ログイン

8 | Technological controls
35問 • 9ヶ月前
  • The R.S.S.H Delivery Company
  • 通報

    問題一覧

  • 1

    OVERVIEW |

  • 2

    8.1 | User end point devices:

  • 3

    8.2 | Privileged access rights:

  • 4

    8.3 | Information access restriction:

  • 5

    8.4 | Access to source code:

  • 6

    8.5 | Secure authentication:

  • 7

    8.6 | Capacity management:

  • 8

    8.7 | Protection against malware:

  • 9

    8.8 | Management of technical vulnerabilities:

  • 10

    8.9 | Configuration management:

  • 11

    8.10 Information deletion:

  • 12

    8.11 I Data masking:

  • 13

    8.12 | Data leakage prevention:

  • 14

    8.13 | Information backup:

  • 15

    8.14 | Redundancy of information processing facilities:

  • 16

    8.15 | Logging:

  • 17

    8.16 | Monitoring activities:

  • 18

    8.17 | Clock synchronization:

  • 19

    8.18 | Use of privileged utility programs:

  • 20

    8.19 | Installation of software on operational systems:

  • 21

    8.20 | Networks security:

  • 22

    8.21 | Security of network services:

  • 23

    8.22 | Segregation of networks:

  • 24

    8.23 | Web filtering:

  • 25

    8.24 | Use of cryptography:

  • 26

    8.25 | Secure development life cycle:

  • 27

    8.26 | Application security requirements:

  • 28

    8.27 | Secure system architecture and engineering principles:

  • 29

    8.28 | Secure coding:

  • 30

    8.29 | Security testing in development and acceptance:

  • 31

    8.30 | Outsourced development:

  • 32

    8.31 | Separation of development, test and production environments:

  • 33

    8.32 | Change management:

  • 34

    8.33 Test information:

  • 35

    8.34 | Protection of information systems during audit testing:

  • THE P.T: 1 CHRONICLE: ( ex.9 )

    THE P.T: 1 CHRONICLE: ( ex.9 )

    The R.S.S.H Delivery Company · 90問 · 6ヶ月前

    THE P.T: 1 CHRONICLE: ( ex.9 )

    THE P.T: 1 CHRONICLE: ( ex.9 )

    90問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T: 2 CHRONICLE: ( ex.10 )

    THE P.T: 2 CHRONICLE: ( ex.10 )

    The R.S.S.H Delivery Company · 88問 · 6ヶ月前

    THE P.T: 2 CHRONICLE: ( ex.10 )

    THE P.T: 2 CHRONICLE: ( ex.10 )

    88問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 3: CHRONICLE: ( ex.12 )

    THE P.T. 3: CHRONICLE: ( ex.12 )

    The R.S.S.H Delivery Company · 89問 · 6ヶ月前

    THE P.T. 3: CHRONICLE: ( ex.12 )

    THE P.T. 3: CHRONICLE: ( ex.12 )

    89問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 4: CHRONICLE: ( ex.11 )

    THE P.T. 4: CHRONICLE: ( ex.11 )

    The R.S.S.H Delivery Company · 52問 · 6ヶ月前

    THE P.T. 4: CHRONICLE: ( ex.11 )

    THE P.T. 4: CHRONICLE: ( ex.11 )

    52問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 5: CHRONICLE: ( ex.13 )

    THE P.T. 5: CHRONICLE: ( ex.13 )

    The R.S.S.H Delivery Company · 92問 · 6ヶ月前

    THE P.T. 5: CHRONICLE: ( ex.13 )

    THE P.T. 5: CHRONICLE: ( ex.13 )

    92問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 6: CHRONICLE: ( ex.14 )

    THE P.T. 6: CHRONICLE: ( ex.14 )

    The R.S.S.H Delivery Company · 90問 · 6ヶ月前

    THE P.T. 6: CHRONICLE: ( ex.14 )

    THE P.T. 6: CHRONICLE: ( ex.14 )

    90問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 7: ( ex.15 )

    THE P.T. 7: ( ex.15 )

    The R.S.S.H Delivery Company · 48問 · 6ヶ月前

    THE P.T. 7: ( ex.15 )

    THE P.T. 7: ( ex.15 )

    48問 • 6ヶ月前
    The R.S.S.H Delivery Company

    EXAM #1 |

    EXAM #1 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM #1 |

    EXAM #1 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    1 ) Identify Security Control Types

    1 ) Identify Security Control Types

    The R.S.S.H Delivery Company · 5問 · 9ヶ月前

    1 ) Identify Security Control Types

    1 ) Identify Security Control Types

    5問 • 9ヶ月前
    The R.S.S.H Delivery Company

    2 ) Threat Intelligence

    2 ) Threat Intelligence

    The R.S.S.H Delivery Company · 8問 · 9ヶ月前

    2 ) Threat Intelligence

    2 ) Threat Intelligence

    8問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM #2 |

    EXAM #2 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM #2 |

    EXAM #2 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    3 ) Classifying Threats

    3 ) Classifying Threats

    The R.S.S.H Delivery Company · 17問 · 9ヶ月前

    3 ) Classifying Threats

    3 ) Classifying Threats

    17問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM # 3 |

    EXAM # 3 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM # 3 |

    EXAM # 3 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    4 ) Threat Hunting

    4 ) Threat Hunting

    The R.S.S.H Delivery Company · 16問 · 9ヶ月前

    4 ) Threat Hunting

    4 ) Threat Hunting

    16問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM # 4 |

    EXAM # 4 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM # 4 |

    EXAM # 4 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    5 ) Network Forensics

    5 ) Network Forensics

    The R.S.S.H Delivery Company · 9問 · 9ヶ月前

    5 ) Network Forensics

    5 ) Network Forensics

    9問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM # 5 |

    EXAM # 5 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM # 5 |

    EXAM # 5 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    問題一覧

  • 1

    OVERVIEW |

  • 2

    8.1 | User end point devices:

  • 3

    8.2 | Privileged access rights:

  • 4

    8.3 | Information access restriction:

  • 5

    8.4 | Access to source code:

  • 6

    8.5 | Secure authentication:

  • 7

    8.6 | Capacity management:

  • 8

    8.7 | Protection against malware:

  • 9

    8.8 | Management of technical vulnerabilities:

  • 10

    8.9 | Configuration management:

  • 11

    8.10 Information deletion:

  • 12

    8.11 I Data masking:

  • 13

    8.12 | Data leakage prevention:

  • 14

    8.13 | Information backup:

  • 15

    8.14 | Redundancy of information processing facilities:

  • 16

    8.15 | Logging:

  • 17

    8.16 | Monitoring activities:

  • 18

    8.17 | Clock synchronization:

  • 19

    8.18 | Use of privileged utility programs:

  • 20

    8.19 | Installation of software on operational systems:

  • 21

    8.20 | Networks security:

  • 22

    8.21 | Security of network services:

  • 23

    8.22 | Segregation of networks:

  • 24

    8.23 | Web filtering:

  • 25

    8.24 | Use of cryptography:

  • 26

    8.25 | Secure development life cycle:

  • 27

    8.26 | Application security requirements:

  • 28

    8.27 | Secure system architecture and engineering principles:

  • 29

    8.28 | Secure coding:

  • 30

    8.29 | Security testing in development and acceptance:

  • 31

    8.30 | Outsourced development:

  • 32

    8.31 | Separation of development, test and production environments:

  • 33

    8.32 | Change management:

  • 34

    8.33 Test information:

  • 35

    8.34 | Protection of information systems during audit testing: