Problem or issue? Click on Help icon at the bottom right of the web page and send us a ticket. We will get back to you as soon as we can.
Question Count
| # | Domain Name | Total Questions |
|---|---|---|
| 1 | 1. Access Controls | 227 |
| 2 | 2. Security Operations and Administration | 150 |
| 3 | 3. Risk Identification, Monitoring and Analysis | 58 |
| 4 | 4. Incident Response and Recovery | 153 |
| 5 | 5. Cryptography | 120 |
| 6 | 6. Network and Communications Security | 254 |
| 7 | 7. Systems and Application Security | 27 |
| # | Domain Name | Total Questions |
|---|---|---|
| 1 | 2. Information Risk Management (30%) | 127 |
| 2 | 1. Information Security Governance (24%) | 49 |
| 3 | 3. Information Security Program Development and Management (27%) | 78 |
| 4 | 4. Information Security Incident Management (19%) | 51 |
| # | Domain Name | Total Questions |
|---|---|---|
| 1 | 1. The Process of Auditing Information Systems (21%) | 37 |
| 2 | 2. Governance and Management of IT (16%) | 29 |
| 3 | 3. Information Systems Acquisition, Development and Implementation (18%) | 73 |
| 4 | 4. Information Systems Operations, Maintenance and Service Management (20%) | 93 |
| 5 | 5. Protection of Information Assets (25%) | 119 |
| # | Domain Name | Total Questions |
|---|---|---|
| 1 | Certification and Accreditation (C&A) / Risk Management Framework (RMF) | 24 |
| 2 | Systems Security Engineering | 24 |
| 3 | Technical Management | 12 |
| 4 | U.S. Government Information Assurance Related Policies and Issuances | 85 |
| # | Domain Name | Total Questions |
|---|---|---|
| 1 | 1. Network Concepts | 51 |
| 2 | 2. Network Installation & Configuration | 41 |
| 3 | 3. Network Media & Topologies | 41 |
| 4 | 4. Network Management | 44 |
| 5 | 5. Network Security | 28 |
| # | Domain Name | Total Questions |
|---|---|---|
| 1 | 1. Security and Risk Management (16%) | 463 |
| 2 | 2. Asset Security (10%) | 80 |
| 3 | 3. Security Architecture and Engineering (13%) | 312 |
| 4 | 4. Communication and Network Security (13%) | 486 |
| 5 | 5. Identity and Access Management (IAM) (13%) | 220 |
| 6 | 6. Security Assessment and Testing (12%) | 96 |
| 7 | 7. Security Operations (13%) | 402 |
| 8 | 8. Software Development Security (10%) | 152 |
| # | Domain Name | Total Questions |
|---|---|---|
| 1 | 2.0 LAN Switching Fundamentals (26%) | 21 |
| 2 | 1.0 Network Fundamentals (20%) | 0 |
| 3 | 3.0 Routing Fundamentals (25%) | 26 |
| 4 | 6.0 WAN Technologies | 17 |
| 5 | 4.0 Infrastructure Services (15%) | 14 |
| 6 | 5.0 Infrastructure Maintenance (14%) | 22 |
| 7 | CCNA Bonus: Command Line Interface Study (In Development) | 0 |
| # | Domain Name | Total Questions |
|---|---|---|
| 1 | 1.0 LAN Switching Technologies (26%) | 60 |
| 2 | 2.0 Routing Technologies (29%) | 38 |
| 3 | 3.0 WAN Technologies (16%) | 16 |
| 4 | 4.0 Infrastructure Services (14%) | 19 |
| 5 | 5.0 Infrastructure Maintenance (15%) | 18 |
| 6 | CCNA Bonus: Command Line Interface Study | 11 |
| # | Domain Name | Total Questions |
|---|---|---|
| 1 | 1.0 Risk Management (19%) | 85 |
| 2 | 2.0 Enterprise Security Architecture (25%) | 204 |
| 3 | 3.0 Enterprise Security Operations (20%) | 158 |
| 4 | 4.0 Technical Integration of Enterprise Security (23%) | 82 |
| 5 | 5.0 Research, Development and Collaboration (13%) | 17 |
| # | Domain Name | Total Questions |
|---|---|---|
| 1 | 1. Introduction to Ethical Hacking | 125 |
| 2 | 2. Footprinting and Reconnaissance | 23 |
| 3 | 3. Scanning Networks | 38 |
| 4 | 4. Enumeration | 19 |
| 5 | 5. Vulnerability Analysis | 20 |
| 6 | 6. System Hacking | 53 |
| 7 | 7. Malware Threats | 36 |
| 8 | 8. Sniffing | 40 |
| 9 | 9. Social Engineering | 19 |
| 10 | 10. Denial-of-Service | 20 |
| 11 | 11. Session Hijacking | 19 |
| 12 | 12. Evading IDS, Firewalls, and Honeypots | 21 |
| 13 | 13. Hacking Web Servers | 21 |
| 14 | 14. Hacking Web Applications | 20 |
| 15 | 15. SQL Injection | 17 |
| 16 | 16. Hacking Wireless Networks | 27 |
| 17 | 17. Hacking Mobile Platforms | 20 |
| 18 | 18. IoT Hacking | 20 |
| 19 | 19. Cloud Computing | 21 |
| 20 | 20. Cryptography | 24 |
| # | Domain Name | Total Questions |
|---|---|---|
| 1 | 1. Project Management Framework | 24 |
| 2 | 2. Project Management Roles and Responsibilities | 10 |
| 3 | 3. Project Management Processes | 27 |
| 4 | 4. Project Integration Management | 33 |
| 5 | 5. Project Scope Management | 32 |
| 6 | 6. Project Schedule Management | 32 |
| 7 | 7. Project Cost Management | 30 |
| 8 | 8. Project Quality Management | 32 |
| 9 | 9. Project Resource management | 30 |
| 10 | 10. Project Communications Management | 32 |
| 11 | 11. Project Risk Management | 32 |
| 12 | 12. Project Procurement Management | 32 |
| 13 | 13. Project Stakeholder Management | 23 |
| 14 | 14. Code of Ethics and Professional Conduct | 25 |
| 15 | 15. Final Practice Exam of 200 Questions | 200 |
| # | Domain Name | Total Questions |
|---|---|---|
| 1 | 1. Cloud Concepts, Architecture and Design (17%) | 103 |
| 2 | 2. Cloud Data Security (19%) | 52 |
| 3 | 3. Cloud Platform & Infrastructure Security (17%) | 18 |
| 4 | 4. Cloud Application Security (17%) | 27 |
| 5 | 5. Cloud Security Operations (17%) | 22 |
| 6 | 6. Legal, Risk and Compliance (13%) | 32 |
| # | Domain Name | Total Questions |
|---|---|---|
| 1 | General Security Concepts (12%) | 54 |
| 2 | Threats, Vulnerabilities, and Mitigations (22%) | 121 |
| 3 | Security Architecture (18%) | 136 |
| 4 | Security Operations (28%) | 133 |
| 5 | Security Program Management and Oversight (20%) | 81 |
| # | Domain Name | Total Questions |
|---|---|---|
| 1 | Security Principles (26%) | 61 |
| 2 | Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts (10%) | 42 |
| 3 | Access Controls Concepts (22%) | 33 |
| 4 | Network Security (24%) | 61 |
| 5 | Security Operations (18%) | 33 |