記憶度
4問
12問
0問
0問
0問
アカウント登録して、解答結果を保存しよう
問題一覧
1
What is the title of Clause 4 |
Context of the Organization
2
Clause 4 | Context of the Organization:
Clause 4:, - Context of the Organization:, 4.1:, - Understanding the organization and its context., 4.2:, - Understanding the needs and expectations of interested parties., 4.3:, - Determining the scope of the information security management system., 4.4:, - Information security management system.
3
What is the Title of Clause 5 |
Leadership
4
Clause 5 | Leadership:
Clause 5: , - Leadership:, 5.1:, - Leadership and commitment., 5.2:, - Policy., 5.3:, - Organizational roles, responsibilities, and authorities.
5
What is the Title of Clause 6 |
Planning
6
Clause 6 | Planning:
Clause 6:, - Planning, 6.1:, - Actions to address risks and opportunities., 6.1.1:, - General., 6.1.2:, - Information security risk assessment., 6.1.3:, - Information security risk treatment., 6.2:, - Information security objectives and planning.
7
What is the Title of Clause 7 |
Support
8
Clause 7 | Support:
Clause 7:, - Support:, 7.1:, - Resources., 7.2:, - Competence., 7.3:, - Awareness., 7.4:, - Communication., 7.5:, - Documented information., 7.5.1:, - General., 7.5.2:, - Creating and updating., 7.5.3:, - Control of documented information.
9
What is the Title of Clause 8 |
Operation
10
Clause 8 | Operation:
Clause 8:, - Operation, 8.1:, - Operation planning and control., 8.2, - Information security risk assessment., 8.3:, - Information security risk treatment.
11
What is the Title of Clause 9 |
Performance Evaluation
12
Clause 9 | Performance Evaluation:
Clause 9:, - Performance Evaluation, 9.1:, - Monitoring, measurement, analysis and evaluation., 9.2:, - Internal audit., 9.2.1:, - General, 9.2.2:, - Internal audit programme., 9.3:, - Management review., 9.3.1:, - General., 9.3.2:, - Management review inputs., 9.3.3:, - Management review results.
13
What is the Title of Clause 10 |
Improvement
14
Clause 10 | Improvement:
Clause 10:, - Improvement, 10.1:, - Continual improvement., 10.2:, - Nonconformity and corrective action.
15
What is the Title of Annex 5 |
Organizational Controls
16
PT 1 | Annex 5 | Organizational controls:
Annex 5:, - Organizational controls, 5.1:, - Policies for information security., 5.2:, - Information security roles and responsibilities., 5.3:, - Segregation of duties., 5.4:, - Management responsibilities., 5.5:, - Contact with authorities., 5.6:, - Contact with special interest groups., 5.7:, - Threat intelligence., 5.8:, - Information security in project management., 5.9:, - Inventory of information and other associated assets., 5.10:, - Acceptable use of information and other associated assets.
17
PT 2 | Annex 5 | Organizational controls:
5.11:, - Return of assets., 5.12:, - Classification of information., 5.13:, - Labelling of information., 5.14:, - Information transfer., 5.15:, - Access control., 5.16:, - Identity management., 5.17:, - Authentication information., 5.18:, - Access rights., 5.19:, - Information security in supplier relationships., 5.20:, - Addressing information security within supplier agreements.
18
PT 3 | Annex 5 | Organizational controls:
5.21:, - Managing information security in the information and communication technology (ICT) supply chain., 5.22:, - Monitoring, review and change management of supplier services., 5.23:, - Information security for use of cloud services., 5.24:, - Information security incident management planning and preparation., 5.25:, - Assessment and decision on information security events., 5.26:, - Response to information security events., 5.27:, - Learning from information security incidents., 5.28:, - Collection of evidence., 5.29:, - Information security during disruption., 5.30:, - ICT readiness for business continuity.
19
PT 4 | Annex 5 | Organizational controls:
5.30:, - ICT readiness for business continuity., 5.31:, - Legal, statutory, regulatory and contractual requirements., 5.32:, - Intellectual property rights., 5.33:, - Protection of records., 5.34:, - Privacy and protection of personal identifiable information (PI)., 5.35:, - Independent review of information security., 5.36:, - Compliance with policies, rules and standards for information security., 5.37:, - Documented operating procedures.
20
Annex 5 | Organizational controls:
5.1:, - Policies for information security., 5.2:, - Information security roles and responsibilities., 5.3:, - Segregation of duties., 5.4:, - Management responsibilities., 5.5:, - Contact with authorities., 5.6:, - Contact with special interest groups., 5.7:, - Threat intelligence., 5.8:, - Information security in project management., 5.9:, - Inventory of information and other associated assets., 5.10:, - Acceptable use of information and other associated assets., 5.11:, - Return of assets., 5.12:, - Classification of information., 5.13:, - Labelling of information., 5.14:, - Information transfer., 5.15:, - Access control., 5.16:, - Identity management., 5.17:, - Authentication information., 5.18:, - Access rights., 5.19:, - Information security in supplier relationships., 5.20:, - Addressing information security within supplier agreements., 5.21:, - Managing information security in the information and communication technology (ICT) supply chain., 5.22:, - Monitoring, review and change management of supplier services., 5.23:, - Information security for use of cloud services., 5.24:, - Information security incident management planning and preparation., 5.25:, - Assessment and decision on information security events., 5.26:, - Response to information security events., 5.27:, - Learning from information security incidents., 5.28:, - Collection of evidence., 5.29:, - Information security during disruption., 5.30:, - ICT readiness for business continuity., 5.31:, - Legal, statutory, regulatory and contractual requirements., 5.32:, - Intellectual property rights., 5.33:, - Protection of records., 5.34:, - Privacy and protection of personal identifiable information (PI)., 5.35:, - Independent review of information security., 5.36:, - Compliance with policies, rules and standards for information security., 5.37:, - Documented operating procedures.
21
What is the Title of Annex 6 |
People Controls
22
Annex 6 | People controls:
Annex 6:, - People controls, 6.1:, - Screening., 6.2:, - Terms and conditions of employment., 6.3:, - Information security awareness, education, and training., 6.4:, - Disciplinary process., 6.5:, - Responsibilities after termination or change of employment., 6.6:, - Confidentiality or non-disclosure agreements., 6.7:, - Remote working., 6.8:, - Information security event reporting.
23
What is the Title of Annex 7 |
Physical Controls
24
Annex 7 | Physical Controls:
Annex 7:, - Physical Controls, 7.1:, - Physical security perimeters., 7.2:, - Physical entry., 7.3:, - Securing offices, rooms and facilities., 7.4:, - Physical security monitoring., 7.5:, - Protecting against physical and environmental threats., 7.6:, - Working in secure areas., 7.7:, - Clear desk and clear screen., 7.8:, - Equipment siting and protection., 7.9:, - Security of assets off-premises., 7.10:, - Storage media., 7.11:, - Supporting utilities., 7.12:, - Cabling security., 7.13:, - Equipment maintenance., 7.14:, - Secure disposal or re-use of equipment.
25
What is the Title of Annex 8 |
Technical Controls
26
PT 1 | Annex 8 | Technological controls:
Annex 8:, - Technological controls, 8.1:, - User end point devices., 8.2:, - Privileged access rights, 8.3:, - Information access restriction, 8.4:, - Access to source code, 8.5:, - Secure authentication, 8.6:, - Capacity management, 8.7:, - Protection against malware, 8.8:, - Management of technical vulnerabilities, 8.9:, - Configuration management, 8.10:, - Information deletion
27
PT 2 | Annex 8 | Technological controls:
8.10:, - Information deletion, 8.11:, - Data masking, 8.12:, - Data leakage prevention, 8.13:, - Information backup, 8.14:, - Redundancy of information, 8.15:, - Logging, 8.16:, - Monitoring activities, 8.17:, - Clock synchronization, 8.18:, - Use of privileged utility programs, 8.19:, - Installation of software on operational systems, 8.20:, - Networks security
28
PT 3 | Annex 8 | Technological controls:
8.20:, - Networks security, 8.21:, - Security of network services, 8.22:, - Segregation of networks, 8.23:, - Web filtering., 8.24:, - Use of cryptography, 8.25:, - Secure development life cycle, 8.26:, - Application security requirements, 8.27:, - Secure system architecture and engineering principles, 8.28:, - Secure coding, 8.29:, - Security testing in development and acceptance, 8.30:, - Outsourced development, 8.31:, - Separation of development, test and production environments, 8.32:, - Change management, 8.33:, - Test information, 8.34:, - Protection of information systems during audit testin
29
Annex 8 | Technological controls:
8.1:, - User end point devices., 8.2:, - Privileged access rights, 8.3:, - Information access restriction, 8.4:, - Access to source code, 8.5: , - Secure authentication, 8.6:, - Capacity management, 8.7:, - Protection against malware, 8.8:, - Management of technical vulnerabilities, 8.9:, - Configuration management, 8.10:, - Information deletion, 8.11:, - Data masking, 8.12:, - Data leakage prevention, 8.13:, - Information backup, 8.14:, - Redundancy of information, 8.15:, - Logging, 8.16:, - Monitoring activities, 8.17:, - Clock synchronization, 8.18:, - Use of privileged utility programs, 8.19:, - Installation of software on operational systems, 8.20:, - Networks security, 8.21:, - Security of network services, 8.22:, - Segregation of networks, 8.23:, - Web filtering., 8.24:, - Use of cryptographyg, 8.25:, - Secure development life cycle, 8.26:, - Application security requirements, 8.27:, - Secure system architecture and engineering principles, 8.28:, - Secure coding, 8.29:, - Security testing in development and acceptance, 8.30:, - Outsourced development, 8.31:, - Separation of development, test and production environments, 8.32:, - Change management, 8.33:, - Test information, 8.34:, - Protection of information systems during audit testin