Controls Flashcards

1
Q

Security of network services

A

8.21 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data masking

A

8.11 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Protection of records

A

5.33 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security of assets off-premises

A

7.9 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security testing in development and acceptance

A

8.29 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Segregation of networks

A

8.22 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Information security event reporting

A

6.8 #Detective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Contact with authorities

A

5.5 #Preventive #Corrective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Configuration management

A

8.9 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Compliance with policies, rules, and standards for information security

A

5.36 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Secure development life cycle

A

8.25 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Storage media

A

7.10 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Information security awareness, education, and training

A

6.3 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Remote working

A

6.7 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Assessment and decision on information security events

A

5.25 #Detective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Information security for use of cloud services

A

5.23 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Installation of software on operational systems

A

8.19 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Secure coding

A

8.28 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Separation of development, test, and production environments

A

8.31 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Use of privileged utility programs

A

8.18 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Information security roles and responsibilities

A

5.2 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Access rights

A

5.18 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Access control

A

5.15 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Secure authentication

A

8.5 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Physical security perimeters

A

7.1 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Protection against malware

A

8.7 #Preventive #Detective #Corrective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Managing information security in the ICT supply chain

A

5.21 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Return of assets

A

5.11 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Response to information security incidents

A

5.26 #Corrective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Information security in project management

A

5.8 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Legal, statutory, regulatory, and contractual requirements

A

5.31 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Responsibilities after termination or change of employment

A

6.5 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Policies for information security

A

5.1 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Screening

A

6.1 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Capacity management

A

8.6 #Preventive #Detective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

User endpoint devices

A

8.1 #Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Threat intelligence

A

5.7 #Preventive #Detective #Corrective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Independent review of information security

A

5.35 #Preventive #Corrective

39
Q

Authentication information

A

5.17 #Preventive

40
Q

Management of technical vulnerabilities

A

8.8 #Preventive

41
Q

Secure disposal or re-use of equipment

A

7.14 #Preventive

42
Q

Use of cryptography

A

8.24 #Preventive

43
Q

Working in secure areas

A

7.6 #Preventive

44
Q

Collection of evidence

A

5.28 #Corrective

45
Q

Documented operating procedures

A

5.37 #Preventive #Corrective

46
Q

Protection of information systems during audit testing

A

8.34 #Preventive

47
Q

Clear desk and clear screen

A

7.7 #Preventive

48
Q

Test information

A

8.33 #Preventive

49
Q

Physical entry

A

7.2 #Preventive

50
Q

Monitoring, review, and change management of supplier services

A

5.22 #Preventive

51
Q

Redundancy of information processing facilities

A

8.14 #Corrective

52
Q

Labelling of information

A

5.13 #Preventive

53
Q

Network security

A

8.20 #Preventive #Detective

54
Q

Classification of information

A

5.12 #Preventive

55
Q

Acceptable use of information and other associated assets

A

5.10 #Preventive

56
Q

Physical security monitoring

A

7.4 #Preventive #Detective

57
Q

Confidentiality or non-disclosure agreements

A

6.6 #Preventive

58
Q

Contact with special interest groups

A

5.6 #Preventive #Corrective

59
Q

Information backup

A

8.13 #Corrective

60
Q

Web filtering

A

8.23 #Preventive

61
Q

Information security incident management planning and preparation

A

5.24 #Corrective

62
Q

Management responsibilities

A

5.4 #Preventive

63
Q

Secure system architecture and engineering principles

A

8.27 #Preventive

64
Q

Addressing information security within supplier agreements

A

5.20 #Preventive

65
Q

Equipment siting and protection

A

7.8 #Preventive

66
Q

Application security requirements

A

8.26 #Preventive

67
Q

Intellectual property rights

A

5.32 #Preventive

68
Q

Outsourced development

A

8.30 #Preventive #Detective

69
Q

Learning from information security incidents

A

5.27 #Preventive

70
Q

Terms and conditions of employment

A

6.2 #Preventive

71
Q

Data leakage prevention

A

8.12 #Preventive #D

72
Q

Segregation of duties

A

5.3 #Preventive

73
Q

Information transfer

A

5.14 #Preventive

74
Q

Privileged access rights

A

8.2 #Preventive

75
Q

Information security in supplier relationships

A

5.19 #Preventive

76
Q

Identity management

A

5.16 #Preventive

77
Q

Change management

A

8.32 #Preventive

78
Q

Supporting utilities

A

7.11 #Preventive #Detective

79
Q

Access to source code

A

8.4 #Preventive

80
Q

Protecting against physical and environmental threats

A

7.5 #Preventive

81
Q

Monitoring activities

A

8.16 #Detective #Corrective

82
Q

Logging

A

8.15 #Detective

83
Q

Equipment maintenance

A

7.13 #Preventive

84
Q

ICT readiness for business continuity

A

5.30 #Corrective

85
Q

Inventory of information and other associated assets

A

5.9 #Preventive

86
Q

Information access restriction

A

8.3 #Preventive

87
Q

Information deletion

A

8.10 #Preventive

88
Q

Clock synchronization

A

8.17 #Detective

89
Q

Cabling security

A

7.12 #Preventive

90
Q

Disciplinary process

A

6.4 #Preventive #Corrective

91
Q

Information security during disruption

A

5.29 #Preventive #Corrective

92
Q

Securing offices, rooms, and facilities

A

7.3 #Preventive

93
Q

Privacy and protection of PII

A

5.34 #Preventive