Annex A.8 Flashcards

1
Q

A.8.1

A

User Endpoint Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A.8.2

A

Privileged Access Rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A.8.3

A

Information Access Restriction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A.8.4

A

Access to source code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A.8.5

A

Secure Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A.8.6

A

Capacity Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A.8.7

A

Protection against Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A.8.8

A

Management of technical vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A.8.9

A

Configuration Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A.8.10

A

Information Deletion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A.8.11

A

Data Masking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A.8.12

A

Data Leakage Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A.8.13

A

Information Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A.8.14

A

Redundancy of Information processing facilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A.8.15

A

Logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A.8.16

A

Monitoring activities

17
Q

A.8.17

A

Clock Synchronization

18
Q

A.8.18

A

Use of privileged utility programs

19
Q

A.8.19

A

Installation of software on operational systems

20
Q

A.8.20

A

Network Security

21
Q

A.8.21

A

Security of Network Services

22
Q

A.8.22

A

Segregation of Networks

23
Q

A.8.23

A

Web filtering

24
Q

A.8.24

A

Use of cryptography

25
A.8.25
Secure Development Lifecycle
26
A.8.26
Application Security Requirements
27
A.8.27
Secure System Architecture and Engineering Principle
28
A.8.28
Secure Coding
29
A.8.29
Security Testing in Development and Acceptance
30
A.8.30
Outsourced Development
31
A.8.31
Separation of Development, Test, and Production Environments
32
A.8.32
Change Management
33
A.8.33
Test Information
34
A.8.34
Protection of Information Systems during Audit Testing