Cybercrime and Social Engineering- Lesson 1 Flashcards

1
Q

what is R.A. No. 10175?

A

The Cybercrime Prevention Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Encompasses a wide range of criminal activities that are carried out using digital devices and/or networks.

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

These crimes involve the use of technology to commit fraud, identity theft, data
breaches, computer viruses, scams, and expanded upon in other malicious acts.

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is the guideline/ law that penalize acts like cybersex,
child pornography, identity theft
and unsolicited electronic
communication in the country?

A

R.A. No. 10175: The
Cybercrime Prevention
Act

sept. 12 2012
by President Benigno Aquino

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is the art of exploiting human psychology, rather than
technical hacking techniques, to gain access to buildings, systems, or data.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what lifecycle where the cybercriminal choose current event, identify potential targets and gather information about their targets?

A

Research

1st step

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what lifecycle where the cybercriminal enagage targets using a fake but believable story to build a relationship to their victim?

A

Hook

2nd step

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what lifecycle where the cybercriminal obtain personal information and convince target to send money?

A

Extract

3rd step

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what lifecycle where the cybercriminal end the relationship or cover tracks?

A

Exit

4th/ final step

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is the most common type of social engineering tactic. Emails that include links that install malware on your devices.

A

PHISHING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

text based phishing?

A

Smishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

voice based phishing?

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

occur
when hackers target a specific individual or organization.

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is a term used to describe phishing attacks that target a specific, high-profile person. Usually, an executive, government official, or celebrity.

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

occurs when someone creates a fake persona or misuses their actual
role. Establish trust using their title, then convince victims to give
them sensitive data.

A

Pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is a type of social engineering attack in which scammers lure victims into providing sensitive information by promising them something valuable in return.

A

Baiting

example : pop-up ads that offer free games, music or movie

17
Q

are a form of email fraud where the attacker masquerades as a C-level executive and attempts to trick the recipient into performing their business function, for an illegitimate purpose, such as wiring them
money.

A

Business Email Compromise (BEC)

Result/execution of Whaling

18
Q

R.A. No. ____ : The
Cybercrime Prevention
Act

A

10175

19
Q

translates to “a favor for a favor.ˮ
Example: Theyʼll call or message you with an offer to speed up your internet, extend a free
trial, or even give you free gift cards in return for trying out software.

A

Quid Pro Quo attacks

20
Q

also known as fraudware. Frightens victims into believing theyʼre under imminent threat.

A

Scareware

21
Q
  • refer to a type of attack in which an authorized person allows an unauthorized person access to a restricted area.
  • Someone followed you into the bldg.
  • Scammers may dressed up as someone.
A

Piggybacking and Tailgating

22
Q

In what date was R.A. No. 10175: The
Cybercrime Prevention
Act filed?

A

Sept. 12, 2012