FQ2 Flashcards

1
Q

What cyber attack in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed in an unauthorized fashion?

A

Data Breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

With the assistance of GCash, agents of the NBI CCD were able to put behind bars individuals suspected of defrauding GCash customers. GCash has worked closely with law enforcement agencies, including the NBI-CCD and the PNP-ACG, to deliver an above-and-beyond customer experience and identify fraudsters abusing its platform. What type of fraud was committed here?

A

cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is an example of a Personal Information Data?

A

email account name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What results a malicious insider that partners with an outsider to provide unauthorized access to physical and digital systems?

A

Collusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which principle should be applied in this scenario: A marketing agent must be able to submit his marketing pieces to his supervisor tonight e-mail system isn’t responding to requests at that time?

A

availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What attacker accesses a computer illegally but has the intent of destroying data, stealing information, or other malicious actions.

A

cracker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a collective term that describes the resources employed to protect online identity, data, and other other assets.

A

Digital security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What network attack uses submitting of malicious codes to compromise the network to access sensitive information such as user passwords?

A

SQL injections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which specific group of people have an excellent computer and networking skills and are hired to break into a specific computer and steal its proprietary data and information.

A

corporate spies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is NOT a digital security risk.

A

system login

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This happens when someone uses another person’s financial or personal data, usually for monetary gains. The fraudster takes sensitive information like names, birthdates, social security numbers, driver’s license details, addresses, bank numbers or credit card numbers. Choose the best answer

A

Information theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

They often gain access by exploiting human vulnerabilities, convincing other people to hand over credentials or sensitive data.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of network attack uses a bombardment and overwhelming of enterprise servers with fraudulent traffic?

A

DDOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What access to an information system or network that violates the owner or operator’s stated security policy?

A

Unauthorized Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are mistakes/error found in software; also they annoying but harmless unless they pose as significant weaknesses to exploit to gain unauthorized access to applications, networks, operating systems, or hardware?

A

Bug

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which principle means that data and systems should only be used by persons who are authorized to use them and not allow outsiders the possibility to change or destroy data or any access to them at all?

A

confidentiality

17
Q

Which of the following is not a human factor in information security problems.

A

fires and other catastrophes

18
Q

Which event or action could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing capability?

A

Data Security Risk

19
Q

What type of an unauthorized access tactic that uses social engineering, phishing, or researching a person to come up with information to gain entry to a system?

A

Exploiting vulnerabilities

20
Q

Which any method of verifying a user without requiring the user to provide a password. Proving the user’s identity can instead be done using an alternative factor like a proof of possession factor?

A

passwordless authentication

21
Q

What happens if the software are outdated and can cause to create a hole that allows an attacker to sneak malware onto a computer and steal data?

A

Malware attacks

22
Q

What tactic used to gain physical access by following an authorized person into a secure building, area, or room disguising as delivery or repair person

A

Tailgaiting

23
Q

According to Cybint, 2020, what percentage of cybersecurity breaches are caused by human error?

A

95%

24
Q

What is a type of cybercriminal that uses the Internet or network to destroy o damage computers for political reasons?

A

cyberterrorists

25
Q

What occurs when attackers use spam and phishing email tactics to trick the user into revealing user credentials, downloading malware attachments, or directing users to vulnerable websites?

A

Malware attacks

26
Q

Which principle supports this situation: data and systems are reliable, up-to-date, and they will not change or be changed due to hardware or software defects, natural phenomena or human interventions.

A

integrity

27
Q

It is an organized approach to addressing and managing the aftermath of a security breach or cyberattack?

A

Incident response

28
Q

Which kind of network attacks where malicious parties gain unauthorized access to monitor and steal private data without making any alterations?

A

Passive network attacks

29
Q

What processes and tools are designed and deployed to protect sensitive business information from modification, disruption, destruction, and inspection?

A

Information Security

30
Q

Which occurs when malicious parties intercept traffic conveyed between networks and external data sources or within a network?

A

MITM

31
Q

In 2015, the controversial dating website Ashley Madison was hacked by Impact Team. Instead of money, the group threatened to dump users’ information publicly if Avid Life Media (ALM, the company behind Ashley Madison) wouldn’t shut down its dating sites. ALM didn’t give in to the demands, so the group went on to dump Ashley Madison’s data online. What type of attackers are the Impact Team?

A

cyberextortionist

32
Q

It is a more of an ideology than mere hacker group that has many similarities to the infamous hacking collective ‘Anonymous’. What is the name of Philippines hacker group that has similarities with Anonymous?

A

digital security

33
Q

What program that enables users to install administrative remoted access on devices including laptops, phones, to monitor activities and perform remote access?

A

MDM

34
Q

What is an attack whose goal ranges from disabling a government’s computer network to crippling a country?

A

cyberwarfare

35
Q

Which of the following cybercrime offenses is related to offenses against Confidentiality, Integrity, and Availability of Computer Data and Systems?

A

Identity Theft

36
Q

What are weaknesses found in out-of-date software which can create an entrance to allow an attacker to sneak malware onto a computer and steal data?

A

System vulnerabilities