Soft examinations High Students: April 4, 2016 jobs
First, change management
1, the principle of change management is the first?
2. What are the more configuration tools in China? (3)
3. Is CCB a decision-making body or an operating institution?
4. What is the role of the project manager in the change?
5. Change of working procedure? Remember
6. What is the purpose of the preliminary revision? Remember
7. What are the various aspects of the evaluation of the effect of change?
8, for change, when can use batch processing, sub-priority way, in order to improve efficiency?
9, the project size is small, and other projects associated with the hour, high-tech should be simple and efficient, need to pay attention to which three points?
10. What topics should be included in the control of schedule changes? Remember
11, the control of cost change, including which topics?
12. Please describe the difference between change management and configuration management.
Second, security management
1, information security ternary group is what?
2, the confidentiality of data generally through which to achieve?
3. What are the technologies that ensure data integrity?
4. What are the technologies that ensure availability?
5, in iso/iec27001, the content of information security management is summed up in which 11 aspects?
6. What is business continuity management?
7. What are the security technologies commonly used in the application system?
8. What are the main factors that affect information integrity?
9. What are the main methods to ensure the integrity of the application system?
10, which nature is generally used in the system normal use time and the entire working time ratio to measure?
11, in the safety management system, different security level of security management agencies should be in which order to gradually establish their own information security organization management system?
12, in the information system security management elements list, "Risk management" category, including which families? What families are included in the Business Continuity management category?
13, gb/t20271-2006, Information system security technology system is how to describe? (one-level title only)
14, for power, what is emergency power supply? Regulated power supply? Power protection? Uninterrupted power supply?
15, the personnel in and out of the room and operation of the scope of access control including Which?
16, for electromagnetic compatibility, computer equipment to prevent leakage of what content?
17, to which key positions of personnel for unified management, allow one person more post, but business application operators can not be other key positions of personnel concurrently?
18, business developers and system maintenance personnel can not concurrently or hold what positions?
19, the application system operation involves four levels of security, according to the granularity from coarse to fine sort is what? Remember
20, which is system-level security?
22. What is resource access security?
23. What is functional safety?
24. What is data domain security?
25. What is the scope of the system operation security check and record? (and describe each of the contents)
26, classified according to the relevant provisions classified as: Top Secret, confidential and?
27, the reliability level is divided into which three levels?
Soft examinations High Students: April 4, 2016 jobs