FQ2 Flashcards
What cyber attack in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed in an unauthorized fashion?
Data Breach
With the assistance of GCash, agents of the NBI CCD were able to put behind bars individuals suspected of defrauding GCash customers. GCash has worked closely with law enforcement agencies, including the NBI-CCD and the PNP-ACG, to deliver an above-and-beyond customer experience and identify fraudsters abusing its platform. What type of fraud was committed here?
cybercrime
Which of the following is an example of a Personal Information Data?
email account name
What results a malicious insider that partners with an outsider to provide unauthorized access to physical and digital systems?
Collusion
Which principle should be applied in this scenario: A marketing agent must be able to submit his marketing pieces to his supervisor tonight e-mail system isn’t responding to requests at that time?
availability
What attacker accesses a computer illegally but has the intent of destroying data, stealing information, or other malicious actions.
cracker
What is a collective term that describes the resources employed to protect online identity, data, and other other assets.
Digital security
What network attack uses submitting of malicious codes to compromise the network to access sensitive information such as user passwords?
SQL injections
Which specific group of people have an excellent computer and networking skills and are hired to break into a specific computer and steal its proprietary data and information.
corporate spies
Which of the following is NOT a digital security risk.
system login
This happens when someone uses another person’s financial or personal data, usually for monetary gains. The fraudster takes sensitive information like names, birthdates, social security numbers, driver’s license details, addresses, bank numbers or credit card numbers. Choose the best answer
Information theft
They often gain access by exploiting human vulnerabilities, convincing other people to hand over credentials or sensitive data.
Social Engineering
Which type of network attack uses a bombardment and overwhelming of enterprise servers with fraudulent traffic?
DDOS
What access to an information system or network that violates the owner or operator’s stated security policy?
Unauthorized Access
What are mistakes/error found in software; also they annoying but harmless unless they pose as significant weaknesses to exploit to gain unauthorized access to applications, networks, operating systems, or hardware?
Bug