quiz Flashcards

1
Q

It is concerned with safeguarding the physical
assets, people, and infrastructure of an
organization from unauthorized access, damage,
theft, or harm.

A

Physical Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

people, hardware, and supporting
systems, which includes buildings and their various parts.

A

Physical Assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

These are critical components of a
comprehensive security strategy for protecting facilities
and assets.

A

Physical Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

These are obvious barriers make it
clear to people that they are not allowed to walk beyond a
certain point.

A

Walls or Fences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Obvious points of access.

A

Gate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

assigning it on a gate, a door, or an asset allows
you to set rules for passage and usage that can be
interpreted by a human being or referred to an authorizing
level of management.

A

Guards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

They should probably appear as a subset
of guards.

A

Guard Dogs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It involves securing the
outer boundaries of a facility.

A

Perimeter Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It regulate and
monitor entry and exit points to a facility.

A

Access Control Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

It include closed-circuit
television cameras strategically placed to
monitor and record activities within and around
the facility.

A

Surveillance Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

It uses sensors
to detect unauthorized entry or movement within
secured areas.

A

Intrusion Detection Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

It contributes to the overall
safety of a facility by reducing blind spots and
enhancing the effectiveness of other security
measures.

A

Security Lighting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It provide additional
protection against forced entry, vehicle attacks,
or other physical threats.

A

Physical Barriers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

– They play a crucial role in
monitoring access points, conducting patrols,
and responding to emergencies.

A

Security Personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

It uses
unique physiological or behavioral
characteristics for identity verification.

A

Biometric Access Control Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

These plans include designated evacuation routes, assembly points, and emergency
communication systems.

A

Emergency Response and Evacuation Plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

It include measures
like fire suppression systems, climate control,
and humidity regulation to protect physical
assets from environmental hazards.

A

Environmental Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

It involves a comprehensive approach that
encompasses project management, technical
aspects, non-technical aspects, and
certification/accreditation processes.

A

Implementing Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

– It
involves planning, executing, and controlling
activities to ensure that security measures are
effectively implemented within an organization.

A

Information Security Project Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

It
involves deploying and configuring security
technologies, tools, and measures to protect
information assets.

A

Technical Aspects of Implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

It
involves policies, procedures, training, and
awareness campaigns aimed at fostering a
security-conscious culture within the
organization.

A

Nontechnical Aspects of Implementation

21
Q

It involves assessing and
validating the effectiveness of an organization’s
information security controls.

A

Information System Security Certification
and Accreditation

22
Q

– It is a critical aspect
of managing a secure information assurance security

A

Information Security Maintenance

23
Q

It is meant to be a generic
description of what an organization should do to provide a
secure environment for itself.

A

Security Management Model

24
Q

This is being
implemented to define the framework for
decision-making, accountability, and
responsibility in information security.

A

Security Governance

25
Q

It
is embraced to detect security incidents and
vulnerabilities in real-time.

A

Continuous Monitoring and Improvement

26
Q

This is applied to
guide the ongoing development, maintenance,
and improvement of security measures.

A

Security Lifecycle Models

27
Q

– It is ensured to
conduct regularly and that this plan is dynamic,
adapting to changes in the organization and the
external environment.

A

Risk Management Models

28
Q

This is established and monitored
to measure the effectiveness of security controls.

A

Security Metrics and Key Performance
Indicators

29
Q

Protecting
sensitive government information, military
communications, and critical infrastructure from
cyber threats is crucial for maintaining the
country’s security and stability.

A

National Security Concerns

30
Q

About the
awareness campaigns which can help prevent
common security pitfalls such as weak
passwords, social engineering attacks, and
unsafe online behavior.

A

Education and
Awareness

31
Q

are governed by a combination of
legal frameworks, industry standards, and organizational
policies.

A

Ethical Laws on IT

32
Q

Enacted to protect the fundamental human right to privacy,
this law governs the processing of personal information.

A

DATA PRIVACY ACT OF 2012 (R.A. NO. 10173)

33
Q

It addresses issues related to online contracts,
digital signatures, and the use of electronic data
messages.

A

ELECTRONIC COMMERCE ACT OF 2000 (R.A. NO.
8792)

34
Q
  • Enacted to address offenses committed using the
    internet, this law includes provisions on cybercrime, such
    as illegal access, data interference, computer-related
    fraud, and content-related offenses.
A

CYBERCRIME PREVENTION ACT OF 2012 (R.A. NO.
10175)

35
Q

This law criminalizes the unauthorized
recording, sharing, or publication of private acts through
photos or videos without the consent of the individuals
involved.

A

ANTI-PHOTO AND VIDEO VOYEURISM ACT OF 2009
(R.A. NO. 9995)

36
Q

This law penalizes fraudulent acts involving
access devices, including credit cards and debit cards.

A

ACCESS DEVICES REGULATION ACT OF 1998 (R.A.
NO. 8484)

37
Q

– It protects copyright and
related rights. It covers software and other digital content
created by individuals or organizations.

A

INTELLECTUAL PROPERTY CODE OF THE
PHILIPPINES (R.A. NO. 8293)

38
Q

With the
implementation of this, organizations are legally
obligated to ensure the protection of personal
data.

A

Data Protection and Privacy

39
Q

The Philippines, like
many other countries, faces a range of it,
including malware, phishing attacks.

A

Cybersecurity Threat

40
Q

– It
is all about the growth of digital financial services
and e-commerce in the Philippines that requires
a secure online environment.

A

Financial Transactions and E-commerce

41
Q

Ensuring the security of these
systems is crucial to prevent disruptions,safeguard national interests, and protect
citizens’ data.

A

Government Systems and Critical
Infrastructure -

42
Q

This type of study focuses on one
individual. This case study would use several
types of research to determine an outcome.

43
Q

This type of study focuses on a group
of people. This could be a family, a group, or
friends, or even coworkers.

43
Q

This type of study
focuses on a business or an organization.

A

Organization/Company

44
Q

– This type of study focuses on a place,
and how and why people use the place.

45
Q

– This type of study focuses on an event,
whether cultural or societal, and how it affects
those that are affected by it.

46
Q

A step to
determine what the case study will be about.

A

Define The Task, Question or Topic

47
Q

– This
research stage is the longest and most detailed
of the case study process.

A

Do Research, Interviews, Collect Data

48
Q

– A step to know what the study
proved and what conclusions can be made.

A

Make Recommendations and Form
Conclusions

49
Q

It that requires a cover page,
references, and all the acquired data and
information compiled in a readable and cohesive
report.

A

Write The Report