CNL_CH_1
問題一覧
1
Removable media
2
Preventive
3
Detective
4
Preventive
5
Corrective
6
. Marketing strategies
7
Detective
8
Mitigating controls
9
SLA
10
Purchasing insurance
11
transference
12
SOC2
13
Dark web
14
Acceptance
15
Hiring an employee who has been convicted of theft to adhere to industry compliance
16
ARO
17
Deterrent controls
18
Insider threat
19
Proprietary
20
AUP
21
NIST
22
MOU
23
Data at rest
24
Transference
25
It incorporates control, development, policy, and management activities into IT operations.
26
GDPR
27
Personal health information
28
Compensating
29
Not installing new software to prevent compatibility errors
30
SLA
31
Reference architecture
32
State actors
33
NIST CSF
34
MTBF
35
Lack of vendor support
36
Corrective
37
Risk register
38
AUP
39
APT
40
Clean desk
41
AUP
42
Job Rotation policy
43
AUP
44
Compensating
45
It identifies the amount of allowable downtime for an application or system,
46
PCI DSS
47
RPO
48
Supply chain
49
Detective
50
Compensating
51
Corrective
52
PCI DSS
53
Compensating
54
Deterrent
55
Hacktivist
56
ISO 27001
57
Obfuscation
58
Threat feeds
59
Offboarding
60
Shadow IT
61
A capture-the-flag competition
62
Transference
63
designed to specifically mitigate a risk.
64
AUP
65
Data masking
66
Detective
67
Detective
68
Compensating
69
Security awareness training
70
SLE x ARO
71
GDPR
72
Authorized hacker
73
Preventive
74
A.Detective
75
Deterrent
76
Deterrent
77
NIST 800-53
78
Hacktivists
79
Shadow IT
80
Loss of proprietary information (clean desk policy)
81
Shadow IT
82
The dark web
83
An advanced persistent threat
84
TOR
85
Tokenization
86
The dark web
87
Dark web
88
SOC 2 report
89
Threat feeds
90
PCI DSS
91
Risk appetite
92
General Data Protection Regulation
93
Risk transference
94
AUP (Acceptable Use Policy)
95
Transference
96
Testing security systems and processes regularly, Assigning a unique ID to each person with computer access
97
Transference
98
Notoriety - (Söhret)
99
A security control objective cannot be met through a technical change, so the company implements a policy to train users on a more secure method of operation
100
To identify the risk, the risk owner, and the risk measures
CNL_CH_2
CNL_CH_2
Son Cagrı · 109問 · 2年前CNL_CH_2
CNL_CH_2
109問 • 2年前CNL_CH_3
CNL_CH_3
Son Cagrı · 90問 · 2年前CNL_CH_3
CNL_CH_3
90問 • 2年前CNL_CH_4
CNL_CH_4
Son Cagrı · 48問 · 2年前CNL_CH_4
CNL_CH_4
48問 • 2年前CNL_CH_5
CNL_CH_5
Son Cagrı · 83問 · 2年前CNL_CH_5
CNL_CH_5
83問 • 2年前CNL_CH_6
CNL_CH_6
Son Cagrı · 100問 · 2年前CNL_CH_6
CNL_CH_6
100問 • 2年前CNL_CH_7
CNL_CH_7
Son Cagrı · 43問 · 2年前CNL_CH_7
CNL_CH_7
43問 • 2年前CNL_CH_8
CNL_CH_8
Son Cagrı · 66問 · 2年前CNL_CH_8
CNL_CH_8
66問 • 2年前CNL_CH_9
CNL_CH_9
Son Cagrı · 49問 · 2年前CNL_CH_9
CNL_CH_9
49問 • 2年前CNL_CH_10
CNL_CH_10
Son Cagrı · 75問 · 2年前CNL_CH_10
CNL_CH_10
75問 • 2年前CNL_CH_11
CNL_CH_11
Son Cagrı · 118問 · 2年前CNL_CH_11
CNL_CH_11
118問 • 2年前CNL_CH_12
CNL_CH_12
Son Cagrı · 124問 · 2年前CNL_CH_12
CNL_CH_12
124問 • 2年前CNL_CH_13
CNL_CH_13
Son Cagrı · 95問 · 2年前CNL_CH_13
CNL_CH_13
95問 • 2年前21 Mayis
21 Mayis
Son Cagrı · 69問 · 1年前21 Mayis
21 Mayis
69問 • 1年前20 Mayis -175-
20 Mayis -175-
Son Cagrı · 174問 · 1年前20 Mayis -175-
20 Mayis -175-
174問 • 1年前30 Mayis
30 Mayis
Son Cagrı · 209問 · 1年前30 Mayis
30 Mayis
209問 • 1年前A-1
A-1
Son Cagrı · 216問 · 1年前A-1
A-1
216問 • 1年前A-2
A-2
Son Cagrı · 184問 · 1年前A-2
A-2
184問 • 1年前A-3
A-3
Son Cagrı · 68問 · 1年前A-3
A-3
68問 • 1年前exam topics
exam topics
Son Cagrı · 306問 · 1年前exam topics
exam topics
306問 • 1年前pass4future
pass4future
Son Cagrı · 330問 · 1年前pass4future
pass4future
330問 • 1年前son 1
son 1
Son Cagrı · 349問 · 1年前son 1
son 1
349問 • 1年前son 2
son 2
Son Cagrı · 113問 · 1年前son 2
son 2
113問 • 1年前son 3
son 3
Son Cagrı · 63問 · 1年前son 3
son 3
63問 • 1年前問題一覧
1
Removable media
2
Preventive
3
Detective
4
Preventive
5
Corrective
6
. Marketing strategies
7
Detective
8
Mitigating controls
9
SLA
10
Purchasing insurance
11
transference
12
SOC2
13
Dark web
14
Acceptance
15
Hiring an employee who has been convicted of theft to adhere to industry compliance
16
ARO
17
Deterrent controls
18
Insider threat
19
Proprietary
20
AUP
21
NIST
22
MOU
23
Data at rest
24
Transference
25
It incorporates control, development, policy, and management activities into IT operations.
26
GDPR
27
Personal health information
28
Compensating
29
Not installing new software to prevent compatibility errors
30
SLA
31
Reference architecture
32
State actors
33
NIST CSF
34
MTBF
35
Lack of vendor support
36
Corrective
37
Risk register
38
AUP
39
APT
40
Clean desk
41
AUP
42
Job Rotation policy
43
AUP
44
Compensating
45
It identifies the amount of allowable downtime for an application or system,
46
PCI DSS
47
RPO
48
Supply chain
49
Detective
50
Compensating
51
Corrective
52
PCI DSS
53
Compensating
54
Deterrent
55
Hacktivist
56
ISO 27001
57
Obfuscation
58
Threat feeds
59
Offboarding
60
Shadow IT
61
A capture-the-flag competition
62
Transference
63
designed to specifically mitigate a risk.
64
AUP
65
Data masking
66
Detective
67
Detective
68
Compensating
69
Security awareness training
70
SLE x ARO
71
GDPR
72
Authorized hacker
73
Preventive
74
A.Detective
75
Deterrent
76
Deterrent
77
NIST 800-53
78
Hacktivists
79
Shadow IT
80
Loss of proprietary information (clean desk policy)
81
Shadow IT
82
The dark web
83
An advanced persistent threat
84
TOR
85
Tokenization
86
The dark web
87
Dark web
88
SOC 2 report
89
Threat feeds
90
PCI DSS
91
Risk appetite
92
General Data Protection Regulation
93
Risk transference
94
AUP (Acceptable Use Policy)
95
Transference
96
Testing security systems and processes regularly, Assigning a unique ID to each person with computer access
97
Transference
98
Notoriety - (Söhret)
99
A security control objective cannot be met through a technical change, so the company implements a policy to train users on a more secure method of operation
100
To identify the risk, the risk owner, and the risk measures