Certified Information Security Manager (CISM) Mastery (Expert Level)

  • 40m
  • 40 questions
The Certified Information Security Manager (CISM) Mastery benchmark measures whether a learner is an information security thought leader who can describe the details of key process, procedures, benefits and consequences of the practice. A learner who scores high on this benchmark demonstrates genuine expertise and knowledge in all areas of information security and can work independently.

Topics covered

  • apply IPv4 concepts to a network environment
  • apply IPv6 concepts to a network environment
  • craft a disaster recovery plan in accordance with the RTO
  • define high availability solutions
  • describe the PKI hierarchy
  • determine the appropriate backup type given a scenario
  • determine what types of digital evidence should be gathered first
  • differentiate between authentication and authorization
  • discuss how IPsec secures network traffic
  • draw a correlation between OSI layers and TCP/IP protocols
  • identify common hardening techniques for networks and hosts
  • identify how identity and access management constitutes a critical aspect of IT security
  • identify how IPD and IPS systems differ
  • identify the common hardware used for digital forensics
  • identify the common software used for digital forensics
  • identify the relationship between IT security and business processes
  • outline how cryptography addresses IT security
  • outline how risk assessments differ from a business impact analysis
  • outline how to apply common risk management concepts, such as gap analysis, SWOT, and risk vs. incident
  • outline how to determine the risk appetite of an organization
  • outline how to manage incidents to minimize damage using IRPs
  • outline how to review incident details to increase the efficacy of the IRP (incident response plan)
  • outline how to safeguard potential digital evidence from being tampered with
  • recall how MFA enhances user sign-in security
  • recall how physical security is an important aspect of IT governance
  • recall how the first phase of IT attacks is reconnaissance
  • recall how Wi-Fi networks can be secured
  • recall when federated identities should be used
  • recognize how different server roles can be deployed and managed safely including through a jump box
  • recognize how DNS is a network name resolution service
  • recognize how immutability relates to data read-only retention
  • recognize how IT security policies must align to securing business processes
  • recognize how personnel background checks, skillsets, and responsibility are important constituents of IT governance
  • recognize how security baselines can help identify potential indicators of compromise
  • recognize the benefit of periodic penetration testing
  • recognize the benefit of periodic vulnerability assessments
  • recognize the relevance of IT security in today's business environment
  • recognize when different types of firewalls should be used
  • use change management to securely modify network and device configurations in a structured manner
  • use patch management to securely deploy updates in a structured manner