ログイン

5 | Organizational controls:
38問 • 9ヶ月前
  • The R.S.S.H Delivery Company
  • 通報

    問題一覧

  • 1

    OVERVIEW |

  • 2

    5.1 | Policies for information security:

  • 3

    5.2 | Information security roles and responsibilities:

  • 4

    5.3 | Segregation of duties:

  • 5

    5.4 | Management responsibilities:

  • 6

    5.5 | Contact with authorities:

  • 7

    5.6 | Contact with special interest groups:

  • 8

    5.7 | Threat intelligence:

  • 9

    5.8 | Information security in project management:

  • 10

    5.9 | Inventory of information and other associated assets:

  • 11

    5.10 | Acceptable use of information and other associated assets:

  • 12

    5.11 | Return of assets:

  • 13

    5.12 | Classification of information:

  • 14

    5.13 | Labelling of information:

  • 15

    5.14 | Information transfer:

  • 16

    5.15 | Access control:

  • 17

    5.16 | Identity management:

  • 18

    5.17 | Authentication information:

  • 19

    5.18 | Access rights:

  • 20

    5.19 | Information security in supplier relationships:

  • 21

    5.20 | Addressing information security within supplier agreements:

  • 22

    5.21 | Managing information security in the information and communication technology (ICT) supply chain:

  • 23

    5.22 | Monitoring, review and change management of supplier services:

  • 24

    5.23 | Information security for use of cloud services:

  • 25

    5.24 | Information security incident management planning and preparation:

  • 26

    5.25 | Assessment and decision on information security events:

  • 27

    5.26 | Response to information security events:

  • 28

    5.27 | Learning from information security incidents:

  • 29

    5.28 | Collection of evidence:

  • 30

    5.29 | Information security during disruption:

  • 31

    5.30 | ICT readiness for business continuity:

  • 32

    5.31 | Legal, statutory, regulatory and contractual requirements:

  • 33

    5.32 | Intellectual property rights:

  • 34

    5.33 | Protection of records:

  • 35

    5.34 | Privacy and protection of personal identifiable information (PI):

  • 36

    5.35 | Independent review of information security:

  • 37

    5.36 | Compliance with policies, rules and standards for information security:

  • 38

    5.37 | Documented operating procedures:

  • THE P.T: 1 CHRONICLE: ( ex.9 )

    THE P.T: 1 CHRONICLE: ( ex.9 )

    The R.S.S.H Delivery Company · 90問 · 6ヶ月前

    THE P.T: 1 CHRONICLE: ( ex.9 )

    THE P.T: 1 CHRONICLE: ( ex.9 )

    90問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T: 2 CHRONICLE: ( ex.10 )

    THE P.T: 2 CHRONICLE: ( ex.10 )

    The R.S.S.H Delivery Company · 88問 · 6ヶ月前

    THE P.T: 2 CHRONICLE: ( ex.10 )

    THE P.T: 2 CHRONICLE: ( ex.10 )

    88問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 3: CHRONICLE: ( ex.12 )

    THE P.T. 3: CHRONICLE: ( ex.12 )

    The R.S.S.H Delivery Company · 89問 · 6ヶ月前

    THE P.T. 3: CHRONICLE: ( ex.12 )

    THE P.T. 3: CHRONICLE: ( ex.12 )

    89問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 4: CHRONICLE: ( ex.11 )

    THE P.T. 4: CHRONICLE: ( ex.11 )

    The R.S.S.H Delivery Company · 52問 · 6ヶ月前

    THE P.T. 4: CHRONICLE: ( ex.11 )

    THE P.T. 4: CHRONICLE: ( ex.11 )

    52問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 5: CHRONICLE: ( ex.13 )

    THE P.T. 5: CHRONICLE: ( ex.13 )

    The R.S.S.H Delivery Company · 92問 · 6ヶ月前

    THE P.T. 5: CHRONICLE: ( ex.13 )

    THE P.T. 5: CHRONICLE: ( ex.13 )

    92問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 6: CHRONICLE: ( ex.14 )

    THE P.T. 6: CHRONICLE: ( ex.14 )

    The R.S.S.H Delivery Company · 90問 · 6ヶ月前

    THE P.T. 6: CHRONICLE: ( ex.14 )

    THE P.T. 6: CHRONICLE: ( ex.14 )

    90問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 7: ( ex.15 )

    THE P.T. 7: ( ex.15 )

    The R.S.S.H Delivery Company · 48問 · 6ヶ月前

    THE P.T. 7: ( ex.15 )

    THE P.T. 7: ( ex.15 )

    48問 • 6ヶ月前
    The R.S.S.H Delivery Company

    EXAM #1 |

    EXAM #1 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM #1 |

    EXAM #1 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    1 ) Identify Security Control Types

    1 ) Identify Security Control Types

    The R.S.S.H Delivery Company · 5問 · 9ヶ月前

    1 ) Identify Security Control Types

    1 ) Identify Security Control Types

    5問 • 9ヶ月前
    The R.S.S.H Delivery Company

    2 ) Threat Intelligence

    2 ) Threat Intelligence

    The R.S.S.H Delivery Company · 8問 · 9ヶ月前

    2 ) Threat Intelligence

    2 ) Threat Intelligence

    8問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM #2 |

    EXAM #2 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM #2 |

    EXAM #2 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    3 ) Classifying Threats

    3 ) Classifying Threats

    The R.S.S.H Delivery Company · 17問 · 9ヶ月前

    3 ) Classifying Threats

    3 ) Classifying Threats

    17問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM # 3 |

    EXAM # 3 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM # 3 |

    EXAM # 3 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    4 ) Threat Hunting

    4 ) Threat Hunting

    The R.S.S.H Delivery Company · 16問 · 9ヶ月前

    4 ) Threat Hunting

    4 ) Threat Hunting

    16問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM # 4 |

    EXAM # 4 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM # 4 |

    EXAM # 4 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    5 ) Network Forensics

    5 ) Network Forensics

    The R.S.S.H Delivery Company · 9問 · 9ヶ月前

    5 ) Network Forensics

    5 ) Network Forensics

    9問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM # 5 |

    EXAM # 5 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM # 5 |

    EXAM # 5 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    問題一覧

  • 1

    OVERVIEW |

  • 2

    5.1 | Policies for information security:

  • 3

    5.2 | Information security roles and responsibilities:

  • 4

    5.3 | Segregation of duties:

  • 5

    5.4 | Management responsibilities:

  • 6

    5.5 | Contact with authorities:

  • 7

    5.6 | Contact with special interest groups:

  • 8

    5.7 | Threat intelligence:

  • 9

    5.8 | Information security in project management:

  • 10

    5.9 | Inventory of information and other associated assets:

  • 11

    5.10 | Acceptable use of information and other associated assets:

  • 12

    5.11 | Return of assets:

  • 13

    5.12 | Classification of information:

  • 14

    5.13 | Labelling of information:

  • 15

    5.14 | Information transfer:

  • 16

    5.15 | Access control:

  • 17

    5.16 | Identity management:

  • 18

    5.17 | Authentication information:

  • 19

    5.18 | Access rights:

  • 20

    5.19 | Information security in supplier relationships:

  • 21

    5.20 | Addressing information security within supplier agreements:

  • 22

    5.21 | Managing information security in the information and communication technology (ICT) supply chain:

  • 23

    5.22 | Monitoring, review and change management of supplier services:

  • 24

    5.23 | Information security for use of cloud services:

  • 25

    5.24 | Information security incident management planning and preparation:

  • 26

    5.25 | Assessment and decision on information security events:

  • 27

    5.26 | Response to information security events:

  • 28

    5.27 | Learning from information security incidents:

  • 29

    5.28 | Collection of evidence:

  • 30

    5.29 | Information security during disruption:

  • 31

    5.30 | ICT readiness for business continuity:

  • 32

    5.31 | Legal, statutory, regulatory and contractual requirements:

  • 33

    5.32 | Intellectual property rights:

  • 34

    5.33 | Protection of records:

  • 35

    5.34 | Privacy and protection of personal identifiable information (PI):

  • 36

    5.35 | Independent review of information security:

  • 37

    5.36 | Compliance with policies, rules and standards for information security:

  • 38

    5.37 | Documented operating procedures: