Intermediate Students: October 26, 2015 jobs

Source: Internet
Author: User

Intermediate Students: October 26, 2015 jobs
First, change management
1, the change of the working procedure;
2, change the first instance of 4 content;
3. Control of progress change, including which topics.
Second, security management
1, which technology to achieve the confidentiality of information;
2, which technology to achieve the integrity of information;
3, which technology to achieve the availability of information;
4, the definition of reliability, and measurement methods.
5. What are the common security technologies used in the application system?
6. What are the methods to ensure the integrity of the application system?
7, the room for distribution of 8 kinds of power;
8, emergency power supply, voltage supply of the content;
9, the application system operation, involving 4 levels of security, these 4 levels of security, according to the granularity from coarse to fine arrangement;
10, which belongs to system-level security;
11, which belongs to the security of resource access;
12, which belongs to functional safety;
13, the data domain security includes which 2 levels;
14, the application system's access control inspection includes which;
15, the application system log check including which;
16, the usability of the application system to check including which;
17, the application system maintenance check including which;
18, the security level is divided into which 2 kinds;
Third, risk management
1, the risk management process includes which six steps;
2, the risk of accidents, and the difference between risk factors;
3. What are the methods of risk identification;
4. What are the methods of risk qualitative analysis;
5, risk qualitative analysis, according to the probability and impact matrix, high-risk measures, what is the low-risk measures;
6. What are the methods of risk quantitative analysis;
7, the negative risk of the response strategy there are 3, and each to give an example of the explanation;
8. What are the 3 strategies for positive risk, and one example;
9. At the same time apply to the negative risk and positive strategy is what, and examples.
10. Definition of Risk audit

Intermediate Students: October 26, 2015 jobs

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.