暗記メーカー
ログイン
I.S.O. | 27001: MEMORIZATION STRUCTURE TEST
  • The R.S.S.H Delivery Company

  • 問題数 29 • 4/23/2025

    記憶度

    完璧

    4

    覚えた

    12

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    What is the title of Clause 4 |

    Context of the Organization

  • 2

    Clause 4 | Context of the Organization:

    Clause 4:, - Context of the Organization:, 4.1:, - Understanding the organization and its context., 4.2:, - Understanding the needs and expectations of interested parties., 4.3:, - Determining the scope of the information security management system., 4.4:, - Information security management system.

  • 3

    What is the Title of Clause 5 |

    Leadership

  • 4

    Clause 5 | Leadership:

    Clause 5: , - Leadership:, 5.1:, - Leadership and commitment., 5.2:, - Policy., 5.3:, - Organizational roles, responsibilities, and authorities.

  • 5

    What is the Title of Clause 6 |

    Planning

  • 6

    Clause 6 | Planning:

    Clause 6:, - Planning, 6.1:, - Actions to address risks and opportunities., 6.1.1:, - General., 6.1.2:, - Information security risk assessment., 6.1.3:, - Information security risk treatment., 6.2:, - Information security objectives and planning.

  • 7

    What is the Title of Clause 7 |

    Support

  • 8

    Clause 7 | Support:

    Clause 7:, - Support:, 7.1:, - Resources., 7.2:, - Competence., 7.3:, - Awareness., 7.4:, - Communication., 7.5:, - Documented information., 7.5.1:, - General., 7.5.2:, - Creating and updating., 7.5.3:, - Control of documented information.

  • 9

    What is the Title of Clause 8 |

    Operation

  • 10

    Clause 8 | Operation:

    Clause 8:, - Operation, 8.1:, - Operation planning and control., 8.2, - Information security risk assessment., 8.3:, - Information security risk treatment.

  • 11

    What is the Title of Clause 9 |

    Performance Evaluation

  • 12

    Clause 9 | Performance Evaluation:

    Clause 9:, - Performance Evaluation, 9.1:, - Monitoring, measurement, analysis and evaluation., 9.2:, - Internal audit., 9.2.1:, - General, 9.2.2:, - Internal audit programme., 9.3:, - Management review., 9.3.1:, - General., 9.3.2:, - Management review inputs., 9.3.3:, - Management review results.

  • 13

    What is the Title of Clause 10 |

    Improvement

  • 14

    Clause 10 | Improvement:

    Clause 10:, - Improvement, 10.1:, - Continual improvement., 10.2:, - Nonconformity and corrective action.

  • 15

    What is the Title of Annex 5 |

    Organizational Controls

  • 16

    PT 1 | Annex 5 | Organizational controls:

    Annex 5:, - Organizational controls, 5.1:, - Policies for information security., 5.2:, - Information security roles and responsibilities., 5.3:, - Segregation of duties., 5.4:, - Management responsibilities., 5.5:, - Contact with authorities., 5.6:, - Contact with special interest groups., 5.7:, - Threat intelligence., 5.8:, - Information security in project management., 5.9:, - Inventory of information and other associated assets., 5.10:, - Acceptable use of information and other associated assets.

  • 17

    PT 2 | Annex 5 | Organizational controls:

    5.11:, - Return of assets., 5.12:, - Classification of information., 5.13:, - Labelling of information., 5.14:, - Information transfer., 5.15:, - Access control., 5.16:, - Identity management., 5.17:, - Authentication information., 5.18:, - Access rights., 5.19:, - Information security in supplier relationships., 5.20:, - Addressing information security within supplier agreements.

  • 18

    PT 3 | Annex 5 | Organizational controls:

    5.21:, - Managing information security in the information and communication technology (ICT) supply chain., 5.22:, - Monitoring, review and change management of supplier services., 5.23:, - Information security for use of cloud services., 5.24:, - Information security incident management planning and preparation., 5.25:, - Assessment and decision on information security events., 5.26:, - Response to information security events., 5.27:, - Learning from information security incidents., 5.28:, - Collection of evidence., 5.29:, - Information security during disruption., 5.30:, - ICT readiness for business continuity.

  • 19

    PT 4 | Annex 5 | Organizational controls:

    5.30:, - ICT readiness for business continuity., 5.31:, - Legal, statutory, regulatory and contractual requirements., 5.32:, - Intellectual property rights., 5.33:, - Protection of records., 5.34:, - Privacy and protection of personal identifiable information (PI)., 5.35:, - Independent review of information security., 5.36:, - Compliance with policies, rules and standards for information security., 5.37:, - Documented operating procedures.

  • 20

    Annex 5 | Organizational controls:

    5.1:, - Policies for information security., 5.2:, - Information security roles and responsibilities., 5.3:, - Segregation of duties., 5.4:, - Management responsibilities., 5.5:, - Contact with authorities., 5.6:, - Contact with special interest groups., 5.7:, - Threat intelligence., 5.8:, - Information security in project management., 5.9:, - Inventory of information and other associated assets., 5.10:, - Acceptable use of information and other associated assets., 5.11:, - Return of assets., 5.12:, - Classification of information., 5.13:, - Labelling of information., 5.14:, - Information transfer., 5.15:, - Access control., 5.16:, - Identity management., 5.17:, - Authentication information., 5.18:, - Access rights., 5.19:, - Information security in supplier relationships., 5.20:, - Addressing information security within supplier agreements., 5.21:, - Managing information security in the information and communication technology (ICT) supply chain., 5.22:, - Monitoring, review and change management of supplier services., 5.23:, - Information security for use of cloud services., 5.24:, - Information security incident management planning and preparation., 5.25:, - Assessment and decision on information security events., 5.26:, - Response to information security events., 5.27:, - Learning from information security incidents., 5.28:, - Collection of evidence., 5.29:, - Information security during disruption., 5.30:, - ICT readiness for business continuity., 5.31:, - Legal, statutory, regulatory and contractual requirements., 5.32:, - Intellectual property rights., 5.33:, - Protection of records., 5.34:, - Privacy and protection of personal identifiable information (PI)., 5.35:, - Independent review of information security., 5.36:, - Compliance with policies, rules and standards for information security., 5.37:, - Documented operating procedures.

  • 21

    What is the Title of Annex 6 |

    People Controls

  • 22

    Annex 6 | People controls:

    Annex 6:, - People controls, 6.1:, - Screening., 6.2:, - Terms and conditions of employment., 6.3:, - Information security awareness, education, and training., 6.4:, - Disciplinary process., 6.5:, - Responsibilities after termination or change of employment., 6.6:, - Confidentiality or non-disclosure agreements., 6.7:, - Remote working., 6.8:, - Information security event reporting.

  • 23

    What is the Title of Annex 7 |

    Physical Controls

  • 24

    Annex 7 | Physical Controls:

    Annex 7:, - Physical Controls, 7.1:, - Physical security perimeters., 7.2:, - Physical entry., 7.3:, - Securing offices, rooms and facilities., 7.4:, - Physical security monitoring., 7.5:, - Protecting against physical and environmental threats., 7.6:, - Working in secure areas., 7.7:, - Clear desk and clear screen., 7.8:, - Equipment siting and protection., 7.9:, - Security of assets off-premises., 7.10:, - Storage media., 7.11:, - Supporting utilities., 7.12:, - Cabling security., 7.13:, - Equipment maintenance., 7.14:, - Secure disposal or re-use of equipment.

  • 25

    What is the Title of Annex 8 |

    Technical Controls

  • 26

    PT 1 | Annex 8 | Technological controls:

    Annex 8:, - Technological controls, 8.1:, - User end point devices., 8.2:, - Privileged access rights, 8.3:, - Information access restriction, 8.4:, - Access to source code, 8.5:, - Secure authentication, 8.6:, - Capacity management, 8.7:, - Protection against malware, 8.8:, - Management of technical vulnerabilities, 8.9:, - Configuration management, 8.10:, - Information deletion

  • 27

    PT 2 | Annex 8 | Technological controls:

    8.10:, - Information deletion, 8.11:, - Data masking, 8.12:, - Data leakage prevention, 8.13:, - Information backup, 8.14:, - Redundancy of information, 8.15:, - Logging, 8.16:, - Monitoring activities, 8.17:, - Clock synchronization, 8.18:, - Use of privileged utility programs, 8.19:, - Installation of software on operational systems, 8.20:, - Networks security

  • 28

    PT 3 | Annex 8 | Technological controls:

    8.20:, - Networks security, 8.21:, - Security of network services, 8.22:, - Segregation of networks, 8.23:, - Web filtering., 8.24:, - Use of cryptography, 8.25:, - Secure development life cycle, 8.26:, - Application security requirements, 8.27:, - Secure system architecture and engineering principles, 8.28:, - Secure coding, 8.29:, - Security testing in development and acceptance, 8.30:, - Outsourced development, 8.31:, - Separation of development, test and production environments, 8.32:, - Change management, 8.33:, - Test information, 8.34:, - Protection of information systems during audit testin

  • 29

    Annex 8 | Technological controls:

    8.1:, - User end point devices., 8.2:, - Privileged access rights, 8.3:, - Information access restriction, 8.4:, - Access to source code, 8.5: , - Secure authentication, 8.6:, - Capacity management, 8.7:, - Protection against malware, 8.8:, - Management of technical vulnerabilities, 8.9:, - Configuration management, 8.10:, - Information deletion, 8.11:, - Data masking, 8.12:, - Data leakage prevention, 8.13:, - Information backup, 8.14:, - Redundancy of information, 8.15:, - Logging, 8.16:, - Monitoring activities, 8.17:, - Clock synchronization, 8.18:, - Use of privileged utility programs, 8.19:, - Installation of software on operational systems, 8.20:, - Networks security, 8.21:, - Security of network services, 8.22:, - Segregation of networks, 8.23:, - Web filtering., 8.24:, - Use of cryptographyg, 8.25:, - Secure development life cycle, 8.26:, - Application security requirements, 8.27:, - Secure system architecture and engineering principles, 8.28:, - Secure coding, 8.29:, - Security testing in development and acceptance, 8.30:, - Outsourced development, 8.31:, - Separation of development, test and production environments, 8.32:, - Change management, 8.33:, - Test information, 8.34:, - Protection of information systems during audit testin