Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
Certified Information Systems Security Professional (CISSP) Exam Guide
Certified Information Systems Security Professional (CISSP) Exam Guide

Certified Information Systems Security Professional (CISSP) Exam Guide: Become a certified CISSP professional with practical exam-oriented knowledge of all eight domains

Arrow left icon
Profile Icon Ted Jordan Profile Icon Ric Daza Profile Icon Hinne Hettema
Arrow right icon
€8.99 €29.99
Full star icon Full star icon Full star icon Full star icon Full star icon 5 (5 Ratings)
eBook Sep 2024 526 pages 1st Edition
eBook
€8.99 €29.99
Paperback
€37.99
Subscription
Free Trial
Renews at €18.99p/m
Arrow left icon
Profile Icon Ted Jordan Profile Icon Ric Daza Profile Icon Hinne Hettema
Arrow right icon
€8.99 €29.99
Full star icon Full star icon Full star icon Full star icon Full star icon 5 (5 Ratings)
eBook Sep 2024 526 pages 1st Edition
eBook
€8.99 €29.99
Paperback
€37.99
Subscription
Free Trial
Renews at €18.99p/m
eBook
€8.99 €29.99
Paperback
€37.99
Subscription
Free Trial
Renews at €18.99p/m

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Product feature icon AI Assistant (beta) to help accelerate your learning
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Table of content icon View table of contents Preview book icon Preview Book

Certified Information Systems Security Professional (CISSP) Exam Guide

Pre-Assessment Test

To successfully begin any journey, you need two things. First, you must know where you are starting from. Second, you must know where you are going (your destination). The second part is easy: your goal is to pass the CISSP exam. On every journey, it is usually desirable to take the most direct path. To that end, the purpose of this chapter is to help you determine where your knowledge might be stronger and where it might be weaker.

This does not mean that if you pass all the pre-assessment questions from a given domain, it is safe to skip that domain entirely. If you plan to go through this book sequentially, chapter by chapter, then you can skip the questions in this chapter and jump right into Chapter 1, Ethics, Security Concepts, and Governance Principles. When you are done with the material in this book, you can use the questions in this chapter to help you prepare for the exam. However, if your particular study style is where you like to jump around using...

Security and Risk Management – 16%

  1. How many canons are there in the ISC2 Code of Ethics?
    1. 3
    2. 4
    3. 5
    4. 6
  2. What is the purpose of conducting a Business Impact Analysis (BIA)?
    1. Enumerating vulnerabilities and prioritizing them for the business
    2. Reporting a breach and determining its impact on the business
    3. Determining and quantifying the cybersecurity risk to the business
    4. Identifying and evaluating the impact that unexpected events have on the business
  3. Which of the following should be used to determine the risks associated with using a Cloud Provider (CP) for the backend of a mobile application?
    1. Control Objectives for Information and Related Technology (COBIT)
    2. Open Web Application Security Project (OWASP)
    3. Cloud Access Security Broker (CASB)
    4. Process for Attack Simulation and Threat Analysis (PASTA)
  4. Which privacy regulation would an international company need to meet to be compliant in Canada?
    1. Health Insurance Portability and Accountability Act (HIPAA)
    2. Personal Information Protection and...

Asset Security – 10%

  1. Which of the following roles has technical control over an information asset dataset?
    1. Data creator
    2. Data custodian
    3. Data processor
    4. Data owner
  2. Which classification type is BEST suited for information that, if compromised or accessed without authorization, could lead to criminal charges?
    1. Internal-only
    2. Confidential
    3. Restricted
    4. Public
  3. How long should an organization retain its data?
    1. 1 to 3 years
    2. It depends on the kind of data being retained
    3. At least 7 years
    4. Destroy it as soon as it is no longer needed

Security Architecture and Engineering – 13%

  1. Which class of fire extinguishers is BEST for electrical fires?
    1. Class A
    2. Class B
    3. Class C
    4. Class D
  2. Which type of attack was MOST likely used if users visiting a website are seeing anti-virus warnings about malicious code?
    1. Cross-Site Scripting (XSS)
    2. Distributed Denial of Service (DDoS)
    3. Structured Query Language (SQL) injection
    4. Buffer overflow
  3. Which method is BEST for protecting laptops?
    1. Full Disk Encryption (FDE)
    2. Advanced Encryption Standard (AES)
    3. Blowfish
    4. Multi-Factor Authentication (MFA)

Communication and Network Security – 13%

  1. Which of the following is a well-known Transmission Control Protocol (TCP) port used by Simple Mail Transfer Protocol (SMTP)?
    1. 22
    2. 21
    3. 25
    4. 79
  2. Which of the following wireless security protocols utilizes Simultaneous Authentication of Equals (SAE) for secure authentication?
    1. Wired Equivalent Privacy (WEP)
    2. Wi-Fi Protected Access 2 (WPA2)
    3. Wi-Fi Protected Access (WPA) Enterprise
    4. Wi-Fi Protected Access 3 (WPA3)
  3. Which of the following communication protocols is vulnerable to a snooping attack?
    1. Secure Shell (SSH)
    2. Layer 2 Tunneling Protocol (L2TP) v2
    3. Point-to-Point Tunneling Protocol (PPTP)
    4. Internet Protocol Security (IPsec)

Identity and Access Management (IAM) – 13%

  1. Which of the following biometric authentication methods is the fastest while also being accurate?
    1. Facial imaging
    2. Hand geometry
    3. Iris recognition
    4. Signature
  2. Which of the following components of an access control system determines what a user is allowed to do?
    1. Authentication
    2. Authorization
    3. Identification
    4. Verification
  3. Which of the following security management methodologies can make use of geo-location to grant access?
    1. Attribute-Based Access Control (ABAC)
    2. Mandatory Access Control (MAC)
    3. Discretionary Access Control (DAC)
    4. Role-Based Access Control (RBAC)

Security Assessment and Testing – 12%

  1. Which application security testing approach is the MOST cost-effective and comprehensive?
    1. Dynamic Application Security Testing (DAST)
    2. Static Application Security Testing (SAST)
    3. Interactive Application Security Testing (IAST)
    4. Penetration Testing Execution Standard (PTES)
  2. Which of the following information security metrics is the BEST Key Risk Indicator (KRI) for an e-commerce business?
    1. Mean Time To Contain (MTTC)
    2. Number of days to deactivate former employee credentials
    3. Number of systems with known vulnerabilities
    4. Percentage of business partners with effective cybersecurity policies
  3. What is the PRIMARY limitation of a Common Vulnerability Scoring System (CVSS) score?
    1. It doesn’t take into account the impact of a successful vulnerability
    2. It doesn’t take into account the attack vector
    3. It doesn’t take into account the damage to your company
    4. It doesn’t take into account the attack’s complexity

Security Operations – 13%

  1. When performing disaster recovery planning, which of the following options is the MOST applicable to determine the data backup’s frequency?
    1. Recovery Time Objective (RTO)
    2. Recovery Point Objective (RPO)
    3. Maximum Tolerable Downtime (MTD)
    4. Mean Time between Failures (MTBF)
  2. Which internal control is BEST used to prevent a single user from having control of every aspect of a change?
    1. Separation of Duties (SoD)
    2. Two-Factor Authentication (2FA)
    3. Least privilege
    4. Job history verification
  3. Which failure method for an inline Intrusion Prevention System (IPS) would BEST serve security in the event of a failure?
    1. Fail-safe
    2. Fail-open
    3. Fail-closed
    4. Failover

Software Development Security – 10%

  1. What is the PRIMARY factor in determining whether Commercial-Off-the-Shelf (COTS) software should be acquired?
    1. Procurement
    2. Business needs
    3. Development timeline
    4. Maintenance requirements
  2. What best practice should a software design team adhere to when designing secure code?
    1. Limit the runtime of all functions
    2. Write Don’t Repeat Yourself (DRY) code
    3. Use open source libraries
    4. Validate input from all untrusted data sources
  3. Which secure coding practice will assist in preventing the disclosure of sensitive information in error responses?
    1. Session management
    2. Communication security
    3. Database security
    4. Error handling and logging

Answer Key

  1. Answer B.

    This is a simple knowledge question, but it can be hard if you have never seen the Ethics page on the official ISC2 website, specifically the Code of Ethics Canons section. See https://packt.link/NRHh1.

  2. Answer D.

    The answer options can be wordy, but each describes a specific security work product. For example, A is a SAR. B is a breach report. C is a RAR. D is the best answer that matches the purpose of a BIA. See https://packt.link/4iqjJ.

  3. Answer D.

    COBIT is a security framework. OWASP is a nonprofit foundation that works to improve the security of software, which might seem like the right answer but it is not the best option. A CASB might sound right if you don’t know it is cloud-hosted software, on-premises software, or hardware that acts as an intermediary between users and cloud service providers. PASTA is the best option. See https://packt.link/cGkUc.

  4. Answer B.

    You need to be familiar with all the options to know that only the PIPEDA is...

Summary

This chapter represented a miniature version of the CISSP test and should have given you an idea of where your strengths and weaknesses are. The questions matched the domain weights specified in the exam outline, just at a smaller scale. Keep in mind that it would be impossible to truly test your knowledge of the exam outline without a pre-assessment test with a thousand questions. So, even if you got the answers right—or you guessed and got the answers right—you should still read the chapters that cover that domain.

The next chapter will start covering the material in Domain 1, including professional ethics, foundational security concepts, and governance principles.

Left arrow icon Right arrow icon
Download code icon Download Code

Key benefits

  • Explore up-to-date content meticulously aligned with the latest CISSP exam objectives
  • Understand the value of governance, risk management, and compliance
  • Assess your exam readiness with practice questions that match exam-level difficulty

Description

The (ISC)2 CISSP exam evaluates the competencies required to secure organizations, corporations, military sites, and government entities. The comprehensive CISSP certification guide offers up-to-date coverage of the latest exam syllabus, ensuring you can approach the exam with confidence, fully equipped to succeed. Complete with interactive flashcards, invaluable exam tips, and self-assessment questions, this book helps you build and test your knowledge of all eight CISSP domains. Detailed answers and explanations for all questions will enable you to gauge your current skill level and strengthen weak areas. This guide systematically takes you through all the information you need to not only pass the CISSP exam, but also excel in your role as a security professional. Starting with the big picture of what it takes to secure the organization through asset and risk management, it delves into the specifics of securing networks and identities. Later chapters address critical aspects of vendor security, physical security, and software security. By the end of this book, you'll have mastered everything you need to pass the latest CISSP certification exam and have this valuable desktop reference tool for ongoing security needs.

Who is this book for?

This book is for professionals seeking to obtain the ISC2 CISSP certification. You should have experience in at least two of the following areas: GRC, change management, network administration, systems administration, physical security, database management, or software development. Additionally, a solid understanding of network administration, systems administration, and change management is essential.

What you will learn

  • Get to grips with network communications and routing to secure them best
  • Understand the difference between encryption and hashing
  • Know how and where certificates and digital signatures are used
  • Study detailed incident and change management procedures
  • Manage user identities and authentication principles tested in the exam
  • Familiarize yourself with the CISSP security models covered in the exam
  • Discover key personnel and travel policies to keep your staff secure
  • Discover how to develop secure software from the start

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Sep 20, 2024
Length: 526 pages
Edition : 1st
Language : English
ISBN-13 : 9781800561786
Tools :

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Product feature icon AI Assistant (beta) to help accelerate your learning
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Product Details

Publication date : Sep 20, 2024
Length: 526 pages
Edition : 1st
Language : English
ISBN-13 : 9781800561786
Tools :

Packt Subscriptions

See our plans and pricing
Modal Close icon
€18.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
€189.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just €5 each
Feature tick icon Exclusive print discounts
€264.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just €5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total 117.97
ISACA Certified in Risk and Information Systems Control (CRISC®) Exam Guide
€41.99
Certified Information Systems Security Professional (CISSP) Exam Guide
€37.99
Resilient Cybersecurity
€37.99
Total 117.97 Stars icon
Banner background image

Table of Contents

27 Chapters
Intro I: Becoming a CISSP Chevron down icon Chevron up icon
Intro II: Pre-Assessment Test Chevron down icon Chevron up icon
Chapter 1: Ethics, Security Concepts, and Governance Principles Chevron down icon Chevron up icon
Chapter 2: Compliance, Regulation, and Investigations Chevron down icon Chevron up icon
Chapter 3: Security Policies and Business Continuity Chevron down icon Chevron up icon
Chapter 4: Risk Management, Threat Modeling, SCRM, and SETA Chevron down icon Chevron up icon
Chapter 5: Asset and Privacy Protection Chevron down icon Chevron up icon
Chapter 6: Information and Asset Handling Chevron down icon Chevron up icon
Chapter 7: Secure Design Principles and Controls Chevron down icon Chevron up icon
Chapter 8: Architecture Vulnerabilities and Cryptography Chevron down icon Chevron up icon
Chapter 9: Facilities and Physical Security Chevron down icon Chevron up icon
Chapter 10: Network Architecture Security Chevron down icon Chevron up icon
Chapter 11: Securing Communication Channels Chevron down icon Chevron up icon
Chapter 12: Identity, Access Management, and Federation Chevron down icon Chevron up icon
Chapter 13: Identity Management Implementation Chevron down icon Chevron up icon
Chapter 14: Designing and Conducting Security Assessments Chevron down icon Chevron up icon
Chapter 15: Designing and Conducting Security Testing Chevron down icon Chevron up icon
Chapter 16: Planning for Security Operations Chevron down icon Chevron up icon
Chapter 17: Security Operations Chevron down icon Chevron up icon
Chapter 18: Disaster Recovery Chevron down icon Chevron up icon
Chapter 19: Business Continuity, Personnel, and Physical Security Chevron down icon Chevron up icon
Chapter 20: Software Development Life Cycle Security Chevron down icon Chevron up icon
Chapter 21: Software Development Security Controls Chevron down icon Chevron up icon
Chapter 22: Securing Software Development Chevron down icon Chevron up icon
Chapter 23: Secure Coding Guidelines, Third-Party Software, and Databases Chevron down icon Chevron up icon
Chapter 24: Accessing the Online Practice Resources Chevron down icon Chevron up icon
Other Books You May Enjoy Chevron down icon Chevron up icon

Customer reviews

Rating distribution
Full star icon Full star icon Full star icon Full star icon Full star icon 5
(5 Ratings)
5 star 100%
4 star 0%
3 star 0%
2 star 0%
1 star 0%
Bill Oct 08, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
If you’re gearing up for the CISSP exam, this book is an essential tool. It thoroughly covers all the domains in a clear and structured way, making complex topics more understandable. The exam-focused approach ensures you’re concentrating on the right areas, and the practical examples help reinforce your knowledge. I especially valued the exam tips and readiness drills at the end of each chapter. This guide will enhance your confidence and readiness for the exam. Highly recommended for anyone pursuing CISSP certification!
Amazon Verified review Amazon
Alex T Oct 06, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
I enjoyed going through this book and how comprehensive it is for the CISSP and beyond. With the exam covering so much, the authors provided as much detail as possible for each domain without it being presented too much as a dry study guide. Its two chapters on identity management are particularly valuable.
Amazon Verified review Amazon
Kenneth Dolbow Oct 08, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Having passed the CISSP exam, I can confidently say the Certified Information Systems Security Professional (CISSP) Exam Guide from Packt is a fantastic resource. This book covers the extensive material needed for the exam in a clear, well-organized way, and even taught me a few new things despite already being certified.The online resources are top-notch, offering mock exams, practice questions, flashcards, and exam tips—everything you need to prepare thoroughly. I also love the chapter review questions. Testing yourself after learning is proven to improve retention, and this book excels at reinforcing key concepts.Overall, this guide is a must-have for anyone preparing for the CISSP. Highly recommended!
Amazon Verified review Amazon
Deepak Kuhar Oct 07, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
If you're preparing for the CISSP exam, this book is an invaluable resource. It covers all the domains in a clear and organized manner, making complex concepts easier to grasp. The exam-oriented approach ensures that you're focusing on the right topics, and the practical examples help solidify your understanding. I particularly appreciated the exam tips & tricks and readiness drills after each chapter. This guide will boost your confidence and preparedness for the exam. Highly recommend to anyone aiming for CISSP certification!
Amazon Verified review Amazon
Rengarajan Oct 18, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
As a CISSP certification holder i really enjoyed reading this book. This book covers all the latest concepts of the ISC2 exam for CISSP and explains the concepts in a very concise manner. There is a pre-assessment test before you go to chapter#1 which covers ethics and CIA triage very well, At the end of each chapter there is exam readiness drill which should help the candidate to assess himself well on the topics covered and prepare well for this tough exam, i highly recommend this book for any cissp aspirants.
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an eBook? Chevron down icon Chevron up icon

Where there is an eBook version of a title available, you can buy it from the book details for that title. Add either the standalone eBook or the eBook and print book bundle to your shopping cart. Your eBook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalised PDF download file. This link will remain active for 30 days. You can download backup copies of the file by logging in to your account at any time.

If you already have Adobe reader installed, then clicking on the link will download and open the PDF file directly. If you don't, then save the PDF file on your machine and download the Reader to view it.

Please Note: Packt eBooks are non-returnable and non-refundable.

Packt eBook and Licensing When you buy an eBook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it we have tried to balance the need for the ebook to be usable for you the reader with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your eBook for your own use onto any machine
  • You may not pass copies of the eBook on to anyone else
How can I make a purchase on your website? Chevron down icon Chevron up icon

If you want to purchase a video course, eBook or Bundle (Print+eBook) please follow below steps:

  1. Register on our website using your email address and the password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title. 
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Cart, or PayPal)
Where can I access support around an eBook? Chevron down icon Chevron up icon
  • If you experience a problem with using or installing Adobe Reader, the contact Adobe directly.
  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us
What eBook formats do Packt support? Chevron down icon Chevron up icon

Our eBooks are currently available in a variety of formats such as PDF and ePubs. In the future, this may well change with trends and development in technology, but please note that our PDFs are not Adobe eBook Reader format, which has greater restrictions on security.

You will need to use Adobe Reader v9 or later in order to read Packt's PDF eBooks.

What are the benefits of eBooks? Chevron down icon Chevron up icon
  • You can get the information you need immediately
  • You can easily take them with you on a laptop
  • You can download them an unlimited number of times
  • You can print them out
  • They are copy-paste enabled
  • They are searchable
  • There is no password protection
  • They are lower price than print
  • They save resources and space
What is an eBook? Chevron down icon Chevron up icon

Packt eBooks are a complete electronic version of the print edition, available in PDF and ePub formats. Every piece of content down to the page numbering is the same. Because we save the costs of printing and shipping the book to you, we are able to offer eBooks at a lower cost than print editions.

When you have purchased an eBook, simply login to your account and click on the link in Your Download Area. We recommend you saving the file to your hard drive before opening it.

For optimal viewing of our eBooks, we recommend you download and install the free Adobe Reader version 9.