Annex A.5 Flashcards

1
Q

A.5.1

A

Information Security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A.5.2

A

Information Security roles and responsibilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A.5.3

A

Segregation of Duty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A.5.4

A

Management responsibilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A.5.5

A

Contact with Government Authorities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A.5.6

A

Contact with special interest groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A.5.7

A

Threat intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A.5.8

A

Information security in projects management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A.5.9

A

Inventory of Information and other associated assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A.5.10

A

Acceptable use of information and other associated assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A.5.11

A

Return of assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A.5.12

A

Classification of Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A.5.13

A

Labelling of Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A.5.14

A

Information Transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A.5.15

A

Access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A.5.16

A

Identity Management

17
Q

A.5.17

A

Authentication information

18
Q

A.5.18

A

Access rights

19
Q

A.5.19

A

Information Security in supplier relationship

20
Q

A.5.20

A

Addressing information security within supplier agreements

21
Q

A.5.21

A

Managing information security in the ICT supply chain

22
Q

A.5.22

A

Monitoring and review and change management of supplier service

23
Q

A.5.23

A

Information Security for use of cloud service

24
Q

A.5.24

A

Information Security incident management planning and preparation

25
Q

A.5.25

A

Information assessment and decision on information security event

26
Q

A.5.26

A

Response to information security incidents

27
Q

A.5.27

A

Learning from information security incidents

28
Q

A.5.28

A

Collection of evidence

29
Q

A.5.29

A

Information Security during disruption

30
Q

A.5.30

A

ICT readiness for Business continuity

31
Q

A.5.31

A

Legal, statutory, regulatory, and contractual requirements

32
Q

A.5.32

A

intellectual property rights

33
Q

A.5.33

A

Protection of Record

34
Q

A.5.34

A

Privacy and protection of PIi

35
Q

A.5.35

A

Independent review of information security

36
Q

A.5.36

A

Compliance with policies, rules, and standard for information security

37
Q

A.5.37

A

Documented operating procedures