Skip to main content

THE CISSP EXAM



The CISSP exam is described as being “AN INCH DEEP & A MILE WIDE”

The CISSP exam covers 8 security domains making up the CISSP CBK (Common Body of Knowledge).

The CISSP exam evaluate expertise across 8 security domains.

Domain means topics you need to master based on your professional experience & education.

Passing the exam proves you have the advanced knowledge & technical skills to effectively design, implement & manage a best-in-class cybersecurity program.

The CISSP exam questions are not very detailed & do not require you to be an expert in every subject, but the questions require you to be familiar with many different security subjects.

The CISSP exam comes in 2 versions depending on the language in which the test is written. As at 18th December 2017, the CISSP exam comes in 2 different versions.

The English version is now Computer Adaptive Test (CAT). The number of questions you are asked ranges from 100 to 150. Do not forget that 25 questions will not count toward your score because they are being evaluated for inclusion in future exams. The CISPP CAT exam is about 3-hours.

The non-English version of the CISSP exam is also Computer-based but not adaptive. The non-English version comprises 250 questions. The non-English version is about 6-hours. Like CAT version, 25 questions are pretest.

Let’s talk about the domains and their exam weight:

Domain

Weight on Exam

Security & Risk Management

15%

Asset Security

10%

Security Architecture & Engineering

13%

Communication & Network Security

14%

Identity & Access Management (IAM)

13%

Security Assessment & Testing

12%

Security Operations

13%

Software Development Security

10%

 

You have to score 700 points & above out of 1000 points to pass the CISSP exam.

Regardless of which version of the exam you take, you can expect the following question format:

ü Multiple Choice

ü Drag-and-Drop

ü Hotspot

ü Scenario-Based

Comments

Popular posts from this blog

INTRODUCTION TO ETHICAL HACKING

  Technology Brief Information Security Overview Information security ensures the confidentiality, integrity, & availability. An organization without security policies & appropriate security rules are at great risk, & the confidential information & data related to that organization are not secure in the absence of these security policies. An organization along well-defined security policies & procedures helps in protecting the assets of that organization from unauthorized access & disclosures. Essential Terminologies HACK VALUE – This is a value that denotes attractiveness, interest or something that is worthy. ZERO-DAY ATTACK – This refers to threats & vulnerabilities that can exploit the victim before the developer identify or address & release patch for that vulnerability. VULNERABILITY – IT refers to a week point, loophole or a cause in any system, software, or network which can be helpful & utilized by the attackers to go t...

CISM-: INFORMATION SECURITY GOVERNANCE (LESSON ONE PART ONE)

      CERTIFIED INFORMATION SECURITY MANAGER (CISM) CERTIFICATION TRAINING DOMAIN ONE: INFORMATION SECURITY GOVERNANCE LESSON ONE: PART ONE DOMAIN DEFINITION Establish &/or maintain an information security governance framework & supporting processes to ensure that the information security strategy is aligned with organization goals & objectives. LEARNING OBJECTIVES ·         Understand the purpose of information security governance, what it consists of & how to accomplish it ·         Understand the purpose of an information security strategy, its objectives, & the reasons & steps required to develop one ·         Understand the meaning, content, creation & use of policies. Standards, procedures & guidelines & how they relate to each other ·         Develop business cases & gain commitment from ...

CERTIFIED ETHICAL HACKER v10

  C|EHv10 CERTIFICATION DESCRIPTION The Certified Ethical Hacker (C|EHv10) certification program is a trusted & respected ethical hacking certification program that any information security professional will need. Certified Ethical Hacker (C|EH) didn’t gain the reputation & value it has by being easy to attain. It’s challenging examination that tests more than just simple memorization. It’s worth has elevated it as one of the top certifications a technician can attain. This certification actually means something to employers because they know the effort it takes to attain it. C|EH is used as a hiring standard & is a core sought after certification by many of the Fortune 500 organizations, governments, cybersecurity practices, & a cyber staple in education across many of the most prominent degree programs in top universities around the globe. Hundreds of thousands of InfoSec Professionals as well as career Starter have challenged the exam & for thos...