Certified Information Security Manager (CISM) Practice Exam
Certified Information Security Manager (CISM) Practice Exam
4.5(122 ratings)
584 Learners
What’s Included
No. of Questions411
AccessImmediate
Access DurationLife Long Access
Exam DeliveryOnline
Test ModesPractice, Exam
Certified Information Security Manager (CISM) Practice Exam
The Certified Information Security Manager (CISM) certification is a globally recognized professional credential for information security (IS) management. It validates your expertise in designing, implementing, and managing an organization's information security program.
Who should take this exam?
This certification is ideal for experienced information security professionals, typically with 5 years of experience in information security management work, who are:
Information security managers
Security architects
IT security directors
Security consultants
Anyone seeking to advance their career in information security management
Roles and responsibilities:
CISM-certified individuals are responsible for:
Developing and maintaining information security policies and procedures.
Assessing and managing information security risks.
Implementing and managing security controls.
Incident response and recovery.
Security awareness and training.
Communicating security risks and strategies to business stakeholders.
Exam details:
Format: 150 multiple-choice questions
Duration: 4 hours
Passing score: 75%
Delivery: Testing center or online proctored
Course Outline
Information Security Governance (17%)
A–ENTERPRISE GOVERNANCE
Organizational Culture
Legal, Regulatory and Contractual Requirements
Organizational Structures, Roles and Responsibilities
B–INFORMATION SECURITY STRATEGY
Information Security Strategy Development
Information Governance Frameworks and Standards
Strategic Planning (e.g., Budgets, Resources, Business Case)
Information Security Risk Management (20%)
A–INFORMATION SECURITY RISK ASSESSMENT
Emerging Risk and Threat Landscape
Vulnerability and Control Deficiency Analysis
Risk Assessment and Analysis
B–INFORMATION SECURITY RISK RESPONSE
Risk Treatment / Risk Response Options
Risk and Control Ownership
Risk Monitoring and Reporting
Information Security Program (33%)
A–INFORMATION SECURITY PROGRAM DEVELOPMENT
Information Security Program Resources (e.g., People, Tools, Technologies)
Information Asset Identification and Classification
Industry Standards and Frameworks for Information Security
Information Security Policies, Procedures and Guidelines
Information Security Program Metrics
B–INFORMATION SECURITY PROGRAM MANAGEMENT
Information Security Control Design and Selection
Information Security Control Implementation and Integrations
Information Security Control Testing and Evaluation
Information Security Awareness and Training
Management of External Services (e.g., Providers, Suppliers, Third Parties, Fourth Parties)
Information Security Program Communications and Reporting
Incident Management (30%)
A–INCIDENT MANAGEMENT READINESS
Incident Response Plan
Business Impact Analysis (BIA)
Business Continuity Plan (BCP)
Disaster Recovery Plan (DRP)
Incident Classification/Categorization
Incident Management Training, Testing and Evaluation