Certified Information Systems Security Management Professional (ISSMP) Practice Exam
Certified Information Systems Security Management Professional (ISSMP) Practice Exam
4.5(118 ratings)
369 Learners
What’s Included
No. of Questions558
AccessImmediate
Access DurationLife Long Access
Exam DeliveryOnline
Test ModesPractice, Exam
Certified Information Systems Security Management Professional (ISSMP) Practice Exam
The Information Systems Security Management Professional (ISSMP) is an expert in security leadership, specializing in establishing, managing, and governing information security programs while demonstrating strong management and leadership capabilities. ISSMPs manage the alignment of security initiatives with the organization’s mission, goals, and strategies to fulfill enterprise financial and operational needs while maintaining the desired risk posture.
Who should take the exam?
The ISSMP is ideal for experienced leaders responsible for overseeing enterprise-level information security. Relevant roles include:
Chief Information Officer (CIO)
Chief Information Security Officer (CISO)
Chief Technology Officer (CTO)
Senior Security Executive
Exam Requirement
To qualify, candidates must meet either of the following criteria:
Hold a valid CISSP certification in good standing and possess a minimum of two years of cumulative, full-time experience in one or more of the six domains outlined in the current ISSMP framework.
OR
Have a minimum of seven years of cumulative, full-time experience in two or more domains covered in the current ISSMP framework. Additionally, earning a post-secondary degree (bachelor's or master's) in computer science, information technology (IT), or related fields, or obtaining an additional credential from the ISC2 approved list, may substitute one year of the required experience. Part-time employment and internships may also contribute toward fulfilling the experience requirement.
Exam Details
Exam Name: Certified Information Systems Security Management Professional (ISSMP)
Length of exam: 3 hours
Number of items: 125
Item format: Multiple choice and advanced items
Passing grade: 700 out of 1000 points
Language: English
Course Outline
The Exam covers the given topics -
Domain 1: Overview of Leadership and Business Management
1.1 Establish security’s role in organizational culture, vision and mission
Defining information security program vision and mission
Aligning security with organizational goals, objectives, and values
Defining security’s relationship with the overall organization processes
Defining the relationship between organizational culture and security
1.2 Align security program with organizational governance
Identifying and navigating organizational governance structure
Verifying and validating roles of key stakeholders
Validating sources and boundaries of authorization
Advocating and obtaining organizational support for security initiatives
1.3 Define and implement information security strategies
Identifying security requirements from organizational initiatives
Evaluating capacity and capability to implement security strategies
Prescribing security architecture design
Managing implementation of security strategies
Reviewing and maintaining security strategies
1.4 Define and maintain security policy framework
Determining applicable external standards, laws, and regulations
Determining data classification and protection requirements
Establishing internal policies
Advocating and obtaining organizational support for policies
Developing procedures, standards, guidelines, and baselines
Ensuring periodic review of security policy framework
1.5 Manage security requirements in contracts and agreements
Evaluating service management agreements (e.g., risk, financial)
Obtaining and verifying organizational asset inventory
Analyzing organizational risks
Determine countermeasures, compensating and mitigating controls
Identifying risk treatment options
Conducting Cost-benefit analysis (CBA) of risk treatment options
Recommending risk treatment options to stakeholders
Documenting and managing agreed risks and issues treatments
Testing, monitoring, and reporting on risks and issues
3.2 Manage security risks within the supply chain (e.g., supplier, vendor, third-party risk, contracts)
Identifying supply chain security risk objectives
Integrating supply chain security risks into organizational risk management
Verifying and validating security risk control within the supply chain
Monitoring and reviewing the supply chain security risks
3.3 Conduct risk assessments
Identifying risk factors
Determining the risk assessment approach (e.g., qualitative, quantitative)
Performing the risk analysis
3.4 Managing risk controls
Identifying controls
Determining control effectiveness
Evaluating control coverage
Monitoring/reporting risk control effectiveness and coverage
Domain 4: Security Operations
4.1 Establish and maintain security operations center
Development of security operations center (SOC) documentation
4.2 Establish and maintain threat intelligence program
Aggregating threat data from multiple threat intelligence sources
Conducting baseline analysis of network traffic, data, and user behavior
Detecting and analyzing anomalous behavior patterns for potential concerns
Conducting threat modeling
Identifying and categorizing attacks
Correlating related security events and threat data
Defining actionable alerts
4.3 Establish and maintain incident management program
Development of program documentation
Establishing incident response (IR) case management processes
Establishing incident response (IR) team
Applying incident management methodologies
Establishing and maintaining incident handling processes
Establishing and maintaining investigation processes
Quantifying and reporting incident impacts and investigations to stakeholders
Conducting root cause analysis
Domain 5: Understand Contingency Management
5.1 Facilitate development of contingency plans
Identifying and analyzing factors related to resiliency planning (e.g., Continuity of Operations Plan (COOP), external factors, laws, regulations, business impact analysis (BIA))
Identifying and analyzing factors related to the business continuity plan (BCP) (e.g., time, resources, verification, business impact analysis (BIA))
Identifying and analyzing factors related to the disaster recovery plan (DRP) (e.g., time, resources, verification)
Coordinating contingency management plans with key stakeholders
Defining internal and external crisis communications plan
Defining and communicating contingency roles and responsibilities
Identifying and analyzing contingency impact on organization processes and priorities
5.3 Maintain contingency plan, resiliency plan (e.g., Continuity of Operations Plan (COOP)), business continuity plan (BCP) and disaster recovery plan (DRP)
Planning testing, evaluation, and modification
Determining survivability and resiliency capabilities
Managing plan update process
5.4 Manage disaster response and recovery process
Declaring and communicating disaster
Implementing plan
Restoring normal operations
Gathering lessons learned
Updating plan based on lessons learned
Domain 6: Learn about Law, Ethics and Security Compliance Management
6.1 Identify the impact of laws and regulations that relate to information security
Identifying legal jurisdictions that the organization and users operate within (e.g., trans-border data flow)
Identifying applicable security and privacy laws/regulations/standards
Identifying intellectual property laws
Identifying and advising on risks of non-compliance and non-conformity
6.2 Understand, adhere to, and promote professional ethics
ISC2 Code of Ethics
Organizational code of ethics
6.3 Validate compliance in accordance with applicable laws, regulations, and industry standards
Informing and advising senior management
Evaluating and selecting compliance framework(s)
Implementing the compliance framework(s)
Defining and monitoring compliance metrics
6.4 Coordinate with auditors and regulators in support of internal and external audit processes
Planning
Scheduling
Coordinating audit activities
Evaluating and validating findings
Formulating response
Monitoring and validating implemented mitigation and remediation actions
6.5 Document and manage compliance exceptions
Identifying and documenting controls and workarounds
Reporting and obtaining authorized approval of risk waiver