Modes of operation (ECB, CBC, CTR, GCM). Sybex Ch 7.
  • Tuesday: Asymmetric encryption (RSA, DH, ECC, DSA). Key exchange.
  • Wednesday: Hashing (MD5, SHA-1, SHA-2, SHA-3). HMAC. Digital signatures.
  • Thursday: PKI. X.509 certificates. CA, RA, CRL, OCSP.
  • Friday: TLS handshake. IPsec (AH, ESP, tunnel vs transport). Nexus Ch 32.
  • Saturday: Cryptographic attacks (brute force, birthday, rainbow, MITM, known plaintext, chosen ciphertext).
  • Sunday: Physical security. Fire classes. Review + 25 practice questions.

Nexus chapters: ch32-cryptography-applied.md.

Week 5 -- Domain 4 Part 1: Networking Foundations

Goal: Solidify OSI model and protocol security.

Daily targets:

  • Monday: OSI 7 layers. Protocols at each layer. Sybex Ch 11.
  • Tuesday: TCP/IP model, TCP handshake, UDP. IP addressing, subnetting.
  • Wednesday: DNS, DHCP, ARP. DNSSEC. DoH/DoT.
  • Tuesday: Routing (OSPF, BGP, RIP). Switching (STP, VLANs).
  • Friday: Firewalls (packet filter, stateful, application, NGFW, WAF). Sybex Ch 12.
  • Saturday: IDS/IPS. Network segmentation. DMZ. Nexus Ch 31.
  • Sunday: Review + 25 practice questions.

Nexus chapters: ch31-network-security-architecture.md.

Week 6 -- Domain 4 Part 2 + Domain 5 Part 1

Goal: Wireless, VPN, converged protocols. Start IAM.

Daily targets:

  • Monday: Wireless (802.11a/b/g/n/ac/ax). WEP, WPA, WPA2, WPA3. Bluetooth security.
  • Tuesday: VPN (IPsec, SSL/TLS VPN, split tunnel vs full tunnel).
  • Wednesday: Converged protocols (iSCSI, FCoE, VoIP, SIP). SDN, NFV.
  • Thursday: Network attacks (DDoS, MITM, ARP spoofing, DNS poisoning, session hijacking).
  • Friday: Begin Domain 5. IAAA (Identification, Authentication, Authorization, Accounting). Sybex Ch 13.
  • Saturday: Authentication factors. MFA. Biometrics (FRR, FAR, CER).
  • Sunday: Review + 30 practice questions.

Week 7 -- Domain 5 Part 2: Federated Identity and Access Control

Goal: Master SSO, federation, and access control models.

Daily targets:

  • Monday: Kerberos (KDC, AS, TGS, TGT, service tickets). Full authentication flow. Sybex Ch 14.
  • Tuesday: SAML (assertions, IdP, SP). OAuth 2.0 flows. OpenID Connect.
  • Wednesday: Access control models (DAC, MAC, RBAC, ABAC, rule-based).
  • Thursday: Privileged access management (PAM). Just-in-time access.
  • Friday: Account lifecycle (JML). Identity governance.
  • Saturday: IAM attacks (pass-the-hash, Kerberoasting, credential stuffing). Nexus Ch 33.
  • Sunday: Review + 30 practice questions.

Nexus chapters: ch33-identity-access-security.md.

Week 8 -- Domain 6: Security Assessment and Testing

Goal: Understand how to test controls.

Daily targets:

  • Monday: Assessment types (vulnerability scan, pentest, red team, purple team). Sybex Ch 15.
  • Tuesday: SAST, DAST, IAST, SCA. When to use each.
  • Wednesday: Log reviews. SIEM. Audit logs. Clipping levels.
  • Thursday: Compliance audits (SOC 1/2/3, ISO 27001, PCI DSS ROC/SAQ).
  • Friday: KPIs, KRIs. Security metrics. Security awareness program metrics.
  • Saturday: Continuous monitoring (NIST SP 800-137). Nexus Ch 35.
  • Sunday: Review + 25 practice questions.

Nexus chapters: ch35-devsecops-pipeline.md, Purple Team Framework.

Week 9 -- Domain 7 Part 1: Incident Response and Forensics

Goal: Master IR lifecycle and digital forensics.

Daily targets:

  • Monday: IR lifecycle (detection, response, mitigation, reporting, recovery, remediation, lessons learned). Sybex Ch 17.
  • Tuesday: Forensics. Chain of custody. Evidence types (real, documentary, demonstrative, testimonial).
  • Wednesday: Digital evidence collection (volatile data, order of volatility).
  • Thursday: Legal investigations (criminal, civil, regulatory, administrative).
  • Friday: Logging and monitoring. SOC, SIEM, UEBA, EDR.
  • Saturday: Cloud forensics. Nexus Ch 57.
  • Sunday: Review + 25 practice questions.

Nexus chapters: ch09-incident-response-lifecycle.md, Chapter 57 -- Cloud Forensics.

Week 10 -- Domain 7 Part 2 + Domain 8 Part 1

Goal: DR/BC and start software security.

Daily targets:

  • Monday: Disaster recovery sites (hot, warm, cold, mobile, reciprocal). Sybex Ch 18.
  • Tuesday: Backup strategies (full, differential, incremental, 3-2-1 rule).
  • Wednesday: DR testing (checklist, tabletop, parallel, full interruption).
  • Thursday: BCP process. BIA revisited.
  • Friday: Begin Domain 8. SDLC models (Waterfall, Agile, DevOps).
  • Saturday: Secure coding. OWASP Top 10. Input validation.
  • Sunday: Review + 30 practice questions.

Nexus chapters: ch40-security-program-leadership.md.

Week 11 -- Domain 8 Part 2 + Review

Goal: Finish Domain 8 and begin cross-domain review.

Daily targets:

  • Monday: Database security (ACID, polyinstantiation, aggregation, inference). Sybex Ch 21.
  • Tuesday: SAST, DAST, IAST, SCA. Dependency scanning. SBOM.
  • Wednesday: DevSecOps. CI/CD security gates. Shift-left. IaC scanning.
  • Thursday: API security. OWASP API Top 10.
  • Friday: Maturity models (SAMM, BSIMM).
  • Saturday: Full-length practice exam 1 (150 questions, timed).
  • Sunday: Review errors. Focus on weakest domains.

Nexus chapters: ch35-devsecops-pipeline.md.

Week 12 -- Full Review and Practice Exams

Goal: Peak readiness.

Daily targets:

  • Monday: Full-length practice exam 2. Focus on time management.
  • Tuesday: Review all incorrect answers. Create flashcards for weak areas.
  • Wednesday: Full-length practice exam 3. Different provider.
  • Thursday: Review models, crypto, legal compliance (heavily tested).
  • Friday: Full-length practice exam 4. Target 80%+ consistently.
  • Saturday: Light review. Rest. Do NOT cram.
  • Sunday: Exam day (or rest day before if Monday exam). Sleep 8 hours. Eat well. Arrive early.

Practice Exam Sources

  • ISC2 Official Practice Tests (Sybex, 2nd ed)
  • Boson ExSim CISSP (harder than the real exam)
  • ThorTeaches CISSP practice questions
  • CCCure CISSP Quiz Engine

Practice Questions

This section contains 80 practice questions -- 10 per domain. Each question is scenario-based with 4 answer choices and a collapsible detailed explanation.

Use These Correctly

Do not just memorize answers. Read the explanation, understand why the correct answer is correct AND why the other three are wrong. CISSP exam questions often have two plausible answers; you must pick the best one.

Domain 1: Security and Risk Management -- Questions 1 to 10

Question 1

A security architect at a hospital is designing a new patient records system. Which of the following BEST represents the primary concern from a regulatory compliance perspective?

  • A. Ensuring the system uses AES-256 encryption at rest
  • B. Ensuring compliance with HIPAA and associated Privacy and Security Rules
  • C. Implementing multi-factor authentication for all clinicians
  • D. Deploying a Web Application Firewall in front of the patient portal
Answer and Explanation

Correct: B. Ensuring compliance with HIPAA and associated Privacy and Security Rules

The question asks for the primary regulatory compliance concern. HIPAA (Health Insurance Portability and Accountability Act) is the US federal law governing Protected Health Information (PHI). While A, C, and D are all good technical controls, they are means to achieve the regulatory goal -- not the goal itself. The CISSP exam frequently tests your ability to distinguish governance/compliance objectives from the technical controls that implement them.

Question 2

An organization experiences a data breach and discovers that an administrator granted a user excessive permissions 18 months ago. The permissions were never reviewed. Which security principle was MOST directly violated?

  • A. Defense in depth
  • B. Separation of duties
  • C. Least privilege
  • D. Due care
Answer and Explanation

Correct: C. Least privilege

Least privilege means users should have only the minimum access needed to perform their job. The scenario describes excessive permissions that were granted and not reviewed -- a direct violation of least privilege. Defense in depth (A) is about layered controls. Separation of duties (B) is about splitting responsibilities to prevent fraud. Due care (D) is the legal standard of reasonable action, which is related but less direct.

Question 3

Which of the following is the FIRST step in the risk management process per NIST SP 800-39?

  • A. Risk assessment
  • B. Risk framing
  • C. Risk response
  • D. Risk monitoring
Answer and Explanation

Correct: B. Risk framing

NIST SP 800-39 defines the risk management process as: Frame, Assess, Respond, Monitor. Framing establishes the context (risk tolerance, constraints, assumptions) BEFORE you can assess risks. This is a common trap question -- candidates often pick assessment (A) because it is the most visible activity, but framing precedes it.

Question 4

An asset valued at USD 200,000 has an exposure factor of 25% for a specific threat. The threat occurs on average twice per year. What is the ALE?

  • A. USD 50,000
  • B. USD 100,000
  • C. USD 25,000
  • D. USD 400,000
Answer and Explanation

Correct: B. USD 100,000

SLE = Asset Value x Exposure Factor = 200,000 x 0.25 = 50,000. ALE = SLE x ARO = 50,000 x 2 = 100,000.

Memorize this formula chain. Expect 2-3 quantitative risk questions on the actual exam.

Question 5

An employee in the finance department is also assigned to audit financial transactions. What security principle is MOST directly violated?

  • A. Least privilege
  • B. Separation of duties
  • C. Mandatory vacation
  • D. Job rotation
Answer and Explanation

Correct: B. Separation of duties

Separation of duties requires that no single person have enough control to complete a critical task (or commit fraud undetected). Having a finance employee audit their own department's transactions creates a conflict of interest. Least privilege (A) is related but less specific here -- the issue is not just excess access, it is the combination of execution and oversight roles.

Question 6

Which of the following BEST describes the purpose of a Business Impact Analysis (BIA)?

  • A. To identify security vulnerabilities in critical systems
  • B. To determine the financial and operational impact of business process disruptions
  • C. To develop a disaster recovery plan
  • D. To establish security policies and procedures
Answer and Explanation

Correct: B. To determine the financial and operational impact of business process disruptions

The BIA is the foundation of business continuity planning. It identifies critical business functions, determines RTO, RPO, and MTD values, and quantifies the cost of downtime. The BIA precedes the DR plan (C) -- you cannot build a DR plan without first understanding what must be recovered and how quickly.

Question 7

Which threat modeling methodology focuses on attacker perspective and risk-based analysis?

  • A. STRIDE
  • B. PASTA
  • C. Trike
  • D. VAST
Answer and Explanation

Correct: B. PASTA

PASTA (Process for Attack Simulation and Threat Analysis) is a 7-stage risk-centric methodology that emphasizes the attacker perspective and business impact. STRIDE is a mnemonic for threat categories (Spoofing, Tampering, Repudiation, Information disclosure, DoS, Elevation of privilege). Trike is an audit-based approach. VAST (Visual, Agile, Simple Threat) is for scaling across enterprise.

Question 8

An organization is subject to GDPR. A data subject requests that their personal data be deleted. Which GDPR right is being invoked?

  • A. Right to access
  • B. Right to erasure (right to be forgotten)
  • C. Right to data portability
  • D. Right to object
Answer and Explanation

Correct: B. Right to erasure (right to be forgotten)

Article 17 of the GDPR grants data subjects the right to have their personal data erased under specific conditions. The right to access (A) lets subjects see what data is held; portability (C) lets them export it; objection (D) stops specific processing (e.g., direct marketing).

Question 9

A security policy states "All workstations must be encrypted with AES-256." This is an example of a:

  • A. Policy
  • B. Standard
  • C. Procedure
  • D. Guideline
Answer and Explanation

Correct: B. Standard

Standards specify mandatory, specific technical or operational requirements. The example specifies an exact algorithm and key length -- that is a standard. A policy is higher-level (e.g., "Protect data at rest"). A procedure is step-by-step (e.g., "How to enable BitLocker"). A guideline is an optional recommendation.

Question 10

Which of the following is the BEST indication that senior management supports the security program?

  • A. An approved security policy exists
  • B. Security spending has increased year-over-year
  • C. Management actively champions security and allocates adequate resources
  • D. A CISO role has been created
Answer and Explanation

Correct: C. Management actively champions security and allocates adequate resources

Active support (tone at the top) is the strongest indicator. An approved policy (A), budget (B), or CISO role (D) can all exist as checkbox items without genuine buy-in. CISSP emphasizes that security governance is a leadership responsibility, not a document-driven one.

Domain 2: Asset Security -- Questions 11 to 20

Question 11

Who is ULTIMATELY responsible for the protection of a specific dataset?

  • A. Data custodian
  • B. Data owner
  • C. Data steward
  • D. System administrator
Answer and Explanation

Correct: B. Data owner

The data owner (typically a senior business leader) has ultimate accountability for data protection. They set classification, decide on access, and approve controls. The custodian (A) implements those controls day-to-day. The steward (C) ensures data quality. The sysadmin (D) operates systems.

Question 12

Which of the following is the MOST secure method of destroying magnetic hard drives that previously stored classified information?

  • A. Formatting the drive multiple times
  • B. Overwriting with random data 7 times (DoD 5220.22-M)
  • C. Degaussing
  • D. Physical destruction (shredding)
Answer and Explanation

Correct: D. Physical destruction (shredding)

For classified or highly sensitive data, physical destruction is the gold standard. Degaussing (C) works for magnetic media but can fail on modern drives with strong write fields or SSDs (which are not magnetic). Overwriting (B) can leave data in bad sectors. Formatting (A) is trivially recoverable.

Question 13

Data in RAM is in which state?

  • A. At rest
  • B. In transit
  • C. In use
  • D. At destruction
Answer and Explanation

Correct: C. In use

Data states are: - At rest: Stored on disk, tape, cloud storage. - In transit: Moving over a network. - In use: Being processed in memory (RAM), CPU registers, cache.

Protecting data in use is the hardest. Techniques include memory encryption, confidential computing (Intel SGX, AMD SEV, AWS Nitro Enclaves).

Question 14

An organization classifies data as Public, Internal, Confidential, and Restricted. A user needs to share Confidential data with a third-party vendor. What should happen FIRST?

  • A. Encrypt the data with AES-256
  • B. Get approval from the data owner
  • C. Sign an NDA with the vendor
  • D. Use a secure file transfer protocol
Answer and Explanation

Correct: B. Get approval from the data owner

The data owner controls access decisions. Technical controls (A, D) and legal agreements (C) are important but follow the owner's approval. CISSP emphasizes that governance precedes implementation.

Question 15

Which of the following is MOST effective for preventing unauthorized data exfiltration via email?

  • A. Mandatory email encryption
  • B. Data Loss Prevention (DLP) with content inspection
  • C. Email spam filtering
  • D. User security awareness training
Answer and Explanation

Correct: B. Data Loss Prevention (DLP) with content inspection

DLP inspects email content against policy (e.g., SSN patterns, credit card numbers, classification tags) and blocks or alerts on violations. Encryption (A) protects confidentiality in transit but does not prevent exfiltration. Training (D) is important but not a technical control. Spam filtering (C) blocks inbound, not outbound.

Question 16

The data lifecycle stages in order are:

  • A. Create, Use, Store, Share, Archive, Destroy
  • B. Create, Store, Use, Share, Archive, Destroy
  • C. Create, Store, Share, Use, Archive, Destroy
  • D. Create, Share, Use, Store, Archive, Destroy
Answer and Explanation

Correct: B. Create, Store, Use, Share, Archive, Destroy

Mnemonic: CSUSAD. Data is created first, then stored. It can then be used (processed), shared (exchanged), archived (long-term retention), and eventually destroyed. Each stage has unique security requirements.

Question 17

Which privacy principle requires that only the minimum data needed for a specific purpose is collected?

  • A. Purpose limitation
  • B. Data minimization
  • C. Accuracy
  • D. Storage limitation
Answer and Explanation

Correct: B. Data minimization

GDPR Article 5(1)(c): "adequate, relevant, and limited to what is necessary." Purpose limitation (A) means data cannot be used for reasons beyond what was originally stated. Storage limitation (D) restricts how long data is kept. Accuracy (C) requires data to be correct.

Question 18

A tape archive of 10-year-old financial records needs to be destroyed. What is the BEST method?

  • A. Overwrite with random data
  • B. Incineration
  • C. Magnetic degaussing
  • D. Chemical dissolution
Answer and Explanation

Correct: B. Incineration

For magnetic tape, incineration (or industrial shredding) is the most reliable destruction method. Degaussing (C) works but residual magnetism can sometimes remain. Overwriting tape (A) is mechanically impractical for archival tapes. Chemical dissolution (D) is not a standard tape destruction method.

Question 19

Which role is responsible for labeling data according to classification policy?

  • A. Data subject
  • B. Data controller
  • C. Data owner
  • D. Data processor
Answer and Explanation

Correct: C. Data owner

The data owner classifies and labels data. The data subject (A) is the individual the data is about. The controller (B) determines the purpose and means of processing under GDPR. The processor (D) acts on behalf of the controller.

Question 20

Tokenization differs from encryption in that:

  • A. Tokenization uses symmetric keys; encryption uses asymmetric
  • B. Tokens are reversible; encrypted values are not
  • C. Tokens have no mathematical relationship to the original data
  • D. Tokenization is slower than encryption
Answer and Explanation

Correct: C. Tokens have no mathematical relationship to the original data

Tokenization replaces sensitive data with randomly generated tokens stored in a vault. There is no algorithm that maps token to plaintext without the vault. Encryption uses a key and algorithm that mathematically transform the data. Both are reversible -- tokenization via vault lookup, encryption via key.

Domain 3: Security Architecture and Engineering -- Questions 21 to 30

Question 21

In the Bell-LaPadula model, the simple security property (no read up) prevents a subject from:

  • A. Writing data to a higher classification level
  • B. Reading data at a higher classification level
  • C. Reading data at a lower classification level
  • D. Writing data to a lower classification level
Answer and Explanation

Correct: B. Reading data at a higher classification level

Bell-LaPadula (confidentiality): - Simple Security Property (ss-property): No read up. - Star Property (*-property): No write down.

Biba (integrity) is the OPPOSITE: - Simple Integrity: No read down. - Star Integrity: No write up.

Question 22

A CA issues a certificate with a validity period of 2 years. The private key is compromised after 6 months. What is the PRIMARY mechanism to inform relying parties?

  • A. Update the CA's trust anchor
  • B. Publish the certificate on a Certificate Revocation List (CRL)
  • C. Reissue the certificate
  • D. Disable the CA
Answer and Explanation

Correct: B. Publish the certificate on a Certificate Revocation List (CRL)

CRLs are how CAs communicate revoked certificates. OCSP is the real-time alternative. The CA remains valid; only this specific certificate is revoked.

Question 23

Which symmetric algorithm is a block cipher with a 128-bit block size and key sizes of 128, 192, or 256 bits?

  • A. DES
  • B. 3DES
  • C. AES
  • D. RC4
Answer and Explanation

Correct: C. AES

AES (Advanced Encryption Standard, FIPS 197) uses a 128-bit block and 128/192/256-bit keys. DES (A) uses 64-bit blocks and 56-bit keys (insecure). 3DES (B) uses 64-bit blocks and 112/168-bit effective keys (deprecated). RC4 (D) is a stream cipher.

Question 24

A digital signature provides which of the following?

  • A. Confidentiality only
  • B. Integrity and authentication only
  • C. Integrity, authentication, and non-repudiation
  • D. Confidentiality and integrity only
Answer and Explanation

Correct: C. Integrity, authentication, and non-repudiation

A digital signature is created by hashing the message and encrypting the hash with the sender's private key. The recipient decrypts with the sender's public key and verifies the hash. - Integrity: Hash detects tampering. - Authentication: Only the sender has the private key. - Non-repudiation: Sender cannot deny signing.

Signatures do NOT provide confidentiality (the message is not encrypted, only the hash is).

Question 25

Which fire class involves energized electrical equipment?

  • A. Class A
  • B. Class B
  • C. Class C
  • D. Class D
Answer and Explanation

Correct: C. Class C

  • Class A: Ordinary combustibles (wood, paper, cloth).
  • Class B: Flammable liquids (gasoline, oil).
  • Class C: Energized electrical equipment (servers, wiring).
  • Class D: Combustible metals (magnesium, sodium).
  • Class K: Cooking oils and fats.

For Class C, use CO2 or clean agent (FM-200, Novec 1230). NEVER use water on energized equipment.

Question 26

Which evaluation level under the Common Criteria is MOST rigorous?

  • A. EAL1
  • B. EAL4
  • C. EAL7
  • D. EAL10
Answer and Explanation

Correct: C. EAL7

Common Criteria has EAL1 (functionally tested) through EAL7 (formally verified design and tested). EAL10 does not exist. Most commercial products target EAL4 (methodically designed, tested, reviewed).

Question 27

A mantrap is an example of what type of control?

  • A. Administrative preventive
  • B. Technical detective
  • C. Physical preventive
  • D. Physical compensating
Answer and Explanation

Correct: C. Physical preventive

A mantrap (now commonly called an airlock or access vestibule) physically prevents unauthorized entry. It is a physical control (tangible barrier) and preventive (stops the action before it occurs).

Question 28

The Biba security model is primarily concerned with:

  • A. Confidentiality
  • B. Integrity
  • C. Availability
  • D. Non-repudiation
Answer and Explanation

Correct: B. Integrity

Biba prevents untrusted data from corrupting trusted data. Simple integrity: no read down. Star integrity: no write up. Example: a low-integrity user cannot write to a high-integrity financial system.

Question 29

Elliptic Curve Cryptography (ECC) offers which advantage over RSA?

  • A. Larger key sizes for higher security
  • B. Equivalent security with smaller key sizes
  • C. Ability to encrypt larger messages
  • D. Perfect forward secrecy by default
Answer and Explanation

Correct: B. Equivalent security with smaller key sizes

A 256-bit ECC key provides roughly equivalent security to a 3072-bit RSA key. This makes ECC ideal for constrained devices (IoT, mobile, smart cards). Perfect forward secrecy (D) depends on the protocol, not the algorithm.

Question 30

Which attack involves pre-computing hashes for common passwords?

  • A. Brute force
  • B. Dictionary attack
  • C. Rainbow table
  • D. Birthday attack
Answer and Explanation

Correct: C. Rainbow table

Rainbow tables are pre-computed chains of hashed password candidates, optimized for storage. Salt defeats rainbow tables because each user's hash uses a unique salt. Dictionary attacks (B) iterate through a wordlist at runtime. Brute force (A) tries every combination. Birthday (D) exploits hash collisions.

Domain 4: Communication and Network Security -- Questions 31 to 40

Question 31

At which OSI layer does TLS operate?

  • A. Layer 4 (Transport)
  • B. Layer 5 (Session)
  • C. Layer 6 (Presentation)
  • D. Layer 7 (Application)
Answer and Explanation

Correct: B. Layer 5 (Session) -- with some nuance.

TLS is typically mapped to Layer 5 (Session) in CISSP materials because it manages sessions between client and server. Some references place it at Layer 6 (Presentation) because it handles encryption/decryption. The CISSP exam most commonly cites Layer 5. Know both views.

Question 32

Which of the following BEST describes a DMZ?

  • A. A secure internal network zone
  • B. A network segment between the internal and external networks that hosts public-facing services
  • C. A VLAN for guest users
  • D. A management network for network devices
Answer and Explanation

Correct: B. A network segment between the internal and external networks that hosts public-facing services

A DMZ (Demilitarized Zone) or screened subnet hosts services that must be accessible from the Internet (web, email, DNS) while isolating them from the internal network. Typical IPs might use 203.0.113.0/24 (RFC 5737 documentation range) or 10.50.0.0/24 internal.

Question 33

Which protocol provides confidentiality, integrity, and authentication at the network layer?

  • A. TLS
  • B. SSH
  • C. IPsec
  • D. HTTPS
Answer and Explanation

Correct: C. IPsec

IPsec operates at Layer 3. It provides: - AH (Authentication Header): Integrity and authentication. - ESP (Encapsulating Security Payload): Confidentiality, integrity, authentication.

IPsec can be used in transport mode (end-to-end) or tunnel mode (VPN).

Question 34

Kerberos uses which type of cryptography for ticket encryption?

  • A. Asymmetric
  • B. Symmetric
  • C. Hash-only
  • D. Steganographic
Answer and Explanation

Correct: B. Symmetric

Kerberos uses symmetric encryption (AES by default in modern implementations). Each principal shares a long-term symmetric key with the KDC. Session keys are also symmetric.

Question 35

A network engineer wants to prevent ARP spoofing on a switched network. Which feature helps MOST?

  • A. Port security
  • B. Dynamic ARP Inspection (DAI)
  • C. Spanning Tree Protocol
  • D. VLAN tagging
Answer and Explanation

Correct: B. Dynamic ARP Inspection (DAI)

DAI validates ARP packets against a trusted DHCP snooping binding table. It rejects invalid IP-to-MAC mappings. Port security (A) limits MAC addresses per port but does not inspect ARP. STP (C) prevents Layer 2 loops. VLAN tagging (D) separates broadcast domains.

Question 36

WPA3 uses which protocol for key exchange (replacing the PSK handshake of WPA2)?

  • A. EAP-TLS
  • B. SAE (Simultaneous Authentication of Equals)
  • C. PEAP
  • D. TKIP
Answer and Explanation

Correct: B. SAE (Simultaneous Authentication of Equals)

WPA3-Personal uses SAE (a.k.a. Dragonfly) to mitigate offline dictionary attacks that plagued WPA2-PSK. It provides forward secrecy.

Question 37

Which firewall type examines the entire packet and tracks connection state?

  • A. Packet filter
  • B. Stateful inspection
  • C. Application proxy
  • D. Circuit-level gateway
Answer and Explanation

Correct: B. Stateful inspection

Stateful firewalls maintain a state table of active connections and allow return traffic for established sessions. Packet filters (A) are stateless. Application proxies (C) operate at Layer 7 and inspect application data. Circuit-level gateways (D) operate at Layer 5.

Question 38

Which network attack floods a target with SYN packets, exhausting its connection table?

  • A. Smurf attack
  • B. Ping of death
  • C. SYN flood
  • D. Teardrop
Answer and Explanation

Correct: C. SYN flood

SYN flood exploits the TCP 3-way handshake. Attacker sends SYN, target allocates a half-open connection, attacker never completes the handshake. Mitigation: SYN cookies, connection rate limits.

Question 39

In a site-to-site VPN using IPsec, which mode is typically used?

  • A. Transport mode
  • B. Tunnel mode
  • C. Anycast mode
  • D. Multicast mode
Answer and Explanation

Correct: B. Tunnel mode

Tunnel mode encrypts the entire original IP packet and adds a new outer IP header. This is standard for site-to-site VPNs where gateway-to-gateway encryption is needed. Transport mode encrypts only the payload and is used for end-to-end host-to-host.

Question 40

A penetration tester observes that hostnames like db01.example.com resolve to public IPs when queried externally. What is the risk?

  • A. DNS poisoning
  • B. Information disclosure exposing internal infrastructure
  • C. BGP hijacking
  • D. DNS amplification
Answer and Explanation

Correct: B. Information disclosure exposing internal infrastructure

External DNS should not reveal internal host naming conventions or internal IPs. Split DNS (separate external vs internal zones) prevents this. The other attacks (A, C, D) are real threats but not what this scenario describes.

Domain 5: Identity and Access Management -- Questions 41 to 50

Question 41

Which authentication factor is MOST susceptible to phishing?

  • A. Something you know (password)
  • B. Something you have (hardware token)
  • C. Something you are (biometric)
  • D. Somewhere you are (location)
Answer and Explanation

Correct: A. Something you know (password)

Passwords are trivially phished. Phishing-resistant authentication uses FIDO2/WebAuthn with hardware keys (B) that cryptographically bind the authentication to the origin domain.

Question 42

In Kerberos, the TGT (Ticket Granting Ticket) is issued by:

  • A. The client
  • B. The Ticket Granting Service (TGS)
  • C. The Authentication Server (AS)
  • D. The application server
Answer and Explanation

Correct: C. The Authentication Server (AS)

Kerberos flow: 1. Client authenticates to AS and receives TGT. 2. Client presents TGT to TGS and receives a service ticket. 3. Client presents service ticket to the application server.

The AS and TGS together make up the KDC (Key Distribution Center).

Question 43

Which access control model uses attributes like user department, resource sensitivity, and time of day?

  • A. DAC
  • B. MAC
  • C. RBAC
  • D. ABAC
Answer and Explanation

Correct: D. ABAC (Attribute-Based Access Control)

ABAC evaluates policies using attributes of the subject, resource, action, and environment. XACML is a common ABAC policy language. It is more flexible than RBAC (which uses role membership) and MAC (which uses labels).

Question 44

A biometric system has an FAR of 2% and an FRR of 5%. What does this mean?

  • A. 2% of authorized users are rejected; 5% of imposters are accepted
  • B. 5% of authorized users are rejected; 2% of imposters are accepted
  • C. The CER is 3.5%
  • D. The system is highly accurate
Answer and Explanation

Correct: B. 5% of authorized users are rejected; 2% of imposters are accepted

  • FAR (False Acceptance Rate): Imposters incorrectly accepted. Lower is better for security.
  • FRR (False Rejection Rate): Legitimate users incorrectly rejected. Lower is better for usability.
  • CER (Crossover Error Rate): The point where FAR = FRR. Lower CER means better overall system.

Question 45

Which SSO protocol is most commonly used for modern web applications with mobile clients?

  • A. Kerberos
  • B. SAML 2.0
  • C. OpenID Connect (OIDC)
  • D. RADIUS
Answer and Explanation

Correct: C. OpenID Connect (OIDC)

OIDC builds on OAuth 2.0 and is designed for modern web and mobile apps. It uses JSON Web Tokens (JWT) for identity. SAML (B) is widely used in enterprise web SSO but is verbose (XML) and not as friendly for native mobile. Kerberos (A) is typical for intranet/AD environments.

Question 46

A user is promoted from Analyst to Manager but retains Analyst permissions. This is:

  • A. Privilege creep
  • B. Least privilege violation
  • C. Both A and B
  • D. Acceptable if documented
Answer and Explanation

Correct: C. Both A and B

Privilege creep (A) is the accumulation of permissions over time as users change roles. It directly violates least privilege (B). Best practice: regular entitlement reviews, access recertification, use of roles that are revoked and re-granted rather than additively accumulated.

Question 47

A Pass-the-Hash attack succeeds because:

  • A. The attacker cracks the password offline
  • B. NTLM uses the password hash as the authentication credential itself
  • C. The attacker intercepts the password in transit
  • D. Kerberos delegation is misconfigured
Answer and Explanation

Correct: B. NTLM uses the password hash as the authentication credential itself

In NTLM, the hash IS the credential. Possessing the hash is equivalent to possessing the password. Mitigations: disable NTLM, use Kerberos with AES, enforce credential guard, limit local admin rights.

Question 48

Federation enables:

  • A. Users to authenticate once and access multiple services within a single organization
  • B. Users to authenticate with one identity provider and access services across multiple organizations
  • C. Automated provisioning across HR systems
  • D. Shared password stores between applications
Answer and Explanation

Correct: B. Users to authenticate with one identity provider and access services across multiple organizations

Federation extends SSO across trust boundaries. Example: a user at partner-a.example.com authenticates once and accesses resources at partner-b.example.com via SAML assertions. Option A describes internal SSO, not federation.

Question 49

Which access control mechanism is based on the military model with mandatory labels like "Top Secret" and "Confidential"?

  • A. DAC
  • B. MAC
  • C. RBAC
  • D. ABAC
Answer and Explanation

Correct: B. MAC (Mandatory Access Control)

MAC enforces system-wide rules based on labels. Users cannot override classifications. DAC (A) gives the data owner discretion. RBAC (C) uses roles. ABAC (D) uses attributes.

Question 50

Which of the following BEST describes Just-in-Time (JIT) access?

  • A. Permanent assignment of admin rights
  • B. Temporary elevation of privileges only when needed, with automatic expiration
  • C. Scheduled nightly batch permissions
  • D. Role-based access control
Answer and Explanation

Correct: B. Temporary elevation of privileges only when needed, with automatic expiration

JIT access (also called ephemeral access) reduces the attack surface by granting privileges only when needed and revoking them automatically. Common in cloud IAM (Azure PIM, AWS IAM Identity Center, CyberArk).

Domain 6: Security Assessment and Testing -- Questions 51 to 60

Question 51

Which type of test evaluates running applications by sending inputs and observing outputs?

  • A. SAST
  • B. DAST
  • C. SCA
  • D. IAST
Answer and Explanation

Correct: B. DAST (Dynamic Application Security Testing)

DAST runs against a deployed application and probes it like an attacker would. SAST (A) analyzes source code statically. SCA (C) scans dependencies. IAST (D) combines both by instrumenting the running app.

Question 52

A black-box penetration test provides the tester with:

  • A. Full source code and system documentation
  • B. Partial information about the target environment
  • C. No prior information about the target
  • D. Administrative credentials
Answer and Explanation

Correct: C. No prior information about the target

Black-box simulates an external attacker with no internal knowledge. White-box (A) gives full access. Gray-box (B) provides partial info, simulating an insider or post-compromise attacker.

Question 53

A SOC 2 Type 2 report differs from Type 1 in that Type 2:

  • A. Is less rigorous
  • B. Covers a specific point in time
  • C. Covers a period of time (typically 6-12 months) and tests operating effectiveness
  • D. Is only for financial controls
Answer and Explanation

Correct: C. Covers a period of time (typically 6-12 months) and tests operating effectiveness

SOC 2 Type 1 evaluates design at a point in time. SOC 2 Type 2 evaluates operating effectiveness over a period, making it more valuable for customer assurance.

Question 54

KRIs (Key Risk Indicators) are BEST described as:

  • A. Metrics showing the current state of security posture
  • B. Forward-looking metrics that signal potential risk before it materializes
  • C. Compliance checklists
  • D. Audit findings
Answer and Explanation

Correct: B. Forward-looking metrics that signal potential risk before it materializes

KRIs are leading indicators. Example: trending up in failed login attempts may signal credential attacks. KPIs (A) are lagging indicators of performance.

Question 55

What is the PRIMARY purpose of a synthetic transaction?

  • A. To test application performance under load
  • B. To simulate user actions for availability and functionality monitoring
  • C. To test disaster recovery
  • D. To scan for vulnerabilities
Answer and Explanation

Correct: B. To simulate user actions for availability and functionality monitoring

Synthetic transactions are scripted user flows (login, search, checkout) run on a schedule. They alert when functionality breaks before real users notice. Examples: Pingdom, Datadog Synthetics.

Question 56

Which of the following is the BEST source of attacker TTP (Tactics, Techniques, Procedures) intelligence for detection engineering?

  • A. Vendor marketing materials
  • B. MITRE ATT&CK framework
  • C. OWASP Top 10
  • D. CVE database
Answer and Explanation

Correct: B. MITRE ATT&CK framework

ATT&CK catalogs real-world attacker behaviors across tactics (why) and techniques (how). Use it to map detections and identify gaps. OWASP Top 10 (C) is focused on web app vulnerabilities. CVE (D) is vulnerability identifiers, not behavioral TTPs.

Question 57

Which type of assessment engages both red (offensive) and blue (defensive) teams collaboratively?

  • A. Black-box penetration test
  • B. Red team engagement
  • C. Purple team exercise
  • D. Vulnerability scan
Answer and Explanation

Correct: C. Purple team exercise

Purple team exercises are collaborative. The red team executes TTPs, the blue team works to detect and respond in real time, and they share findings to improve controls. This is different from a traditional red team (B) which is adversarial.

Question 58

Log retention for most compliance frameworks (PCI DSS, HIPAA, SOX) is typically at least:

  • A. 30 days
  • B. 90 days
  • C. 1 year
  • D. 7 years
Answer and Explanation

Correct: C. 1 year

PCI DSS requires 1 year with 3 months readily available. HIPAA audit logs typically require 6 years (older than most recent 1 year). SOX financial records require 7 years. For a general CISSP answer, 1 year is the common floor; check the specific framework.

Question 59

Which of the following is a code review approach where developers review each other's code before merging?

  • A. SAST
  • B. Peer review
  • C. Formal inspection
  • D. Walkthrough
Answer and Explanation

Correct: B. Peer review

Peer review (common in modern dev workflows as pull request reviews) is informal and collaborative. Formal inspection (C) is a structured, documented review with defined roles. Walkthroughs (D) are author-led demonstrations. SAST (A) is automated.

Question 60

What is the primary output of a penetration test?

  • A. A list of CVEs
  • B. A detailed report with findings, exploitation evidence, risk ratings, and remediation recommendations
  • C. A compliance certificate
  • D. Source code
Answer and Explanation

Correct: B. A detailed report with findings, exploitation evidence, risk ratings, and remediation recommendations

A pentest report includes executive summary, technical findings, proof-of-concept evidence, risk ratings (often CVSS), and actionable remediation. A CVE list (A) is a vuln scan output. Compliance certs (C) come from audits, not pentests.

Domain 7: Security Operations -- Questions 61 to 70

Question 61

The correct order of the incident response lifecycle is:

  • A. Detect, Respond, Recover, Lessons Learned
  • B. Prepare, Detect and Analyze, Contain/Eradicate/Recover, Post-Incident
  • C. Identify, Protect, Detect, Respond, Recover
  • D. Plan, Do, Check, Act
Answer and Explanation

Correct: B. Prepare, Detect and Analyze, Contain/Eradicate/Recover, Post-Incident

NIST SP 800-61r2 defines the IR lifecycle as: 1. Preparation 2. Detection and Analysis 3. Containment, Eradication, Recovery 4. Post-Incident Activity (lessons learned)

Option C is the NIST CSF functions (different framework). Option D is PDCA.

Question 62

The order of volatility (most volatile to least) is:

  • A. Hard disk, RAM, registers, swap
  • B. Registers/cache, RAM, swap, hard disk, archival media
  • C. Network traffic, hard disk, registers, RAM
  • D. RAM, registers, swap, hard disk
Answer and Explanation

Correct: B. Registers/cache, RAM, swap, hard disk, archival media

RFC 3227 defines the order. Collect the most volatile first because it disappears on power-off or reboot. Registers and CPU cache are the most ephemeral.

Question 63

Which DR site offers the FASTEST recovery time but the HIGHEST cost?

  • A. Hot site
  • B. Warm site
  • C. Cold site
  • D. Reciprocal agreement
Answer and Explanation

Correct: A. Hot site

Hot site: fully operational, real-time data replication, can fail over in minutes. Warm site: hardware in place, data needs loading (hours). Cold site: empty facility (days-weeks). Reciprocal: informal partner agreement (risky).

Question 64

Which backup strategy requires the fewest backup tapes to restore?

  • A. Full only
  • B. Full + incremental
  • C. Full + differential
  • D. Snapshots
Answer and Explanation

Correct: A. Full only

Full-only: restore 1 tape. Full + differential: restore 2 (last full + last differential). Full + incremental: restore full plus every incremental since. Snapshots (D) are point-in-time and can vary.

Question 65

Chain of custody MUST include:

  • A. Only the initial collector's name
  • B. Every person who handled the evidence, the date, time, and purpose
  • C. Only digital signatures
  • D. Only the final disposition
Answer and Explanation

Correct: B. Every person who handled the evidence, the date, time, and purpose

Chain of custody is a documented record of who possessed evidence, when, and why. Gaps in the chain can make evidence inadmissible in court.

Question 66

A privileged user account was used at 3 AM to access a file server from an IP 203.0.113.45 (external, unusual). The SOC should FIRST:

  • A. Disable the account
  • B. Investigate to determine if the activity is legitimate or malicious
  • C. Reformat the file server
  • D. Notify law enforcement
Answer and Explanation

Correct: B. Investigate to determine if the activity is legitimate or malicious

Disabling the account (A) may alert an attacker if compromised, or disrupt legitimate work. Investigation first -- check logs, contact the user via a trusted channel, review file access. Law enforcement (D) is premature without confirmed criminal activity.

Question 67

Which RAID level provides striping WITHOUT redundancy?

  • A. RAID 0
  • B. RAID 1
  • C. RAID 5
  • D. RAID 10
Answer and Explanation

Correct: A. RAID 0

RAID 0 stripes for performance, no redundancy. RAID 1 mirrors. RAID 5 uses striped parity (single disk tolerance). RAID 10 mirrors then stripes.

Question 68

MTD (Maximum Tolerable Downtime) is:

  • A. The maximum time a system can be down before the business suffers unacceptable damage
  • B. The time it takes to restore from backup
  • C. The age of the oldest data loss acceptable
  • D. The time between backups
Answer and Explanation

Correct: A. The maximum time a system can be down before the business suffers unacceptable damage

MTD is the business-defined threshold. RTO (recovery time objective) is the technical target, typically set LESS THAN MTD. RPO (recovery point objective) is about data loss (C). WRT is Work Recovery Time.

Question 69

Which type of evidence is a witness's verbal account of events?

  • A. Real evidence
  • B. Documentary evidence
  • C. Testimonial evidence
  • D. Demonstrative evidence
Answer and Explanation

Correct: C. Testimonial evidence

  • Real: physical objects (seized laptop).
  • Documentary: records (logs, emails).
  • Testimonial: witness accounts.
  • Demonstrative: aids to help explain (charts, animations).

Question 70

A critical vulnerability (CVSS 9.8) is announced in production software. The company's change management process requires a 14-day review. What should happen?

  • A. Wait the full 14 days regardless
  • B. Invoke the emergency change process to patch immediately
  • C. Ignore the change process and patch anyway without approval
  • D. Disable the affected system indefinitely
Answer and Explanation

Correct: B. Invoke the emergency change process to patch immediately

Every mature change management process includes an emergency change pathway with expedited approval. Bypassing the process entirely (C) is a governance violation even if the patch is correct. Indefinite outages (D) are usually unacceptable.

Domain 8: Software Development Security -- Questions 71 to 80

Question 71

The OWASP Top 10 category "Injection" includes which of the following?

  • A. SQL injection only
  • B. SQL, LDAP, OS command, XPath injection
  • C. XSS attacks
  • D. Buffer overflows
Answer and Explanation

Correct: B. SQL, LDAP, OS command, XPath injection

Injection is a broad category covering any interpreter-based attack where untrusted input is treated as code. XSS (C) is a separate category (Cross-Site Scripting / Broken Access Control in recent OWASP Top 10).

Question 72

The BEST defense against SQL injection is:

  • A. Input filtering (reject single quotes)
  • B. Parameterized queries / prepared statements
  • C. Web Application Firewall
  • D. Output encoding
Answer and Explanation

Correct: B. Parameterized queries / prepared statements

Parameterized queries send SQL and data separately, so user input cannot change query structure. Filtering (A) can be bypassed. WAFs (C) are a layer but not a cure. Output encoding (D) helps against XSS, not SQLi.

Question 73

In a DevSecOps CI/CD pipeline, which scan typically runs EARLIEST (shift-left)?

  • A. DAST
  • B. SAST
  • C. Penetration test
  • D. Compliance audit
Answer and Explanation

Correct: B. SAST

SAST can run as part of the IDE, pre-commit hooks, or pull request checks -- the earliest possible points. DAST requires a deployed app. Pentests and audits are late-stage.

Question 74

Which database concept prevents an unauthorized user from inferring classified information from aggregated queries?

  • A. Polyinstantiation
  • B. Inference control
  • C. Referential integrity
  • D. Normalization
Answer and Explanation

Correct: B. Inference control

Inference occurs when a user combines non-sensitive data to deduce sensitive facts. Controls include query limits, aggregation limits, and differential privacy. Polyinstantiation (A) is creating multiple versions of data at different classification levels to handle cover stories.

Question 75

The Agile principle that benefits security MOST is:

  • A. Comprehensive documentation over working software
  • B. Following a plan over responding to change
  • C. Individuals and interactions, working software, customer collaboration, responding to change
  • D. Big Design Up Front (BDUF)
Answer and Explanation

Correct: C. Individuals and interactions, working software, customer collaboration, responding to change

These are the Agile Manifesto values. Security benefits from short iterations (rapid patching), continuous feedback, and embedded security stories. BDUF (D) is a waterfall trait. Option A is the opposite of Agile.

Question 76

Which SDLC phase should include threat modeling?

  • A. Requirements
  • B. Design
  • C. Implementation
  • D. Deployment
Answer and Explanation

Correct: B. Design

Threat modeling is most impactful during design, when architectural changes are still cheap. Some threat modeling also happens in requirements (A) to set security objectives. Adding it later (C, D) means any architectural flaws are expensive to fix.

Question 77

Which of the following BEST describes Software Composition Analysis (SCA)?

  • A. Scanning source code for vulnerabilities
  • B. Scanning a running application for vulnerabilities
  • C. Identifying and analyzing open-source dependencies for known CVEs and license issues
  • D. Reviewing code for business logic flaws
Answer and Explanation

Correct: C. Identifying and analyzing open-source dependencies for known CVEs and license issues

SCA (e.g., Snyk, Dependabot, OWASP Dependency-Check) inspects your package manifests and compares versions against vulnerability databases. Critical for supply chain security (SBOM, log4shell response).

Question 78

A SQL stored procedure parameterized properly still suffers SQL injection if:

  • A. The procedure concatenates input into a dynamic SQL EXECUTE statement
  • B. The database uses Microsoft SQL Server
  • C. The procedure runs as sa
  • D. The user has SELECT privileges
Answer and Explanation

Correct: A. The procedure concatenates input into a dynamic SQL EXECUTE statement

Parameterized procedures prevent injection only when parameters are used as values. If the procedure uses EXEC('SELECT * FROM ' + @table), the input is again treated as code and is vulnerable.

Question 79

The OWASP API Top 10 includes a category about:

  • A. Buffer overflows
  • B. Broken Object Level Authorization (BOLA / IDOR)
  • C. Social engineering
  • D. Physical attacks
Answer and Explanation

Correct: B. Broken Object Level Authorization (BOLA / IDOR)

BOLA is #1 in the OWASP API Security Top 10. It occurs when an API allows one user to access another user's objects by manipulating IDs (e.g., GET /api/accounts/12345 changed to /api/accounts/12346). Proper authorization checks on every request mitigate it.

Question 80

BSIMM and SAMM are examples of:

  • A. Compliance frameworks
  • B. Software security maturity models
  • C. Coding standards
  • D. Testing tools
Answer and Explanation

Correct: B. Software security maturity models

BSIMM (Building Security In Maturity Model) is a descriptive model based on observed practices. SAMM (OWASP Software Assurance Maturity Model) is a prescriptive model with 5 business functions and 3 maturity levels. Both help organizations benchmark and grow their software security programs.


Exam Day Tips

The Day Before

  • Do NOT cram. Your brain needs to consolidate.
  • Review a 1-page cheat sheet: models (Bell-LaPadula, Biba), formulas (SLE, ALE), OSI layers, fire classes, incident response steps.
  • Lay out required ID (two government IDs), confirm test center or online proctor setup.
  • Get 8 hours of sleep. Eat a balanced dinner.

On Exam Day

Arrive 30 Minutes Early

For test center exams, arrive 30 minutes before the appointment. Late arrival can forfeit your exam. For online proctored exams, test your webcam, internet, and room scan the day before.

CAT Strategy

  1. Read every question twice. CISSP questions often hinge on one qualifying word (MOST, FIRST, BEST, PRIMARY, LEAST). Miss the qualifier and you miss the question.
  2. Identify the domain. Before answering, ask yourself "What domain is this from?" and "What concept is being tested?"
  3. Eliminate clearly wrong answers. Most CISSP questions have at least one obviously wrong option. Cross it out in your head.
  4. Pick the BEST answer, not the first correct one. Two answers may be technically correct; you must choose the one that best fits the scenario.
  5. Think like a manager. When stuck between a technical and managerial answer, the managerial answer is usually correct on CISSP.

You CANNOT Go Back

In CAT format, you cannot review or change previous answers. Commit and move on. Do NOT linger on one question -- if you spend more than 2 minutes, make your best guess and continue.

Time Management

  • Target 90 seconds per question average.
  • If a question is taking more than 2 minutes, pick the best option and move on.
  • For 150 questions, aim to be at question 75 around the 90-minute mark.

Breaks

  • You can take unscheduled breaks, but the clock keeps running (except when a proctor pauses for administrative reasons).
  • Plan for one 5-minute restroom break around the halfway point if needed.
  • Bring water and a snack if allowed by the test center.

Managing Test Anxiety

  1. Breathing: Before the exam, do 4-7-8 breathing (inhale 4 sec, hold 7, exhale 8).
  2. Reframing: If you blank on a question, skip the panic loop -- say "this is just data, I've seen harder."
  3. Anchor: Remember a successful practice exam moment. You prepared. You know this.

Handling a Hard Question

If you get a hard question, it likely means you're doing well (CAT algorithm gives harder questions when you answer correctly). Do NOT panic. Apply your process:

  1. Identify the domain and core concept.
  2. Eliminate 2 answers confidently.
  3. Choose between the remaining 2 based on "BEST" / "MOST" / "FIRST".
  4. Commit and move on.

What to Do If You Fail

If you don't pass:

  1. Don't panic. Many excellent professionals fail on their first attempt. The reattempt policies allow retake after 30 days (1st retry), 90 days (2nd), and 180 days (3rd within a year).
  2. Review your score report. ISC2 provides a feedback report showing weak domains.
  3. Adjust your study plan to focus on weak areas.
  4. Take more practice exams (Boson ExSim is closest to the real thing).
  5. Consider a bootcamp if self-study isn't working.

Post-Exam

Receiving the Result

You see pass/fail on the screen at the test center. You'll receive an official email from ISC2 within 6 weeks confirming your status.

The Endorsement Process

  1. Log in to your ISC2 account.
  2. Complete the endorsement application with:
    • Work history (employers, titles, dates, job descriptions).
    • Domains you worked in.
    • Endorser information (an active CISSP who can verify your experience).
  3. Submit within 9 months of passing.
  4. Endorser reviews and submits.
  5. ISC2 reviews (typically 4-6 weeks).

If You Don't Have an Endorser

You can request ISC2 as your endorser. You'll need to provide additional documentation (offer letters, org charts, direct manager verification).

Continuing Professional Education (CPE)

You must earn 40 CPEs per year (120 over a 3-year cycle). CPE activities:

Activity Credits
1 hour at a security conference 1 CPE (Group A)
Reading a security book 5 CPE per book (Group A)
Writing an article or blog 5-15 CPE depending on depth (Group A)
Teaching/presenting Preparation + delivery time (Group A)
Vendor security training Hourly credit (Group A)
Non-security professional development Limited Group B credits
  • Group A (Domain-related): Required 30 per year minimum.
  • Group B (Professional development): Up to 10 per year, e.g., project management training.

Annual Maintenance Fee

  • USD 135 per year, due on your anniversary date.
  • Pay via ISC2 member portal.

Code of Ethics

All CISSPs must adhere to the ISC2 Code of Ethics:

  1. Protect society, the common good, necessary public trust and confidence, and the infrastructure.
  2. Act honorably, honestly, justly, responsibly, and legally.
  3. Provide diligent and competent service to principals.
  4. Advance and protect the profession.

Violations can result in certification revocation.

CISSP Concentrations

After CISSP, you can pursue concentration certifications:

Concentration Focus Experience Required
CISSP-ISSAP Information Systems Security Architecture Professional 2 years in security architecture
CISSP-ISSEP Information Systems Security Engineering Professional 2 years in security engineering
CISSP-ISSMP Information Systems Security Management Professional 2 years in security management
graph LR
    CISSP[CISSP Base] --> ISSAP[ISSAP: Architecture]
    CISSP --> ISSEP[ISSEP: Engineering]
    CISSP --> ISSMP[ISSMP: Management]

    ISSAP --> Skills1[Architecture Frameworks<br/>Enterprise Security Arch<br/>Technology Integration]
    ISSEP --> Skills2[System Engineering<br/>NIST RMF<br/>DoD Security]
    ISSMP --> Skills3[Leadership<br/>Program Management<br/>Risk Management]

    style CISSP fill:#2d3748,color:#fff
    style ISSAP fill:#4a5568,color:#fff
    style ISSEP fill:#4a5568,color:#fff
    style ISSMP fill:#4a5568,color:#fff

CISSP vs Concentrations Comparison

Aspect CISSP ISSAP ISSEP ISSMP
Scope Broad, all 8 domains Architecture depth Engineering depth Management depth
Domains 8 6 architecture-focused 5 engineering-focused 6 management-focused
Experience 5 years 2 years in arch + CISSP 2 years in eng + CISSP 2 years in mgmt + CISSP
Target Role Senior practitioner Security architect Security engineer (often DoD) Security manager / CISO
Exam length 3 hours (CAT) 3 hours 3 hours 3 hours

Resources and References

Official ISC2 Resources

  • ISC2 Official Website
  • Official Study Guide (Sybex, 9th edition) -- Mike Chapple et al.
  • Official Practice Tests (Sybex) -- Mike Chapple
  • ISC2 CBK Reference -- John Warsinske et al.

Third-Party Study Resources

  • CISSP All-in-One Exam Guide (Shon Harris legacy, Fernando Maymi co-author)
  • 11th Hour CISSP Study Guide (Eric Conrad) -- short, intense refresh
  • Destination CertPodcast (Rob Witcher) -- free YouTube / audio series, highly rated
  • Kelly Handerhan's "Why You Will Pass the CISSP" -- motivational video
  • Pete Zerger's CISSP Exam Cram (YouTube)
  • Luke Ahmed's "Study Notes and Theory" -- scenario-based question practice
  • Thor Pedersen's CISSP Courses (Udemy)

Practice Exam Platforms

  • Boson ExSim CISSP -- Considered harder than the real exam; excellent final prep.
  • CCCure CISSP Quiz Engine -- Large question bank.
  • Learnzapp CISSP -- Mobile-friendly.

Nexus SecOps Internal Resources

Use these Nexus chapters in order with your CISSP study schedule:

Community and Forums

  • r/cissp (Reddit) -- Candidate experiences and study tips
  • ISC2 Community Forums -- Official community
  • Discord: Certification Station -- Active study groups
  • LinkedIn CISSP Study Group -- Networking with current candidates
  • NIST SP 800-30 -- Risk Assessment
  • NIST SP 800-37 -- Risk Management Framework
  • NIST SP 800-53 -- Security Controls
  • NIST SP 800-61r2 -- Incident Response
  • NIST SP 800-137 -- Continuous Monitoring
  • NIST Cybersecurity Framework (CSF) 2.0
  • ISO/IEC 27001:2022 -- ISMS Requirements
  • ISO/IEC 27002:2022 -- Security Controls Code of Practice
  • OWASP Top 10 (2021)
  • OWASP API Security Top 10 (2023)
  • MITRE ATT&CK

Podcasts to Subscribe To

  • Destination CertPodcast -- CISSP-specific
  • SANS Internet Storm Center Daily Podcast
  • Risky Business
  • Security Now (Steve Gibson)
  • Darknet Diaries

Final Checklist -- One Week Before Exam

T-minus 7 Days

  • [ ] Schedule your exam slot (or confirm existing booking)
  • [ ] Take one final full-length practice exam, targeting 80%+
  • [ ] Review your weakest domain one more time
  • [ ] Prepare a 1-page "brain dump" cheat sheet (review, do NOT memorize)
  • [ ] Review the ISC2 Code of Ethics
  • [ ] Confirm IDs, test center location, or online proctor setup
  • [ ] Plan your commute or test your online environment
  • [ ] Arrange logistics (work off, childcare, meals)

T-minus 1 Day

  • [ ] Light review only. No new material.
  • [ ] Eat well, hydrate, get 8 hours of sleep.
  • [ ] Lay out IDs, comfortable clothes.
  • [ ] For online: test webcam, internet, room scan.
  • [ ] For test center: print confirmation, plan parking.

Exam Day

  • [ ] Wake early, eat a balanced breakfast.
  • [ ] Arrive 30 minutes before appointment (or log in 30 minutes early).
  • [ ] Bring required IDs.
  • [ ] Breathe. Commit. Execute your process.
  • [ ] You've got this.

Study Path Completion

Once you pass, update your Nexus SecOps profile, share your success (if you choose), and consider:

  1. Becoming a Nexus SecOps contributor -- submit content improvements via GitHub.
  2. Mentoring future CISSP candidates -- pay it forward.
  3. Pursuing a concentration (ISSAP, ISSEP, ISSMP).
  4. Exploring other certifications -- CCSP (cloud), CSSLP (software), SABSA, TOGAF.

You Are Now a CISSP

The CISSP is not the end of your journey -- it is a milestone. The real value is the mindset: a systems-level, governance-first, risk-informed, and ethically grounded approach to security. Carry it into every decision you make.


Last updated: 2026-04-16 Maintained by: Nexus SecOps community Feedback and corrections: GitHub Issues