Annex A.5 Flashcards

(37 cards)

1
Q

A.5.1

A

Information Security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A.5.2

A

Information Security roles and responsibilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A.5.3

A

Segregation of Duty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A.5.4

A

Management responsibilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A.5.5

A

Contact with Government Authorities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A.5.6

A

Contact with special interest groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A.5.7

A

Threat intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A.5.8

A

Information security in projects management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A.5.9

A

Inventory of Information and other associated assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A.5.10

A

Acceptable use of information and other associated assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A.5.11

A

Return of assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A.5.12

A

Classification of Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A.5.13

A

Labelling of Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A.5.14

A

Information Transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A.5.15

A

Access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A.5.16

A

Identity Management

17
Q

A.5.17

A

Authentication information

18
Q

A.5.18

A

Access rights

19
Q

A.5.19

A

Information Security in supplier relationship

20
Q

A.5.20

A

Addressing information security within supplier agreements

21
Q

A.5.21

A

Managing information security in the ICT supply chain

22
Q

A.5.22

A

Monitoring and review and change management of supplier service

23
Q

A.5.23

A

Information Security for use of cloud service

24
Q

A.5.24

A

Information Security incident management planning and preparation

25
A.5.25
Information assessment and decision on information security event
26
A.5.26
Response to information security incidents
27
A.5.27
Learning from information security incidents
28
A.5.28
Collection of evidence
29
A.5.29
Information Security during disruption
30
A.5.30
ICT readiness for Business continuity
31
A.5.31
Legal, statutory, regulatory, and contractual requirements
32
A.5.32
intellectual property rights
33
A.5.33
Protection of Record
34
A.5.34
Privacy and protection of PIi
35
A.5.35
Independent review of information security
36
A.5.36
Compliance with policies, rules, and standard for information security
37
A.5.37
Documented operating procedures