問題一覧
1
Context of the Organization
2
Clause 4:, - Context of the Organization:, 4.1:, - Understanding the organization and its context., 4.2:, - Understanding the needs and expectations of interested parties., 4.3:, - Determining the scope of the information security management system., 4.4:, - Information security management system.
3
Leadership
4
Clause 5: , - Leadership:, 5.1:, - Leadership and commitment., 5.2:, - Policy., 5.3:, - Organizational roles, responsibilities, and authorities.
5
Planning
6
Clause 6:, - Planning, 6.1:, - Actions to address risks and opportunities., 6.1.1:, - General., 6.1.2:, - Information security risk assessment., 6.1.3:, - Information security risk treatment., 6.2:, - Information security objectives and planning.
7
Support
8
Clause 7:, - Support:, 7.1:, - Resources., 7.2:, - Competence., 7.3:, - Awareness., 7.4:, - Communication., 7.5:, - Documented information., 7.5.1:, - General., 7.5.2:, - Creating and updating., 7.5.3:, - Control of documented information.
9
Operation
10
Clause 8:, - Operation, 8.1:, - Operation planning and control., 8.2, - Information security risk assessment., 8.3:, - Information security risk treatment.
11
Performance Evaluation
12
Clause 9:, - Performance Evaluation, 9.1:, - Monitoring, measurement, analysis and evaluation., 9.2:, - Internal audit., 9.2.1:, - General, 9.2.2:, - Internal audit programme., 9.3:, - Management review., 9.3.1:, - General., 9.3.2:, - Management review inputs., 9.3.3:, - Management review results.
13
Improvement
14
Clause 10:, - Improvement, 10.1:, - Continual improvement., 10.2:, - Nonconformity and corrective action.
15
Organizational Controls
16
Annex 5:, - Organizational controls, 5.1:, - Policies for information security., 5.2:, - Information security roles and responsibilities., 5.3:, - Segregation of duties., 5.4:, - Management responsibilities., 5.5:, - Contact with authorities., 5.6:, - Contact with special interest groups., 5.7:, - Threat intelligence., 5.8:, - Information security in project management., 5.9:, - Inventory of information and other associated assets., 5.10:, - Acceptable use of information and other associated assets.
17
5.11:, - Return of assets., 5.12:, - Classification of information., 5.13:, - Labelling of information., 5.14:, - Information transfer., 5.15:, - Access control., 5.16:, - Identity management., 5.17:, - Authentication information., 5.18:, - Access rights., 5.19:, - Information security in supplier relationships., 5.20:, - Addressing information security within supplier agreements.
18
5.21:, - Managing information security in the information and communication technology (ICT) supply chain., 5.22:, - Monitoring, review and change management of supplier services., 5.23:, - Information security for use of cloud services., 5.24:, - Information security incident management planning and preparation., 5.25:, - Assessment and decision on information security events., 5.26:, - Response to information security events., 5.27:, - Learning from information security incidents., 5.28:, - Collection of evidence., 5.29:, - Information security during disruption., 5.30:, - ICT readiness for business continuity.
19
5.30:, - ICT readiness for business continuity., 5.31:, - Legal, statutory, regulatory and contractual requirements., 5.32:, - Intellectual property rights., 5.33:, - Protection of records., 5.34:, - Privacy and protection of personal identifiable information (PI)., 5.35:, - Independent review of information security., 5.36:, - Compliance with policies, rules and standards for information security., 5.37:, - Documented operating procedures.
20
5.1:, - Policies for information security., 5.2:, - Information security roles and responsibilities., 5.3:, - Segregation of duties., 5.4:, - Management responsibilities., 5.5:, - Contact with authorities., 5.6:, - Contact with special interest groups., 5.7:, - Threat intelligence., 5.8:, - Information security in project management., 5.9:, - Inventory of information and other associated assets., 5.10:, - Acceptable use of information and other associated assets., 5.11:, - Return of assets., 5.12:, - Classification of information., 5.13:, - Labelling of information., 5.14:, - Information transfer., 5.15:, - Access control., 5.16:, - Identity management., 5.17:, - Authentication information., 5.18:, - Access rights., 5.19:, - Information security in supplier relationships., 5.20:, - Addressing information security within supplier agreements., 5.21:, - Managing information security in the information and communication technology (ICT) supply chain., 5.22:, - Monitoring, review and change management of supplier services., 5.23:, - Information security for use of cloud services., 5.24:, - Information security incident management planning and preparation., 5.25:, - Assessment and decision on information security events., 5.26:, - Response to information security events., 5.27:, - Learning from information security incidents., 5.28:, - Collection of evidence., 5.29:, - Information security during disruption., 5.30:, - ICT readiness for business continuity., 5.31:, - Legal, statutory, regulatory and contractual requirements., 5.32:, - Intellectual property rights., 5.33:, - Protection of records., 5.34:, - Privacy and protection of personal identifiable information (PI)., 5.35:, - Independent review of information security., 5.36:, - Compliance with policies, rules and standards for information security., 5.37:, - Documented operating procedures.
21
People Controls
22
Annex 6:, - People controls, 6.1:, - Screening., 6.2:, - Terms and conditions of employment., 6.3:, - Information security awareness, education, and training., 6.4:, - Disciplinary process., 6.5:, - Responsibilities after termination or change of employment., 6.6:, - Confidentiality or non-disclosure agreements., 6.7:, - Remote working., 6.8:, - Information security event reporting.
23
Physical Controls
24
Annex 7:, - Physical Controls, 7.1:, - Physical security perimeters., 7.2:, - Physical entry., 7.3:, - Securing offices, rooms and facilities., 7.4:, - Physical security monitoring., 7.5:, - Protecting against physical and environmental threats., 7.6:, - Working in secure areas., 7.7:, - Clear desk and clear screen., 7.8:, - Equipment siting and protection., 7.9:, - Security of assets off-premises., 7.10:, - Storage media., 7.11:, - Supporting utilities., 7.12:, - Cabling security., 7.13:, - Equipment maintenance., 7.14:, - Secure disposal or re-use of equipment.
25
Technical Controls
26
Annex 8:, - Technological controls, 8.1:, - User end point devices., 8.2:, - Privileged access rights, 8.3:, - Information access restriction, 8.4:, - Access to source code, 8.5:, - Secure authentication, 8.6:, - Capacity management, 8.7:, - Protection against malware, 8.8:, - Management of technical vulnerabilities, 8.9:, - Configuration management, 8.10:, - Information deletion
27
8.10:, - Information deletion, 8.11:, - Data masking, 8.12:, - Data leakage prevention, 8.13:, - Information backup, 8.14:, - Redundancy of information, 8.15:, - Logging, 8.16:, - Monitoring activities, 8.17:, - Clock synchronization, 8.18:, - Use of privileged utility programs, 8.19:, - Installation of software on operational systems, 8.20:, - Networks security
28
8.20:, - Networks security, 8.21:, - Security of network services, 8.22:, - Segregation of networks, 8.23:, - Web filtering., 8.24:, - Use of cryptography, 8.25:, - Secure development life cycle, 8.26:, - Application security requirements, 8.27:, - Secure system architecture and engineering principles, 8.28:, - Secure coding, 8.29:, - Security testing in development and acceptance, 8.30:, - Outsourced development, 8.31:, - Separation of development, test and production environments, 8.32:, - Change management, 8.33:, - Test information, 8.34:, - Protection of information systems during audit testin
29
8.1:, - User end point devices., 8.2:, - Privileged access rights, 8.3:, - Information access restriction, 8.4:, - Access to source code, 8.5: , - Secure authentication, 8.6:, - Capacity management, 8.7:, - Protection against malware, 8.8:, - Management of technical vulnerabilities, 8.9:, - Configuration management, 8.10:, - Information deletion, 8.11:, - Data masking, 8.12:, - Data leakage prevention, 8.13:, - Information backup, 8.14:, - Redundancy of information, 8.15:, - Logging, 8.16:, - Monitoring activities, 8.17:, - Clock synchronization, 8.18:, - Use of privileged utility programs, 8.19:, - Installation of software on operational systems, 8.20:, - Networks security, 8.21:, - Security of network services, 8.22:, - Segregation of networks, 8.23:, - Web filtering., 8.24:, - Use of cryptographyg, 8.25:, - Secure development life cycle, 8.26:, - Application security requirements, 8.27:, - Secure system architecture and engineering principles, 8.28:, - Secure coding, 8.29:, - Security testing in development and acceptance, 8.30:, - Outsourced development, 8.31:, - Separation of development, test and production environments, 8.32:, - Change management, 8.33:, - Test information, 8.34:, - Protection of information systems during audit testin
THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
90問 • 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
The R.S.S.H Delivery Company · 88問 · 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
88問 • 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
The R.S.S.H Delivery Company · 89問 · 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
89問 • 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
The R.S.S.H Delivery Company · 52問 · 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
52問 • 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
The R.S.S.H Delivery Company · 92問 · 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
92問 • 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
90問 • 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
The R.S.S.H Delivery Company · 48問 · 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
48問 • 6ヶ月前EXAM #1 |
EXAM #1 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #1 |
EXAM #1 |
90問 • 7ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
The R.S.S.H Delivery Company · 5問 · 9ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
5問 • 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
The R.S.S.H Delivery Company · 8問 · 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
8問 • 9ヶ月前EXAM #2 |
EXAM #2 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #2 |
EXAM #2 |
90問 • 7ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
The R.S.S.H Delivery Company · 17問 · 9ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
17問 • 9ヶ月前EXAM # 3 |
EXAM # 3 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 3 |
EXAM # 3 |
90問 • 7ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
The R.S.S.H Delivery Company · 16問 · 9ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
16問 • 9ヶ月前EXAM # 4 |
EXAM # 4 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 4 |
EXAM # 4 |
90問 • 7ヶ月前5 ) Network Forensics
5 ) Network Forensics
The R.S.S.H Delivery Company · 9問 · 9ヶ月前5 ) Network Forensics
5 ) Network Forensics
9問 • 9ヶ月前EXAM # 5 |
EXAM # 5 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 5 |
EXAM # 5 |
90問 • 7ヶ月前問題一覧
1
Context of the Organization
2
Clause 4:, - Context of the Organization:, 4.1:, - Understanding the organization and its context., 4.2:, - Understanding the needs and expectations of interested parties., 4.3:, - Determining the scope of the information security management system., 4.4:, - Information security management system.
3
Leadership
4
Clause 5: , - Leadership:, 5.1:, - Leadership and commitment., 5.2:, - Policy., 5.3:, - Organizational roles, responsibilities, and authorities.
5
Planning
6
Clause 6:, - Planning, 6.1:, - Actions to address risks and opportunities., 6.1.1:, - General., 6.1.2:, - Information security risk assessment., 6.1.3:, - Information security risk treatment., 6.2:, - Information security objectives and planning.
7
Support
8
Clause 7:, - Support:, 7.1:, - Resources., 7.2:, - Competence., 7.3:, - Awareness., 7.4:, - Communication., 7.5:, - Documented information., 7.5.1:, - General., 7.5.2:, - Creating and updating., 7.5.3:, - Control of documented information.
9
Operation
10
Clause 8:, - Operation, 8.1:, - Operation planning and control., 8.2, - Information security risk assessment., 8.3:, - Information security risk treatment.
11
Performance Evaluation
12
Clause 9:, - Performance Evaluation, 9.1:, - Monitoring, measurement, analysis and evaluation., 9.2:, - Internal audit., 9.2.1:, - General, 9.2.2:, - Internal audit programme., 9.3:, - Management review., 9.3.1:, - General., 9.3.2:, - Management review inputs., 9.3.3:, - Management review results.
13
Improvement
14
Clause 10:, - Improvement, 10.1:, - Continual improvement., 10.2:, - Nonconformity and corrective action.
15
Organizational Controls
16
Annex 5:, - Organizational controls, 5.1:, - Policies for information security., 5.2:, - Information security roles and responsibilities., 5.3:, - Segregation of duties., 5.4:, - Management responsibilities., 5.5:, - Contact with authorities., 5.6:, - Contact with special interest groups., 5.7:, - Threat intelligence., 5.8:, - Information security in project management., 5.9:, - Inventory of information and other associated assets., 5.10:, - Acceptable use of information and other associated assets.
17
5.11:, - Return of assets., 5.12:, - Classification of information., 5.13:, - Labelling of information., 5.14:, - Information transfer., 5.15:, - Access control., 5.16:, - Identity management., 5.17:, - Authentication information., 5.18:, - Access rights., 5.19:, - Information security in supplier relationships., 5.20:, - Addressing information security within supplier agreements.
18
5.21:, - Managing information security in the information and communication technology (ICT) supply chain., 5.22:, - Monitoring, review and change management of supplier services., 5.23:, - Information security for use of cloud services., 5.24:, - Information security incident management planning and preparation., 5.25:, - Assessment and decision on information security events., 5.26:, - Response to information security events., 5.27:, - Learning from information security incidents., 5.28:, - Collection of evidence., 5.29:, - Information security during disruption., 5.30:, - ICT readiness for business continuity.
19
5.30:, - ICT readiness for business continuity., 5.31:, - Legal, statutory, regulatory and contractual requirements., 5.32:, - Intellectual property rights., 5.33:, - Protection of records., 5.34:, - Privacy and protection of personal identifiable information (PI)., 5.35:, - Independent review of information security., 5.36:, - Compliance with policies, rules and standards for information security., 5.37:, - Documented operating procedures.
20
5.1:, - Policies for information security., 5.2:, - Information security roles and responsibilities., 5.3:, - Segregation of duties., 5.4:, - Management responsibilities., 5.5:, - Contact with authorities., 5.6:, - Contact with special interest groups., 5.7:, - Threat intelligence., 5.8:, - Information security in project management., 5.9:, - Inventory of information and other associated assets., 5.10:, - Acceptable use of information and other associated assets., 5.11:, - Return of assets., 5.12:, - Classification of information., 5.13:, - Labelling of information., 5.14:, - Information transfer., 5.15:, - Access control., 5.16:, - Identity management., 5.17:, - Authentication information., 5.18:, - Access rights., 5.19:, - Information security in supplier relationships., 5.20:, - Addressing information security within supplier agreements., 5.21:, - Managing information security in the information and communication technology (ICT) supply chain., 5.22:, - Monitoring, review and change management of supplier services., 5.23:, - Information security for use of cloud services., 5.24:, - Information security incident management planning and preparation., 5.25:, - Assessment and decision on information security events., 5.26:, - Response to information security events., 5.27:, - Learning from information security incidents., 5.28:, - Collection of evidence., 5.29:, - Information security during disruption., 5.30:, - ICT readiness for business continuity., 5.31:, - Legal, statutory, regulatory and contractual requirements., 5.32:, - Intellectual property rights., 5.33:, - Protection of records., 5.34:, - Privacy and protection of personal identifiable information (PI)., 5.35:, - Independent review of information security., 5.36:, - Compliance with policies, rules and standards for information security., 5.37:, - Documented operating procedures.
21
People Controls
22
Annex 6:, - People controls, 6.1:, - Screening., 6.2:, - Terms and conditions of employment., 6.3:, - Information security awareness, education, and training., 6.4:, - Disciplinary process., 6.5:, - Responsibilities after termination or change of employment., 6.6:, - Confidentiality or non-disclosure agreements., 6.7:, - Remote working., 6.8:, - Information security event reporting.
23
Physical Controls
24
Annex 7:, - Physical Controls, 7.1:, - Physical security perimeters., 7.2:, - Physical entry., 7.3:, - Securing offices, rooms and facilities., 7.4:, - Physical security monitoring., 7.5:, - Protecting against physical and environmental threats., 7.6:, - Working in secure areas., 7.7:, - Clear desk and clear screen., 7.8:, - Equipment siting and protection., 7.9:, - Security of assets off-premises., 7.10:, - Storage media., 7.11:, - Supporting utilities., 7.12:, - Cabling security., 7.13:, - Equipment maintenance., 7.14:, - Secure disposal or re-use of equipment.
25
Technical Controls
26
Annex 8:, - Technological controls, 8.1:, - User end point devices., 8.2:, - Privileged access rights, 8.3:, - Information access restriction, 8.4:, - Access to source code, 8.5:, - Secure authentication, 8.6:, - Capacity management, 8.7:, - Protection against malware, 8.8:, - Management of technical vulnerabilities, 8.9:, - Configuration management, 8.10:, - Information deletion
27
8.10:, - Information deletion, 8.11:, - Data masking, 8.12:, - Data leakage prevention, 8.13:, - Information backup, 8.14:, - Redundancy of information, 8.15:, - Logging, 8.16:, - Monitoring activities, 8.17:, - Clock synchronization, 8.18:, - Use of privileged utility programs, 8.19:, - Installation of software on operational systems, 8.20:, - Networks security
28
8.20:, - Networks security, 8.21:, - Security of network services, 8.22:, - Segregation of networks, 8.23:, - Web filtering., 8.24:, - Use of cryptography, 8.25:, - Secure development life cycle, 8.26:, - Application security requirements, 8.27:, - Secure system architecture and engineering principles, 8.28:, - Secure coding, 8.29:, - Security testing in development and acceptance, 8.30:, - Outsourced development, 8.31:, - Separation of development, test and production environments, 8.32:, - Change management, 8.33:, - Test information, 8.34:, - Protection of information systems during audit testin
29
8.1:, - User end point devices., 8.2:, - Privileged access rights, 8.3:, - Information access restriction, 8.4:, - Access to source code, 8.5: , - Secure authentication, 8.6:, - Capacity management, 8.7:, - Protection against malware, 8.8:, - Management of technical vulnerabilities, 8.9:, - Configuration management, 8.10:, - Information deletion, 8.11:, - Data masking, 8.12:, - Data leakage prevention, 8.13:, - Information backup, 8.14:, - Redundancy of information, 8.15:, - Logging, 8.16:, - Monitoring activities, 8.17:, - Clock synchronization, 8.18:, - Use of privileged utility programs, 8.19:, - Installation of software on operational systems, 8.20:, - Networks security, 8.21:, - Security of network services, 8.22:, - Segregation of networks, 8.23:, - Web filtering., 8.24:, - Use of cryptographyg, 8.25:, - Secure development life cycle, 8.26:, - Application security requirements, 8.27:, - Secure system architecture and engineering principles, 8.28:, - Secure coding, 8.29:, - Security testing in development and acceptance, 8.30:, - Outsourced development, 8.31:, - Separation of development, test and production environments, 8.32:, - Change management, 8.33:, - Test information, 8.34:, - Protection of information systems during audit testin