Free CISSP Practice Test: DOMAIN 6: Security Assessment and Testing + Anki Decks

Ref:📕The Official ISC2 CISSP CBK Reference 6th Edition

DOMAIN 6: Security Assessment and Testing

1 / 93

Which of the following is an example of preventative technical processes in security assessment and testing, according to DOMAIN 6 of CISSP?

2 / 93

Which of the following situations may require mandatory reporting of a discovered vulnerability?

3 / 93

Which framework requires management to periodically review the information security program for continuing suitability, adequacy, and effectiveness?

4 / 93

Which framework specifies that management must periodically review the information security program for continuing suitability, adequacy and effectiveness?

5 / 93

Which of the following is a common method of checking the status of controls in place to meet compliance objectives?

6 / 93

Compliance checks should be treated as a starting point rather than a security objective for an organizations risk management program. Which of the following statements regarding audits or assessments is true?

7 / 93

What is the purpose of Key Risk Indicators (KRIs)?

8 / 93

Which of the following is the official set of requirements and guidance for auditors performing certification audits against ISO 27001?

9 / 93

What is MTTR and why is it important in measuring the effectiveness of a security program?

10 / 93

Which of the following is a crucial example of blended control types in account management?

11 / 93

What is the importance of generating reports for security evaluations?

12 / 93

What is the goal of fingerprinting network endpoints in Phase 4 of Pen Testing?

13 / 93

Which of the following metrics could be useful to test and evaluate the effectiveness of a security training and awareness program?

14 / 93

Which of the following questions should a security practitioner seek to answer when conducting a third-party audit?

15 / 93

What are key performance indicators (KPIs) and key risk indicators (KRIs) used for in a governance, risk, and compliance (GRC) program?

16 / 93

What are the key components of documenting an exception in the exception handling process?

17 / 93

What is the main goal of implementing a process for remediation in response to security testing findings?

18 / 93

What does ISO 27001 control 9.3 specify in relation to management review?

19 / 93

What is a potential drawback of internal audits?

20 / 93

What is a possible solution to reduce the volume of traffic generated by vulnerability scanners that can lead to DoS conditions?

21 / 93

What is an architecture that places scanning agents inside network segments to allow the endpoints in that segment to be scanned and then consolidates the results to a central console?

22 / 93

Which of the following is a guide to assessing the controls outlined in NIST SP 800-53?

23 / 93

When is it appropriate to conduct assessments from an internal perspective?

24 / 93

What is the purpose of breach attack simulations (BAS) for an organization?

25 / 93

What is the main goal of conducting or facilitating a security audit?

26 / 93

What is the difference between KPIs and metrics?

27 / 93

What category of attack can be tested by a breach attack simulation tool using test messages?

28 / 93

What specific review requirements does ISO 27001 control 9.3 have for management?

29 / 93

Which compliance framework requires an ongoing annual assessment in order to maintain Authority to Operate (ATO) status?

30 / 93

What is a crucial factor to consider when choosing appropriate scanning tools and prioritizing scanning efforts in a vulnerability assessment?

31 / 93

What is the difference between black-box testing and white-box testing?

32 / 93

Which of the following is a key consideration for a sound third party audit strategy related to supply chain security?

33 / 93

Why is management support and sponsorship of security initiatives crucial?

34 / 93

What is the importance of fostering a relationship across teams with regards to vulnerability assessment?

35 / 93

What is the advantage of a recurring audit schedule?

36 / 93

Why are defined rules of behavior important to include in a pen testing engagement?

37 / 93

Which of the following is a critical element to be considered while performing security assessment and testing related to disaster recovery and business continuity (BCDR) plan?

38 / 93

Which of the following is an example of a physical control for enforcing access control in an information system?

39 / 93

What is the primary purpose of misuse case testing?

40 / 93

What is an example of a valuable KRI that can indicate that more robust security tools or additional staff are needed?

41 / 93

What is the purpose of performing a test restore from backup media?

42 / 93

What is the purpose of synthetic transactions?

43 / 93

What is a potential drawback of using external auditors for security assessments and testing?

44 / 93

Which framework requires management to establish performance measures and generate relevant, quality information to support the functioning of internal control?

45 / 93

What is the importance of marking port scans from a vulnerability scanners IP address as nonsuspicious?

46 / 93

What is responsible disclosure in terms of security research?

47 / 93

What is the final phase of a pen testing activity?

48 / 93

What is a key process data to collect from account management processes?

49 / 93

Which audit framework provides a formal assessment process for technology products against a defined set of security functional requirements?

50 / 93

What is the difference between an audit and an assessment?

51 / 93

What is full disclosure in ethical disclosure of vulnerability findings?

52 / 93

What method of testing combines elements of vulnerability scanning and automated penetration testing, and utilizes a continuously refreshed database of attack methods and newly discovered vulnerabilities?

53 / 93

Why is identifying the organizations critical assets important before performing vulnerability assessments?

54 / 93

What is a key element of governance and risk management related to security, and covered in Chapter 1?

55 / 93

When choosing and configuring a vulnerability scanner, what is a major consideration for organizations with mixed IT environments?

56 / 93

What is a key element required to design a security metrics program?

57 / 93

Which of the following is a companion to ISO 15048 and provides standards for consistent criteria and evaluation methods?

58 / 93

Which of the following is the foundation for the Common Criteria certification and is a formal assessment process for technology products against a defined set of security functional requirements?

59 / 93

What is the purpose of synthetic transactions in SLA monitoring?

60 / 93

Which section of an audit report provides a high-level overview of testing activities and findings, typically taking up no more than one page?

61 / 93

What is a benefit of utilizing a standard audit and assessment methodology?

62 / 93

Which compliance framework requires an annual audit by a third-party auditor and routine internal activities such as quarterly vulnerability scans?

63 / 93

What is the difference between full disclosure and responsible disclosure in ethical disclosure of vulnerabilities?

64 / 93

What is the purpose of interface testing in security assessments?

65 / 93

What is the purpose of the reporting phase in pen testing?

66 / 93

What is a common issue that vulnerability scanners may cause?

67 / 93

What does the Mean time to detect (MTTD) metric measure?

68 / 93

What can logs be used for in a security program?

69 / 93

What does branch coverage ensure in a program or system being tested?

70 / 93

What is the difference between white- and black-box testing in penetration testing?

71 / 93

What type of testing provides complete knowledge of the system or network to be tested, like IP addresses and system version numbers, and simulates an insider threat?

72 / 93

Which of the following best describes a KPI?

73 / 93

Which of the following is a guide to assessing the controls outlined in NIST SP 800-53?

74 / 93

What is one purpose of employing synthetic transactions as a test mechanism?

75 / 93

Which type of breach attack simulation focuses on testing security controls monitoring for malicious network scans or complex interactions with applications that should be blocked by a web application firewall (WAF)?

76 / 93

Which of the following controls might be put in place to restrict and monitor access and must contain all required information like user role, justification for access, and necessary approvals?

77 / 93

When is it advisable or even required to use an external firm for assessments, testing, or audits, according to regulatory reasons?

78 / 93

What is something that can cause issues with reports or processes that expect valid data stored in the system during automated vulnerability scanning?

79 / 93

What is a KPI?

80 / 93

Which of the following is an example of a preventative technical control?

81 / 93

Which of the following is an example of technical processes that detect incidents or deviations?

82 / 93

Which category of technical metrics measures the organizations effectiveness at implementing multilayered security by capturing metrics on preventative technical processes such as network access controls like virtual private networks (VPNs)?

83 / 93

What should physical pen testers be provided with in the event they are caught or detained?

84 / 93

Which of the following metrics can be used to measure the implementation of an organizational policy barring personal social media use on organization-issued equipment?

85 / 93

What is responsible disclosure in relation to vulnerability disclosure?

86 / 93

What is the purpose of synthetic transactions for data integrity monitoring?

87 / 93

What does black-box testing rely on?

88 / 93

What is the purpose of sampling in the audit technique?

89 / 93

Which of the following techniques would pen testers use to identify active network hosts and services running on a network?

90 / 93

Which of the following can be used as a Key Risk Indicator (KRI) to indicate security program deficiencies that require additional attention or resources?

91 / 93

What is an appropriate response to an increase in the number of phishing attempts detected or reported, as indicated by a KRI?

92 / 93

What is the goal of the exploitation phase in pen testing?

93 / 93

What is the primary purpose of performing discovery or reconnaissance during the pen testing phase of security assessment and testing?

Your score is

Share the Post:

Download Your FREE CISSP Anki Deck!

Email issues? [ [email protected] ]

Share the Post:

Understanding Domain 6 CISSP Exam: Security Assessment and Testing

Key Aspects of Domain 6 CISSP Exam

  1. Security Control Testing

    • Learn methods to test security controls.
    • Assess management, operational, and technical controls.
  2. Vulnerability Assessment

    • Identify system vulnerabilities.
    • Use tools and techniques for vulnerability assessment.
  3. Security Process Data Analysis

    • Analyze data from security processes.
    • Collect, review, and interpret data for decision-making.
  4. Security Auditing

    • Conduct audits to ensure compliance with policies.
    • Understand audit strategies and methodologies.
  5. Internal and Third-Party Audits

    • Know the difference between internal and external audits.
    • Learn their roles in improving security.

Benefits of Our CISSP Practice Exam

  • Detailed Answer Explanations: Understand the reasoning behind each answer.
  • Aligned with Exam Objectives: Covers all Domain 6 topics comprehensively.
  • Instant Feedback: Get immediate feedback to identify improvement areas.

Continuous Learning

Prepare with our “CISSP Practice Exam” to confidently tackle Domain 6 and advance your cybersecurity career.

For more information, refer to the official ISC2.

 

Related Posts

RSS  
  • WGU Master’s Degree Rankings 2026 | I Asked 3 AIs 300 Times to Find the Best One
    Table of Contents Which WGU Master’s Degree Is Actually Worth It? If you’re considering a master’s degree from WGU and can’t figure out which program to choose — cybersecurity, software engineering, AI/ML, data analytics — you’re not alone. The options are overwhelming, and most comparisons online are either outdated or purely opinion-based. So here’s a […]
  • How I Made $1.3 Million in Cybersecurity (With Exact Revenue Numbers)
    Table of Contents If you’re stuck at $50K–$100K and wondering, “How the hell do people make seven figures?” this is for you.I’m Josh Madakor. In 2025, I made $1.3 million in cybersecurity. Not from a corporate job. Not from VC funding. And definitely not from selling a bullshit course.In this article, I’ll break down everything: […]
  • The Best Laptops for Cyber Security in 2026: Stop Over-Analyzing, Start Building
    Table of Contents Let’s be real: most people think that to get into cyber security, you need to be a “super elite hacker” running 10 different virtual machines on a glowing, heavy-duty gaming laptop. Spoiler alert: That’s just not how the industry works. I’ve spent years in roles ranging from Senior Analyst to Security Engineer, […]