Annex A.8 Flashcards

1
Q

A.8.1

A

User Endpoint Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A.8.2

A

Privileged Access Rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A.8.3

A

Information Access Restriction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A.8.4

A

Access to source code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A.8.5

A

Secure Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A.8.6

A

Capacity Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A.8.7

A

Protection against Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A.8.8

A

Management of technical vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A.8.9

A

Configuration Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A.8.10

A

Information Deletion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A.8.11

A

Data Masking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A.8.12

A

Data Leakage Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A.8.13

A

Information Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A.8.14

A

Redundancy of Information processing facilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A.8.15

A

Logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A.8.16

A

Monitoring activities

17
Q

A.8.17

A

Clock Synchronization

18
Q

A.8.18

A

Use of privileged utility programs

19
Q

A.8.19

A

Installation of software on operational systems

20
Q

A.8.20

A

Network Security

21
Q

A.8.21

A

Security of Network Services

22
Q

A.8.22

A

Segregation of Networks

23
Q

A.8.23

A

Web filtering

24
Q

A.8.24

A

Use of cryptography

25
Q

A.8.25

A

Secure Development Lifecycle

26
Q

A.8.26

A

Application Security Requirements

27
Q

A.8.27

A

Secure System Architecture and Engineering Principle

28
Q

A.8.28

A

Secure Coding

29
Q

A.8.29

A

Security Testing in Development and Acceptance

30
Q

A.8.30

A

Outsourced Development

31
Q

A.8.31

A

Separation of Development, Test, and Production Environments

32
Q

A.8.32

A

Change Management

33
Q

A.8.33

A

Test Information

34
Q

A.8.34

A

Protection of Information Systems during Audit Testing