Sign in

(Prelims) Information Assurance and Security Mocktest BSIT 604

(Prelims) Information Assurance and Security Mocktest BSIT 604
33 views • 92 questions • 20 d ago
  • Xai Alexandrei Delos Reyes
  • Report

    Question list

  • 1

    It is the state of the well-being of information and infrastructure in which the possibility of theft, tampering, or disruption of information and services is kept low or tolerable. It is the protection or safeguarding of information systems that use, store, and transmit information from unauthorized access, disclosure, alteration, and destruction.

    Information security

  • 2

    It is a specification of how objects in a security domain are allowed to interact.

    Security policy

  • 3

    "It is the assurance that the information is accessible only to authorized people." What Element of Information Security is being described?

    Confidentiality

  • 4

    "It is the trustworthiness of data or resources in the prevention of improper and unauthorized changes" What Element of Information Security is being described?

    Integrity

  • 5

    "The characteristic of communication, documents, or any data that ensures the quality of being genuine or uncorrupted. The major role of authentication is to confirm that a user is authentic." What Element of Information Security is being described?

    Authenticity

  • 6

    "A guarantee that the sender of a message cannot later deny having sent the message and that the recipient cannot deny having received the message" What Element of Information Security is being described?

    Non-repudiation

  • 7

    What are the three (3) components that define the security of any System?

    Functionality, Usability, Security

  • 8

    It originates from the notion that a target system stores or processes something valuable, which leads to the threat of an attack on the system

    Motive

  • 9

    This is when the reason to attack may be to disrupt the target’s organization’s business operations, to steal valuable information for the sake of curiosity, or even to enact revenge

    Goal

  • 10

    "The intercepting and monitoring of network traffic and data flow on the target network and not tampering with the data." What type of attack is being described?

    Passive Attacks

  • 11

    Also called the initial phase where attackers gather information about a target system, network, or organization, on network activities using sniffers (tools to intercept and analyze data network traffic)

    Reconnaissance

  • 12

    Which is NOT an example of Passive Attacks?

    Denial-of-Service (DoS) attack

  • 13

    "The tampering of the data in transit or disrupting communication or services between the systems to bypass or break into secured systems." What type of attack is being described?

    Active Attacks

  • 14

    Which is NOT an example of Active Attacks?

    Social engineering

  • 15

    "These are performed when the attacker is in close physical proximity to the target system or network. The main goal of performing this type of attack is to gather or modify information or disrupt its access." What type of attack is being described?

    Close-in Attacks

  • 16

    Which is the BEST EXAMPLE of Close-in Attacks?

    Social engineering

  • 17

    "These are performed by trusted persons who have physical access to the critical assets of the target" What type of attack is being described?

    Insider Attacks

  • 18

    Which is NOT an example of Insider Attack?

    Denial-of-Service (DoS) attack

  • 19

    "Occur when attackers tamper with hardware or software before installation. They tamper with the hardware or software at its source or when it is in transit." What type of attack is being described?

    Distribution Attacks

  • 20

    Which is the BEST EXAMPLE of a Distribution Attack?

    Backdoors

  • 21

    "Clients can store sensitive information in the cloud. A flaw in one client’s application cloud could potentially allow attackers to access another client’s data." Which attack access method is being described?

    Cloud computing threats

  • 22

    It refers to the on-demand delivery of IT capabilities in which IT infrastructure and applications are provided to subscribers as a metered service over a network

    Cloud computing

  • 23

    "An attack that focuses on stealing information from the victim machine without its user being aware of it. These attacks are generally targeted at large companies and government networks." Which attack access method is being described?

    Advanced Persistent Threats (APT)

  • 24

    "These are the most prevalent networking threats and are capable of infecting a network within seconds" Which attack access method is being described?

    Viruses and Worms

  • 25

    "It is a self-replicating program that produces a copy of itself by attaching to another computer program, boot sector, or document." Which attack access method is being described?

    Virus

  • 26

    "It is a malicious program that replicates, executes, and spreads across network connections." Which attack access method is being described?

    Worm

  • 27

    "A malware that restricts access to the computer system’s files and folders and demands an online ransom payment to the malware creator(s) in order to remove the restrictions. It is generally spread via malicious attachments to email messages, infected software applications, infected disks, or compromised websites." Which attack access method is being described?

    Ransomware

  • 28

    "Users may download malware-infested applications (APKs) onto their smartphones, which can damage other applications and data or reveal sensitive information to attackers." Which attack access method is being described?

    Mobile Threats

  • 29

    "A huge network of compromised systems used by attackers to perform Denial-of-Service attacks. Bots perform tasks such as uploading viruses, sending emails with botnets attached to them, stealing data, and so on." Which attack access method is being described?

    Botnet

  • 30

    "The practice of sending an illegitimate email falsely claiming to be from a legitimate site in an attempt to acquire a user’s personal or account information. This is done by distributing malicious links via some communication channel or email to obtain private information such as account numbers, credit card numbers, and mobile numbers from the victim." Which attack access method is being described?

    Phishing

  • 31

    "Attacks such as SQL injection and cross-site scripting have made these applications a favorable target for attackers to steal credentials, set up phishing sites, or acquire private information.." Which attack access method is being described?

    Web Application Threats

  • 32

    "Due to hardware constraints such as memory and battery, these applications do not include complex security mechanisms to protect the devices from attacks." Which attack access method is being described?

    Internet of Things (IoT) Threats

  • 33

    These are a system of rules and guidelines that are enforced by a particular country or community to govern behavior.

    Laws

  • 34

    This is a document established by consensus and approved by a recognized body that provides, for common and repeated use, rules, guidelines, or characteristics for activities or their results, aimed at the achievement of the optimum degree of order in a given context.

    Standard

  • 35

    This is a proprietary information security standard for organizations that handle cardholder information for the major debit, credit, prepaid, e-purse, ATM, and POS cards.

    Payment Card Industry Data Security Standard (PCI DSS)

  • 36

    This specifies the requirements for establishing, implementing, maintaining, and continually improving an information security management system within the context of an organization. It includes requirements for the assessment and treatment of information security risks tailored to the needs of the organization.

    ISO/IEC 27001:2013

  • 37

    Its Privacy Rule provides federal protections for the individually identifiable health information held by covered entities and their business associates and gives patients an array of rights to that information. At the same time, the Privacy Rule permits the disclosure of health information needed for patient care and other necessary purposes.

    Health Insurance Portability and Accountability Act (HIPAA)

  • 38

    In HIPAA, This specifies a series of administrative, physical, and technical safeguards for covered entities and their business associates to use to ensure confidentiality, integrity, and availability of electronically protected health information.

    Security Rule

  • 39

    Enacted in 2002, this act aims to protect the public and investors by increasing the accuracy and reliability of corporate disclosures. This act does not explain how an organization must store records but describes the records that organizations must store and the duration of their storage.

    Sarbanes-Oxley (SOX) Act

  • 40

    An American copyright law that implements two (2) 1996 treaties from the World Intellectual Property Organization (WIPO): the WIPO Copyright Treaty and the WIPO Performances and Phonograms Treaty.

    The Digital Millennium Copyright Act (DMCA)

  • 41

    It was enacted to produce several key security standards and guidelines required by Congressional legislation. This provides a comprehensive framework for ensuring the effectiveness of information security controls over information resources that support federal operations and assets.

    The Federal Information Security Management Act (FISMA):

  • 42

    It is one of the most stringent privacy and security laws globally. Though it was drafted and passed by the European Union (EU), it imposes obligations on organizations anywhere, so long as they target or collect data related to people in the EU

    General Data Protection Regulation

  • 43

    This sets out the framework for data protection law in the UK. It updates and replaces the Data Protection Act 1998 and came into effect on 25 May 2018. This is an act to make provision for the regulation of the processing of information relating to individuals; to make provision in connection with the Information Commissioner’s functions under specific rules relating to information; to make provision for a direct marketing code of practice and connected purposes

    Data Protection Act 2018 (DPA)

  • 44

    It refers to any laws that deal with protecting the Internet and other online communication technologies. This covers topics such as Internet access and usage, privacy, freedom of expression, and jurisdiction.

    Cyberlaw or Internet law

  • 45

    It is an efficient and effective way of illustrating how an adversary can attack the target organization.

    Cyber Kill Chain

  • 46

    "The adversary has to collect as much information about the target as possible to probe for weak points before actually attacking" What Cyber Kill Chain Phase is being described?

    Reconnaissance

  • 47

    "The adversary analyzes the data collected in the previous stage to identify the vulnerabilities and techniques that can be exploited and gain unauthorized access to the target organization " What Cyber Kill Chain Phase is being described?

    Weaponization

  • 48

    "The previous stage included creating a weapon. Its payload is transmitted to the intended victim(s) as an e-mail attachment, via a malicious link on websites, or through a vulnerable web application or USB drive" What Cyber Kill Chain Phase is being described?

    Delivery

  • 49

    "After the weapon is transmitted to the intended victim, exploitation triggers the adversary’s malicious code to exploit a vulnerability in the operating system, application, or server on a target system." What Cyber Kill Chain Phase is being described?

    Exploitation

  • 50

    "The adversary downloads and installs more malicious software on the target system to maintain access to the target network for an extended period. They may use the weapon to install a backdoor to gain remote access" What Cyber Kill Chain Phase is being described?

    Installation

  • 51

    "The adversary establishes a two-way communication between the victim’s system and the adversary-controlled server to communicate and pass data back and forth." What Cyber Kill Chain Phase is being described?

    Command and Control

  • 52

    "The adversary controls the victim’s system from a remote location and finally accomplishes their intended goals." What Cyber Kill Chain Phase is being described?

    Actions on Objectives

  • 53

    Which best describes “tactics, techniques, and procedures” ?

    It refer to the patterns of activities and methods associated with specific threat actors or groups of threat actors.

  • 54

    It is defined as a guideline that describes the way an attacker performs their attack from beginning to end.

    Tactics

  • 55

    It is defined as the technical methods used by an attacker to achieve intermediate results during their attack

    Techniques

  • 56

    It is defined as the organizational approach followed by the threat actors to launch their attack.

    Procedures

  • 57

    "usually prefer these services to send malicious data to the target organization or individual. Such socially engineered and are preferred due to their ease of use and comparative anonymity. Examples of this include the sender’s e-mail address, e-mail subject, and attachments or links." What Indicators of Compromise is being described?

    E-mail Indicators

  • 58

    "Useful for command and control, malware delivery, and identifying details about the operating system, browser type, and other computer-specific information." What Indicators of Compromise is being described?

    Network Indicators

  • 59

    "Found by performing an analysis of the infected system within the organizational network. Examples of this include filenames, file hashes, registry keys, DLLs, and mutex." What Indicators of Compromise is being described?

    Host-Based Indicators

  • 60

    "Are used to identify specific behavior related to malicious activities, such as code injection into the memory or running the scripts of an application." What Indicators of Compromise is being described?

    Behavioral Indicators

  • 61

    It refers to exploiting system vulnerabilities and compromising security controls to gain unauthorized or inappropriate access to system resources.

    Hacking

  • 62

    A person who breaks into a system or network without authorization to destroy, steal sensitive data, or perform malicious attacks.

    Hacker

  • 63

    Individuals who use their extraordinary computing skills for illegal or malicious purposes. This category of hacker is often involved in criminal activities. They are also known as crackers.

    Black Hats

  • 64

    These are individuals who use their hacking skills for defensive purposes.

    White Hats, or penetration testers

  • 65

    Individuals who work both offensively and defensively at various times

    Gray Hats

  • 66

    Individuals who aim to bring down critical infrastructure for a “cause” and are not worried about facing jail terms or any other kind of punishment.

    Suicide Hackers

  • 67

    Unskilled hackers who compromise systems by running scripts, tools, and software developed by real hackers.

    Script Kiddies

  • 68

    Individuals with a wide range of skills who are motivated by religious or political beliefs to create the fear of large-scale disruption of computer networks.

    Cyber Terrorists

  • 69

    Skilled individuals having expertise in hacking and are employed by the government to penetrate, gain top-secret information from, and damage the information systems of other government or military organizations.

    State-Sponsored Hackers

  • 70

    They use hacking to increase awareness of their social or political agendas, as well as to boost their reputations in both online and offline arenas. They promote a political agenda, especially by using hacking to deface or disable websites.

    Hacktivist

  • 71

    It is a form of activism in which hackers break into government or corporate computer systems as an act of protest.

    Hacktivism

  • 72

    A consortium of skilled hackers having their own resources and funding

    Hacker Teams

  • 73

    Individuals who perform corporate espionage by illegally spying on competitor organizations. They focus on stealing critical information such as blueprints, formulas, product designs, and trade secrets

    Industrial Spies

  • 74

    Any employee (trusted person) who has access to critical assets of an organization.

    Insiders

  • 75

    Groups of individuals or communities that are involved in organized, planned, and prolonged criminal activities

    Criminal Syndicates

  • 76

    A group of hackers working together in criminal activities

    Organized Hackers

  • 77

    It is the preparatory phase in which an attacker gathers as much information as possible about the target prior to launching the attack. In this phase, the attacker draws on competitive intelligence to learn more about the target. What Hacking Phase is being described?

    Reconnaissance

  • 78

    When an attacker is using these techniques, they do not interact with the target directly. Instead, the attacker relies on publicly available information, news releases, or other non-contact methods.

    Passive Reconnaissance

  • 79

    When an attacker is using these on the other hand, involve direct interactions with the target system by using tools to detect open ports, accessible hosts, router locations, network mapping, details of operating systems, and applications.

    Active Reconnaissance

  • 80

    This is the phase immediately preceding the attack. Here, the attacker uses the details gathered during reconnaissance to scan the network for specific information. What Hacking Phase is being described?

    Scanning

  • 81

    This detect listening ports to find information about the nature of services running on the target machine

    Port scanners

  • 82

    This is the phase in which real hacking occurs. Attackers use vulnerabilities identified during the reconnaissance and scanning phases to gain access to the target system and network. What Hacking Phase is being described?

    Gaining Access

  • 83

    Using a technique called _____ to exploit the system by pretending to be a legitimate user or a different system, attackers can send a data packet containing a bug to the target system to exploit a vulnerability.

    Spoofing

  • 84

    This attack attempt to cause users on a network to flood each other with data, making it appear as if everyone is attacking each other, and leaving the hacker anonymous.

    Smurf attacks

  • 85

    is the phase when the attacker tries to retain their ownership of the system. What Hacking Phase is being described?

    Maintaining Access

  • 86

    Attackers who choose to remain undetected remove evidence of their entry and install a ______ to gain repeat access.

    Backdoor or a Trojan

  • 87

    This refers to the activities carried out by an attacker to hide malicious acts What Hacking Phase is being described?

    Clearing Tracks

  • 88

    This is the process of hiding data in other data, for instance, in image and sound files.

    Steganography

  • 89

    The practice of employing computer and network skills to assist organizations in testing their network security for possible loopholes and vulnerabilities

    Ethical Hacking

  • 90

    This team works together to perform a full-scale test covering all aspects of the network, as well as physical and system intrusion.

    Tiger Team

  • 91

    It is the use of advanced Google search operators for creating complex search queries to extract sensitive or hidden information.

    Google hacking

  • 92

    It is the art of creating complex search engine queries. Queries can retrieve valuable data about a target company from Google search results.

    Advanced Google hacking

  • The Contemporary World Mock test (Prelims)

    The Contemporary World Mock test (Prelims)

    Xai Alexandrei Delos Reyes · 58 questions · 2 y ago

    The Contemporary World Mock test (Prelims)

    The Contemporary World Mock test (Prelims)

    58 questions • 2 y ago
    Xai Alexandrei Delos Reyes

    Computing Mock test (Prelims)

    Computing Mock test (Prelims)

    Xai Alexandrei Delos Reyes · 67 questions · 2 y ago

    Computing Mock test (Prelims)

    Computing Mock test (Prelims)

    67 questions • 2 y ago
    Xai Alexandrei Delos Reyes

    Programming Mock Test (Prelims)

    Programming Mock Test (Prelims)

    Xai Alexandrei Delos Reyes · 64 questions · 2 y ago

    Programming Mock Test (Prelims)

    Programming Mock Test (Prelims)

    64 questions • 2 y ago
    Xai Alexandrei Delos Reyes

    Entrepreneurship Mock Test (Prelims)

    Entrepreneurship Mock Test (Prelims)

    Xai Alexandrei Delos Reyes · 23 questions · 2 y ago

    Entrepreneurship Mock Test (Prelims)

    Entrepreneurship Mock Test (Prelims)

    23 questions • 2 y ago
    Xai Alexandrei Delos Reyes

    Computing Mock Test (Midterms) BSIT 107

    Computing Mock Test (Midterms) BSIT 107

    Xai Alexandrei Delos Reyes · 76 questions · 2 y ago

    Computing Mock Test (Midterms) BSIT 107

    Computing Mock Test (Midterms) BSIT 107

    76 questions • 2 y ago
    Xai Alexandrei Delos Reyes

    Math Mock Test (Prelims)

    Math Mock Test (Prelims)

    Xai Alexandrei Delos Reyes · 48 questions · 2 y ago

    Math Mock Test (Prelims)

    Math Mock Test (Prelims)

    48 questions • 2 y ago
    Xai Alexandrei Delos Reyes

    Programming Mock Test (Midterms) BSIT 107

    Programming Mock Test (Midterms) BSIT 107

    Xai Alexandrei Delos Reyes · 52 questions · 2 y ago

    Programming Mock Test (Midterms) BSIT 107

    Programming Mock Test (Midterms) BSIT 107

    52 questions • 2 y ago
    Xai Alexandrei Delos Reyes

    UTS Mock Test (Midterms) BSIT107

    UTS Mock Test (Midterms) BSIT107

    Xai Alexandrei Delos Reyes · 40 questions · 2 y ago

    UTS Mock Test (Midterms) BSIT107

    UTS Mock Test (Midterms) BSIT107

    40 questions • 2 y ago
    Xai Alexandrei Delos Reyes

    Entrepreneurship Mock Test (Midterms) BSIT 107

    Entrepreneurship Mock Test (Midterms) BSIT 107

    Xai Alexandrei Delos Reyes · 38 questions · 2 y ago

    Entrepreneurship Mock Test (Midterms) BSIT 107

    Entrepreneurship Mock Test (Midterms) BSIT 107

    38 questions • 2 y ago
    Xai Alexandrei Delos Reyes

    Contemporary World Mock Test (Midterms) BSIT 107

    Contemporary World Mock Test (Midterms) BSIT 107

    Xai Alexandrei Delos Reyes · 28 questions · 2 y ago

    Contemporary World Mock Test (Midterms) BSIT 107

    Contemporary World Mock Test (Midterms) BSIT 107

    28 questions • 2 y ago
    Xai Alexandrei Delos Reyes

    Math Mocktest (Midterms) BSIT 107

    Math Mocktest (Midterms) BSIT 107

    Xai Alexandrei Delos Reyes · 24 questions · 2 y ago

    Math Mocktest (Midterms) BSIT 107

    Math Mocktest (Midterms) BSIT 107

    24 questions • 2 y ago
    Xai Alexandrei Delos Reyes

    Computer Programming Mocktest (Pre-finals)

    Computer Programming Mocktest (Pre-finals)

    Xai Alexandrei Delos Reyes · 26 questions · 2 y ago

    Computer Programming Mocktest (Pre-finals)

    Computer Programming Mocktest (Pre-finals)

    26 questions • 2 y ago
    Xai Alexandrei Delos Reyes

    Math Mocktest (Pre-Finals)

    Math Mocktest (Pre-Finals)

    Xai Alexandrei Delos Reyes · 19 questions · 2 y ago

    Math Mocktest (Pre-Finals)

    Math Mocktest (Pre-Finals)

    19 questions • 2 y ago
    Xai Alexandrei Delos Reyes

    Computing Mock Test (Pre-finals)

    Computing Mock Test (Pre-finals)

    Xai Alexandrei Delos Reyes · 36 questions · 2 y ago

    Computing Mock Test (Pre-finals)

    Computing Mock Test (Pre-finals)

    36 questions • 2 y ago
    Xai Alexandrei Delos Reyes

    Computing Mock Test Finals

    Computing Mock Test Finals

    Xai Alexandrei Delos Reyes · 26 questions · 2 y ago

    Computing Mock Test Finals

    Computing Mock Test Finals

    26 questions • 2 y ago
    Xai Alexandrei Delos Reyes

    Comprog 2nd sem (prelims) BSIT 205

    Comprog 2nd sem (prelims) BSIT 205

    Xai Alexandrei Delos Reyes · 63 questions · 2 y ago

    Comprog 2nd sem (prelims) BSIT 205

    Comprog 2nd sem (prelims) BSIT 205

    63 questions • 2 y ago
    Xai Alexandrei Delos Reyes

    Discrete Math 2nd sem (prelims) BSIT 205

    Discrete Math 2nd sem (prelims) BSIT 205

    Xai Alexandrei Delos Reyes · 36 questions · 2 y ago

    Discrete Math 2nd sem (prelims) BSIT 205

    Discrete Math 2nd sem (prelims) BSIT 205

    36 questions • 2 y ago
    Xai Alexandrei Delos Reyes

    Art Appreciation (Prelim) BSIT 205

    Art Appreciation (Prelim) BSIT 205

    Xai Alexandrei Delos Reyes · 56 questions · 2 y ago

    Art Appreciation (Prelim) BSIT 205

    Art Appreciation (Prelim) BSIT 205

    56 questions • 2 y ago
    Xai Alexandrei Delos Reyes

    Ethics 2nd sem (Prelims) BSIT 205

    Ethics 2nd sem (Prelims) BSIT 205

    Xai Alexandrei Delos Reyes · 45 questions · 2 y ago

    Ethics 2nd sem (Prelims) BSIT 205

    Ethics 2nd sem (Prelims) BSIT 205

    45 questions • 2 y ago
    Xai Alexandrei Delos Reyes

    STS 2nd Sem (Prelim) BSIT 205

    STS 2nd Sem (Prelim) BSIT 205

    Xai Alexandrei Delos Reyes · 40 questions · 1 y ago

    STS 2nd Sem (Prelim) BSIT 205

    STS 2nd Sem (Prelim) BSIT 205

    40 questions • 1 y ago
    Xai Alexandrei Delos Reyes

    Systems Administration 2nd sem (Prelims) BSIT 205

    Systems Administration 2nd sem (Prelims) BSIT 205

    Xai Alexandrei Delos Reyes · 72 questions · 1 y ago

    Systems Administration 2nd sem (Prelims) BSIT 205

    Systems Administration 2nd sem (Prelims) BSIT 205

    72 questions • 1 y ago
    Xai Alexandrei Delos Reyes

    Discrete Mathematics (Midterms) BSIT 205

    Discrete Mathematics (Midterms) BSIT 205

    Xai Alexandrei Delos Reyes · 52 questions · 1 y ago

    Discrete Mathematics (Midterms) BSIT 205

    Discrete Mathematics (Midterms) BSIT 205

    52 questions • 1 y ago
    Xai Alexandrei Delos Reyes

    Art Appreciation (Midterm) BSIT 205

    Art Appreciation (Midterm) BSIT 205

    Xai Alexandrei Delos Reyes · 56 questions · 1 y ago

    Art Appreciation (Midterm) BSIT 205

    Art Appreciation (Midterm) BSIT 205

    56 questions • 1 y ago
    Xai Alexandrei Delos Reyes

    Ethics Mocktest (Midterms) BSIT205

    Ethics Mocktest (Midterms) BSIT205

    Xai Alexandrei Delos Reyes · 29 questions · 1 y ago

    Ethics Mocktest (Midterms) BSIT205

    Ethics Mocktest (Midterms) BSIT205

    29 questions • 1 y ago
    Xai Alexandrei Delos Reyes

    Comprog Mocktest (Midterm) BSIT 205

    Comprog Mocktest (Midterm) BSIT 205

    Xai Alexandrei Delos Reyes · 61 questions · 1 y ago

    Comprog Mocktest (Midterm) BSIT 205

    Comprog Mocktest (Midterm) BSIT 205

    61 questions • 1 y ago
    Xai Alexandrei Delos Reyes

    System Administration Mocktest (Midterms) BSIT 205

    System Administration Mocktest (Midterms) BSIT 205

    Xai Alexandrei Delos Reyes · 65 questions · 1 y ago

    System Administration Mocktest (Midterms) BSIT 205

    System Administration Mocktest (Midterms) BSIT 205

    65 questions • 1 y ago
    Xai Alexandrei Delos Reyes

    Math Mocktest (Pre-finals) BSIT 205

    Math Mocktest (Pre-finals) BSIT 205

    Xai Alexandrei Delos Reyes · 49 questions · 1 y ago

    Math Mocktest (Pre-finals) BSIT 205

    Math Mocktest (Pre-finals) BSIT 205

    49 questions • 1 y ago
    Xai Alexandrei Delos Reyes

    Art Appreciation Mocktest (Pre-finals) BSIT 205

    Art Appreciation Mocktest (Pre-finals) BSIT 205

    Xai Alexandrei Delos Reyes · 66 questions · 1 y ago

    Art Appreciation Mocktest (Pre-finals) BSIT 205

    Art Appreciation Mocktest (Pre-finals) BSIT 205

    66 questions • 1 y ago
    Xai Alexandrei Delos Reyes

    Ethics Mocktest (Pre-finals) BSIT 205

    Ethics Mocktest (Pre-finals) BSIT 205

    Xai Alexandrei Delos Reyes · 50 questions · 1 y ago

    Ethics Mocktest (Pre-finals) BSIT 205

    Ethics Mocktest (Pre-finals) BSIT 205

    50 questions • 1 y ago
    Xai Alexandrei Delos Reyes

    Computer Programming Mocktest (Pre-finals) BSIT 205

    Computer Programming Mocktest (Pre-finals) BSIT 205

    Xai Alexandrei Delos Reyes · 33 questions · 1 y ago

    Computer Programming Mocktest (Pre-finals) BSIT 205

    Computer Programming Mocktest (Pre-finals) BSIT 205

    33 questions • 1 y ago
    Xai Alexandrei Delos Reyes

    System Administration (Pre-finals) BSIT 205

    System Administration (Pre-finals) BSIT 205

    Xai Alexandrei Delos Reyes · 52 questions · 1 y ago

    System Administration (Pre-finals) BSIT 205

    System Administration (Pre-finals) BSIT 205

    52 questions • 1 y ago
    Xai Alexandrei Delos Reyes

    Art Appreciation Finals BSIT 205

    Art Appreciation Finals BSIT 205

    Xai Alexandrei Delos Reyes · 35 questions · 1 y ago

    Art Appreciation Finals BSIT 205

    Art Appreciation Finals BSIT 205

    35 questions • 1 y ago
    Xai Alexandrei Delos Reyes

    Data Structures and Algorithms (Mocktest) BSIT 307

    Data Structures and Algorithms (Mocktest) BSIT 307

    Xai Alexandrei Delos Reyes · 52 questions · 1 y ago

    Data Structures and Algorithms (Mocktest) BSIT 307

    Data Structures and Algorithms (Mocktest) BSIT 307

    52 questions • 1 y ago
    Xai Alexandrei Delos Reyes

    Object Oriented Programming Mock Test (Mocktest) BSIT 307

    Object Oriented Programming Mock Test (Mocktest) BSIT 307

    Xai Alexandrei Delos Reyes · 23 questions · 1 y ago

    Object Oriented Programming Mock Test (Mocktest) BSIT 307

    Object Oriented Programming Mock Test (Mocktest) BSIT 307

    23 questions • 1 y ago
    Xai Alexandrei Delos Reyes

    Human Computer Interactions Mocktest (Prelims) BSIT 307

    Human Computer Interactions Mocktest (Prelims) BSIT 307

    Xai Alexandrei Delos Reyes · 58 questions · 1 y ago

    Human Computer Interactions Mocktest (Prelims) BSIT 307

    Human Computer Interactions Mocktest (Prelims) BSIT 307

    58 questions • 1 y ago
    Xai Alexandrei Delos Reyes

    Principles of Communication Mocktest (Prelims) BSIT 307

    Principles of Communication Mocktest (Prelims) BSIT 307

    Xai Alexandrei Delos Reyes · 37 questions · 1 y ago

    Principles of Communication Mocktest (Prelims) BSIT 307

    Principles of Communication Mocktest (Prelims) BSIT 307

    37 questions • 1 y ago
    Xai Alexandrei Delos Reyes

    Principles of Communication Mocktest (Midterms) BSIT 307

    Principles of Communication Mocktest (Midterms) BSIT 307

    Xai Alexandrei Delos Reyes · 29 questions · 1 y ago

    Principles of Communication Mocktest (Midterms) BSIT 307

    Principles of Communication Mocktest (Midterms) BSIT 307

    29 questions • 1 y ago
    Xai Alexandrei Delos Reyes

    Data Structures and Algorithms Mocktest (Midterm) BSIT 307

    Data Structures and Algorithms Mocktest (Midterm) BSIT 307

    Xai Alexandrei Delos Reyes · 50 questions · 1 y ago

    Data Structures and Algorithms Mocktest (Midterm) BSIT 307

    Data Structures and Algorithms Mocktest (Midterm) BSIT 307

    50 questions • 1 y ago
    Xai Alexandrei Delos Reyes

    Object Oriented Programming Mock Test (Midterm) BSIT 307

    Object Oriented Programming Mock Test (Midterm) BSIT 307

    Xai Alexandrei Delos Reyes · 13 questions · 1 y ago

    Object Oriented Programming Mock Test (Midterm) BSIT 307

    Object Oriented Programming Mock Test (Midterm) BSIT 307

    13 questions • 1 y ago
    Xai Alexandrei Delos Reyes

    Human Computer Interactions Mocktest (Midterms) BSIT 307

    Human Computer Interactions Mocktest (Midterms) BSIT 307

    Xai Alexandrei Delos Reyes · 35 questions · 1 y ago

    Human Computer Interactions Mocktest (Midterms) BSIT 307

    Human Computer Interactions Mocktest (Midterms) BSIT 307

    35 questions • 1 y ago
    Xai Alexandrei Delos Reyes

    Readings In Philippine History (Midterms) Mocktest

    Readings In Philippine History (Midterms) Mocktest

    Xai Alexandrei Delos Reyes · 16 questions · 1 y ago

    Readings In Philippine History (Midterms) Mocktest

    Readings In Philippine History (Midterms) Mocktest

    16 questions • 1 y ago
    Xai Alexandrei Delos Reyes

    Discrete Structures and Algorithms (Midterms) Mocktest

    Discrete Structures and Algorithms (Midterms) Mocktest

    Xai Alexandrei Delos Reyes · 10 questions · 1 y ago

    Discrete Structures and Algorithms (Midterms) Mocktest

    Discrete Structures and Algorithms (Midterms) Mocktest

    10 questions • 1 y ago
    Xai Alexandrei Delos Reyes

    Principles of Communication (Midterm) Mocktest

    Principles of Communication (Midterm) Mocktest

    Xai Alexandrei Delos Reyes · 29 questions · 1 y ago

    Principles of Communication (Midterm) Mocktest

    Principles of Communication (Midterm) Mocktest

    29 questions • 1 y ago
    Xai Alexandrei Delos Reyes

    TECHNOPRENEURSHIP PRELIMS BSIT 402

    TECHNOPRENEURSHIP PRELIMS BSIT 402

    Xai Alexandrei Delos Reyes · 74 questions · 1 y ago

    TECHNOPRENEURSHIP PRELIMS BSIT 402

    TECHNOPRENEURSHIP PRELIMS BSIT 402

    74 questions • 1 y ago
    Xai Alexandrei Delos Reyes

    (Prelim) PH Popular Culture Mocktest BSIT 402

    (Prelim) PH Popular Culture Mocktest BSIT 402

    Xai Alexandrei Delos Reyes · 19 questions · 1 y ago

    (Prelim) PH Popular Culture Mocktest BSIT 402

    (Prelim) PH Popular Culture Mocktest BSIT 402

    19 questions • 1 y ago
    Xai Alexandrei Delos Reyes

    (Prelim) Integrative Programming BSIT 402

    (Prelim) Integrative Programming BSIT 402

    Xai Alexandrei Delos Reyes · 46 questions · 1 y ago

    (Prelim) Integrative Programming BSIT 402

    (Prelim) Integrative Programming BSIT 402

    46 questions • 1 y ago
    Xai Alexandrei Delos Reyes

    (Prelim) Quantitive Methods Mocktest BSIT 402

    (Prelim) Quantitive Methods Mocktest BSIT 402

    Xai Alexandrei Delos Reyes · 39 questions · 1 y ago

    (Prelim) Quantitive Methods Mocktest BSIT 402

    (Prelim) Quantitive Methods Mocktest BSIT 402

    39 questions • 1 y ago
    Xai Alexandrei Delos Reyes

    (Prelim) System Integration and Architecture BSIT 402

    (Prelim) System Integration and Architecture BSIT 402

    Xai Alexandrei Delos Reyes · 29 questions · 1 y ago

    (Prelim) System Integration and Architecture BSIT 402

    (Prelim) System Integration and Architecture BSIT 402

    29 questions • 1 y ago
    Xai Alexandrei Delos Reyes

    (Prelim) Network Technology Mocktest BSIT 402

    (Prelim) Network Technology Mocktest BSIT 402

    Xai Alexandrei Delos Reyes · 68 questions · 1 y ago

    (Prelim) Network Technology Mocktest BSIT 402

    (Prelim) Network Technology Mocktest BSIT 402

    68 questions • 1 y ago
    Xai Alexandrei Delos Reyes

    (Prelim) Information Management Mocktest BSIT 402

    (Prelim) Information Management Mocktest BSIT 402

    Xai Alexandrei Delos Reyes · 45 questions · 1 y ago

    (Prelim) Information Management Mocktest BSIT 402

    (Prelim) Information Management Mocktest BSIT 402

    45 questions • 1 y ago
    Xai Alexandrei Delos Reyes

    (Pre-Finals) Quantitative Research Mocktest BSIT 402

    (Pre-Finals) Quantitative Research Mocktest BSIT 402

    Xai Alexandrei Delos Reyes · 28 questions · 10 mo ago

    (Pre-Finals) Quantitative Research Mocktest BSIT 402

    (Pre-Finals) Quantitative Research Mocktest BSIT 402

    28 questions • 10 mo ago
    Xai Alexandrei Delos Reyes

    (Finals) Information Management Mocktest

    (Finals) Information Management Mocktest

    Xai Alexandrei Delos Reyes · 64 questions · 9 mo ago

    (Finals) Information Management Mocktest

    (Finals) Information Management Mocktest

    64 questions • 9 mo ago
    Xai Alexandrei Delos Reyes

    (Finals) Philippine Popular Culture Mocktest

    (Finals) Philippine Popular Culture Mocktest

    Xai Alexandrei Delos Reyes · 46 questions · 9 mo ago

    (Finals) Philippine Popular Culture Mocktest

    (Finals) Philippine Popular Culture Mocktest

    46 questions • 9 mo ago
    Xai Alexandrei Delos Reyes

    (Finals) Integrative Programming Mocktest BSIT 402

    (Finals) Integrative Programming Mocktest BSIT 402

    Xai Alexandrei Delos Reyes · 24 questions · 9 mo ago

    (Finals) Integrative Programming Mocktest BSIT 402

    (Finals) Integrative Programming Mocktest BSIT 402

    24 questions • 9 mo ago
    Xai Alexandrei Delos Reyes

    (Finals) Network Technology Mocktest BSIT 402

    (Finals) Network Technology Mocktest BSIT 402

    Xai Alexandrei Delos Reyes · 37 questions · 9 mo ago

    (Finals) Network Technology Mocktest BSIT 402

    (Finals) Network Technology Mocktest BSIT 402

    37 questions • 9 mo ago
    Xai Alexandrei Delos Reyes

    (Finals) Quantitative Methods Mocktest BSIT 402

    (Finals) Quantitative Methods Mocktest BSIT 402

    Xai Alexandrei Delos Reyes · 18 questions · 9 mo ago

    (Finals) Quantitative Methods Mocktest BSIT 402

    (Finals) Quantitative Methods Mocktest BSIT 402

    18 questions • 9 mo ago
    Xai Alexandrei Delos Reyes

    Application Development Mocktest (Prelim) BSIT 505

    Application Development Mocktest (Prelim) BSIT 505

    Xai Alexandrei Delos Reyes · 72 questions · 6 mo ago

    Application Development Mocktest (Prelim) BSIT 505

    Application Development Mocktest (Prelim) BSIT 505

    72 questions • 6 mo ago
    Xai Alexandrei Delos Reyes

    Data and Digital Communication Mocktest (Prelim) BSIT 505

    Data and Digital Communication Mocktest (Prelim) BSIT 505

    Xai Alexandrei Delos Reyes · 60 questions · 6 mo ago

    Data and Digital Communication Mocktest (Prelim) BSIT 505

    Data and Digital Communication Mocktest (Prelim) BSIT 505

    60 questions • 6 mo ago
    Xai Alexandrei Delos Reyes

    (Handout 1 Only!) Advanced Systems Integration and Architecture Mocktest (Prelim) BSIT 505

    (Handout 1 Only!) Advanced Systems Integration and Architecture Mocktest (Prelim) BSIT 505

    Xai Alexandrei Delos Reyes · 38 questions · 6 mo ago

    (Handout 1 Only!) Advanced Systems Integration and Architecture Mocktest (Prelim) BSIT 505

    (Handout 1 Only!) Advanced Systems Integration and Architecture Mocktest (Prelim) BSIT 505

    38 questions • 6 mo ago
    Xai Alexandrei Delos Reyes

    Enterprise Architecture Mocktest (Prelims) BSIT 505

    Enterprise Architecture Mocktest (Prelims) BSIT 505

    Xai Alexandrei Delos Reyes · 42 questions · 6 mo ago

    Enterprise Architecture Mocktest (Prelims) BSIT 505

    Enterprise Architecture Mocktest (Prelims) BSIT 505

    42 questions • 6 mo ago
    Xai Alexandrei Delos Reyes

    Professional Issues in Information Technology Mocktest (Prelims) BSIT 505

    Professional Issues in Information Technology Mocktest (Prelims) BSIT 505

    Xai Alexandrei Delos Reyes · 44 questions · 6 mo ago

    Professional Issues in Information Technology Mocktest (Prelims) BSIT 505

    Professional Issues in Information Technology Mocktest (Prelims) BSIT 505

    44 questions • 6 mo ago
    Xai Alexandrei Delos Reyes

    Application Development Mocktest (Midterm) BSIT 505

    Application Development Mocktest (Midterm) BSIT 505

    Xai Alexandrei Delos Reyes · 42 questions · 6 mo ago

    Application Development Mocktest (Midterm) BSIT 505

    Application Development Mocktest (Midterm) BSIT 505

    42 questions • 6 mo ago
    Xai Alexandrei Delos Reyes

    Event-Driven Programming Mocktest (Midterm) BSIT - 505

    Event-Driven Programming Mocktest (Midterm) BSIT - 505

    Xai Alexandrei Delos Reyes · 61 questions · 5 mo ago

    Event-Driven Programming Mocktest (Midterm) BSIT - 505

    Event-Driven Programming Mocktest (Midterm) BSIT - 505

    61 questions • 5 mo ago
    Xai Alexandrei Delos Reyes

    Data and Digital Communication Mocktest (Midterm) BSIT - 505

    Data and Digital Communication Mocktest (Midterm) BSIT - 505

    Xai Alexandrei Delos Reyes · 80 questions · 5 mo ago

    Data and Digital Communication Mocktest (Midterm) BSIT - 505

    Data and Digital Communication Mocktest (Midterm) BSIT - 505

    80 questions • 5 mo ago
    Xai Alexandrei Delos Reyes

    (Midterm) Advanced Systems and Integration Architecture BSIT - 505

    (Midterm) Advanced Systems and Integration Architecture BSIT - 505

    Xai Alexandrei Delos Reyes · 68 questions · 5 mo ago

    (Midterm) Advanced Systems and Integration Architecture BSIT - 505

    (Midterm) Advanced Systems and Integration Architecture BSIT - 505

    68 questions • 5 mo ago
    Xai Alexandrei Delos Reyes

    (Midterm) Advanced Database Systems Mocktest BSIT - 505

    (Midterm) Advanced Database Systems Mocktest BSIT - 505

    Xai Alexandrei Delos Reyes · 82 questions · 5 mo ago

    (Midterm) Advanced Database Systems Mocktest BSIT - 505

    (Midterm) Advanced Database Systems Mocktest BSIT - 505

    82 questions • 5 mo ago
    Xai Alexandrei Delos Reyes

    (Midterms) Enterprise Architecture Mocktest BSIT 505

    (Midterms) Enterprise Architecture Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 69 questions · 5 mo ago

    (Midterms) Enterprise Architecture Mocktest BSIT 505

    (Midterms) Enterprise Architecture Mocktest BSIT 505

    69 questions • 5 mo ago
    Xai Alexandrei Delos Reyes

    (Midterm) Professional Issues in Information Technology BSIT 505

    (Midterm) Professional Issues in Information Technology BSIT 505

    Xai Alexandrei Delos Reyes · 38 questions · 5 mo ago

    (Midterm) Professional Issues in Information Technology BSIT 505

    (Midterm) Professional Issues in Information Technology BSIT 505

    38 questions • 5 mo ago
    Xai Alexandrei Delos Reyes

    (Pre-Finals)Event-Driven Programming Mocktest BSIT 505

    (Pre-Finals)Event-Driven Programming Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 59 questions · 4 mo ago

    (Pre-Finals)Event-Driven Programming Mocktest BSIT 505

    (Pre-Finals)Event-Driven Programming Mocktest BSIT 505

    59 questions • 4 mo ago
    Xai Alexandrei Delos Reyes

    (Pre-finals) Application Development Mocktest BSIT 505

    (Pre-finals) Application Development Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 41 questions · 4 mo ago

    (Pre-finals) Application Development Mocktest BSIT 505

    (Pre-finals) Application Development Mocktest BSIT 505

    41 questions • 4 mo ago
    Xai Alexandrei Delos Reyes

    (Pre-Finals) Data and Digital Communication Mocktest BSIT 505

    (Pre-Finals) Data and Digital Communication Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 57 questions · 4 mo ago

    (Pre-Finals) Data and Digital Communication Mocktest BSIT 505

    (Pre-Finals) Data and Digital Communication Mocktest BSIT 505

    57 questions • 4 mo ago
    Xai Alexandrei Delos Reyes

    (Pre-Finals) ASIA Mocktest BSIT 505

    (Pre-Finals) ASIA Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 44 questions · 4 mo ago

    (Pre-Finals) ASIA Mocktest BSIT 505

    (Pre-Finals) ASIA Mocktest BSIT 505

    44 questions • 4 mo ago
    Xai Alexandrei Delos Reyes

    (Pre-Finals) Advanced Database Systems Mocktest BSIT 505

    (Pre-Finals) Advanced Database Systems Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 72 questions · 4 mo ago

    (Pre-Finals) Advanced Database Systems Mocktest BSIT 505

    (Pre-Finals) Advanced Database Systems Mocktest BSIT 505

    72 questions • 4 mo ago
    Xai Alexandrei Delos Reyes

    (Pre-Finals) Enterprise Architecture Mocktest BSIT 505

    (Pre-Finals) Enterprise Architecture Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 42 questions · 4 mo ago

    (Pre-Finals) Enterprise Architecture Mocktest BSIT 505

    (Pre-Finals) Enterprise Architecture Mocktest BSIT 505

    42 questions • 4 mo ago
    Xai Alexandrei Delos Reyes

    (Pre-Finals) Professional Issues In Information Technolog Mocktest BSIT 505

    (Pre-Finals) Professional Issues In Information Technolog Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 62 questions · 4 mo ago

    (Pre-Finals) Professional Issues In Information Technolog Mocktest BSIT 505

    (Pre-Finals) Professional Issues In Information Technolog Mocktest BSIT 505

    62 questions • 4 mo ago
    Xai Alexandrei Delos Reyes

    (Finals) Application Development Mocktest BSIT 505

    (Finals) Application Development Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 62 questions · 3 mo ago

    (Finals) Application Development Mocktest BSIT 505

    (Finals) Application Development Mocktest BSIT 505

    62 questions • 3 mo ago
    Xai Alexandrei Delos Reyes

    (Finals) Data and Digital Communication Mocktest BSIT - 505

    (Finals) Data and Digital Communication Mocktest BSIT - 505

    Xai Alexandrei Delos Reyes · 61 questions · 3 mo ago

    (Finals) Data and Digital Communication Mocktest BSIT - 505

    (Finals) Data and Digital Communication Mocktest BSIT - 505

    61 questions • 3 mo ago
    Xai Alexandrei Delos Reyes

    (Finals) Advanced Database Systems Mocktest BSIT 505

    (Finals) Advanced Database Systems Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 62 questions · 3 mo ago

    (Finals) Advanced Database Systems Mocktest BSIT 505

    (Finals) Advanced Database Systems Mocktest BSIT 505

    62 questions • 3 mo ago
    Xai Alexandrei Delos Reyes

    (Finals) Enterprise Architecture Mocktest BSIT 505

    (Finals) Enterprise Architecture Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 60 questions · 3 mo ago

    (Finals) Enterprise Architecture Mocktest BSIT 505

    (Finals) Enterprise Architecture Mocktest BSIT 505

    60 questions • 3 mo ago
    Xai Alexandrei Delos Reyes

    (Finals) Professional issues in Information Technology Mocktest BSIT 505

    (Finals) Professional issues in Information Technology Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 27 questions · 3 mo ago

    (Finals) Professional issues in Information Technology Mocktest BSIT 505

    (Finals) Professional issues in Information Technology Mocktest BSIT 505

    27 questions • 3 mo ago
    Xai Alexandrei Delos Reyes

    (Finals) Event-Driven Programming Mocktest BSIT 505

    (Finals) Event-Driven Programming Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 65 questions · 3 mo ago

    (Finals) Event-Driven Programming Mocktest BSIT 505

    (Finals) Event-Driven Programming Mocktest BSIT 505

    65 questions • 3 mo ago
    Xai Alexandrei Delos Reyes

    (Prelims) Mobile Systems and Technologies Mocktest BSIT 604

    (Prelims) Mobile Systems and Technologies Mocktest BSIT 604

    Xai Alexandrei Delos Reyes · 41 views · 42 questions · 1 mo ago

    (Prelims) Mobile Systems and Technologies Mocktest BSIT 604

    (Prelims) Mobile Systems and Technologies Mocktest BSIT 604

    41 views • 42 questions • 1 mo ago
    Xai Alexandrei Delos Reyes

    (Prelims) Great Books Mocktest BSIT 604

    (Prelims) Great Books Mocktest BSIT 604

    Xai Alexandrei Delos Reyes · 46 views · 75 questions · 1 mo ago

    (Prelims) Great Books Mocktest BSIT 604

    (Prelims) Great Books Mocktest BSIT 604

    46 views • 75 questions • 1 mo ago
    Xai Alexandrei Delos Reyes

    (Prelims) Management Information Systems Mocktest BSIT - 604

    (Prelims) Management Information Systems Mocktest BSIT - 604

    Xai Alexandrei Delos Reyes · 70 views · 94 questions · 26 d ago

    (Prelims) Management Information Systems Mocktest BSIT - 604

    (Prelims) Management Information Systems Mocktest BSIT - 604

    70 views • 94 questions • 26 d ago
    Xai Alexandrei Delos Reyes

    (Prelims) Programming Languages Mocktest BSIT 604

    (Prelims) Programming Languages Mocktest BSIT 604

    Xai Alexandrei Delos Reyes · 26 views · 79 questions · 25 d ago

    (Prelims) Programming Languages Mocktest BSIT 604

    (Prelims) Programming Languages Mocktest BSIT 604

    26 views • 79 questions • 25 d ago
    Xai Alexandrei Delos Reyes

    (Prelims) Web Systems and Technologies Mocktest BSIT 604

    (Prelims) Web Systems and Technologies Mocktest BSIT 604

    Xai Alexandrei Delos Reyes · 33 views · 99 questions · 22 d ago

    (Prelims) Web Systems and Technologies Mocktest BSIT 604

    (Prelims) Web Systems and Technologies Mocktest BSIT 604

    33 views • 99 questions • 22 d ago
    Xai Alexandrei Delos Reyes

    (Midterms) Mobile Systems and Technologies Mocktest BSIT 604

    (Midterms) Mobile Systems and Technologies Mocktest BSIT 604

    Xai Alexandrei Delos Reyes · 16 questions · 9 d ago

    (Midterms) Mobile Systems and Technologies Mocktest BSIT 604

    (Midterms) Mobile Systems and Technologies Mocktest BSIT 604

    16 questions • 9 d ago
    Xai Alexandrei Delos Reyes

    (Midterm) Great Books Mocktest BSIT 604

    (Midterm) Great Books Mocktest BSIT 604

    Xai Alexandrei Delos Reyes · 74 questions · 3 d ago

    (Midterm) Great Books Mocktest BSIT 604

    (Midterm) Great Books Mocktest BSIT 604

    74 questions • 3 d ago
    Xai Alexandrei Delos Reyes

    Question list

  • 1

    It is the state of the well-being of information and infrastructure in which the possibility of theft, tampering, or disruption of information and services is kept low or tolerable. It is the protection or safeguarding of information systems that use, store, and transmit information from unauthorized access, disclosure, alteration, and destruction.

    Information security

  • 2

    It is a specification of how objects in a security domain are allowed to interact.

    Security policy

  • 3

    "It is the assurance that the information is accessible only to authorized people." What Element of Information Security is being described?

    Confidentiality

  • 4

    "It is the trustworthiness of data or resources in the prevention of improper and unauthorized changes" What Element of Information Security is being described?

    Integrity

  • 5

    "The characteristic of communication, documents, or any data that ensures the quality of being genuine or uncorrupted. The major role of authentication is to confirm that a user is authentic." What Element of Information Security is being described?

    Authenticity

  • 6

    "A guarantee that the sender of a message cannot later deny having sent the message and that the recipient cannot deny having received the message" What Element of Information Security is being described?

    Non-repudiation

  • 7

    What are the three (3) components that define the security of any System?

    Functionality, Usability, Security

  • 8

    It originates from the notion that a target system stores or processes something valuable, which leads to the threat of an attack on the system

    Motive

  • 9

    This is when the reason to attack may be to disrupt the target’s organization’s business operations, to steal valuable information for the sake of curiosity, or even to enact revenge

    Goal

  • 10

    "The intercepting and monitoring of network traffic and data flow on the target network and not tampering with the data." What type of attack is being described?

    Passive Attacks

  • 11

    Also called the initial phase where attackers gather information about a target system, network, or organization, on network activities using sniffers (tools to intercept and analyze data network traffic)

    Reconnaissance

  • 12

    Which is NOT an example of Passive Attacks?

    Denial-of-Service (DoS) attack

  • 13

    "The tampering of the data in transit or disrupting communication or services between the systems to bypass or break into secured systems." What type of attack is being described?

    Active Attacks

  • 14

    Which is NOT an example of Active Attacks?

    Social engineering

  • 15

    "These are performed when the attacker is in close physical proximity to the target system or network. The main goal of performing this type of attack is to gather or modify information or disrupt its access." What type of attack is being described?

    Close-in Attacks

  • 16

    Which is the BEST EXAMPLE of Close-in Attacks?

    Social engineering

  • 17

    "These are performed by trusted persons who have physical access to the critical assets of the target" What type of attack is being described?

    Insider Attacks

  • 18

    Which is NOT an example of Insider Attack?

    Denial-of-Service (DoS) attack

  • 19

    "Occur when attackers tamper with hardware or software before installation. They tamper with the hardware or software at its source or when it is in transit." What type of attack is being described?

    Distribution Attacks

  • 20

    Which is the BEST EXAMPLE of a Distribution Attack?

    Backdoors

  • 21

    "Clients can store sensitive information in the cloud. A flaw in one client’s application cloud could potentially allow attackers to access another client’s data." Which attack access method is being described?

    Cloud computing threats

  • 22

    It refers to the on-demand delivery of IT capabilities in which IT infrastructure and applications are provided to subscribers as a metered service over a network

    Cloud computing

  • 23

    "An attack that focuses on stealing information from the victim machine without its user being aware of it. These attacks are generally targeted at large companies and government networks." Which attack access method is being described?

    Advanced Persistent Threats (APT)

  • 24

    "These are the most prevalent networking threats and are capable of infecting a network within seconds" Which attack access method is being described?

    Viruses and Worms

  • 25

    "It is a self-replicating program that produces a copy of itself by attaching to another computer program, boot sector, or document." Which attack access method is being described?

    Virus

  • 26

    "It is a malicious program that replicates, executes, and spreads across network connections." Which attack access method is being described?

    Worm

  • 27

    "A malware that restricts access to the computer system’s files and folders and demands an online ransom payment to the malware creator(s) in order to remove the restrictions. It is generally spread via malicious attachments to email messages, infected software applications, infected disks, or compromised websites." Which attack access method is being described?

    Ransomware

  • 28

    "Users may download malware-infested applications (APKs) onto their smartphones, which can damage other applications and data or reveal sensitive information to attackers." Which attack access method is being described?

    Mobile Threats

  • 29

    "A huge network of compromised systems used by attackers to perform Denial-of-Service attacks. Bots perform tasks such as uploading viruses, sending emails with botnets attached to them, stealing data, and so on." Which attack access method is being described?

    Botnet

  • 30

    "The practice of sending an illegitimate email falsely claiming to be from a legitimate site in an attempt to acquire a user’s personal or account information. This is done by distributing malicious links via some communication channel or email to obtain private information such as account numbers, credit card numbers, and mobile numbers from the victim." Which attack access method is being described?

    Phishing

  • 31

    "Attacks such as SQL injection and cross-site scripting have made these applications a favorable target for attackers to steal credentials, set up phishing sites, or acquire private information.." Which attack access method is being described?

    Web Application Threats

  • 32

    "Due to hardware constraints such as memory and battery, these applications do not include complex security mechanisms to protect the devices from attacks." Which attack access method is being described?

    Internet of Things (IoT) Threats

  • 33

    These are a system of rules and guidelines that are enforced by a particular country or community to govern behavior.

    Laws

  • 34

    This is a document established by consensus and approved by a recognized body that provides, for common and repeated use, rules, guidelines, or characteristics for activities or their results, aimed at the achievement of the optimum degree of order in a given context.

    Standard

  • 35

    This is a proprietary information security standard for organizations that handle cardholder information for the major debit, credit, prepaid, e-purse, ATM, and POS cards.

    Payment Card Industry Data Security Standard (PCI DSS)

  • 36

    This specifies the requirements for establishing, implementing, maintaining, and continually improving an information security management system within the context of an organization. It includes requirements for the assessment and treatment of information security risks tailored to the needs of the organization.

    ISO/IEC 27001:2013

  • 37

    Its Privacy Rule provides federal protections for the individually identifiable health information held by covered entities and their business associates and gives patients an array of rights to that information. At the same time, the Privacy Rule permits the disclosure of health information needed for patient care and other necessary purposes.

    Health Insurance Portability and Accountability Act (HIPAA)

  • 38

    In HIPAA, This specifies a series of administrative, physical, and technical safeguards for covered entities and their business associates to use to ensure confidentiality, integrity, and availability of electronically protected health information.

    Security Rule

  • 39

    Enacted in 2002, this act aims to protect the public and investors by increasing the accuracy and reliability of corporate disclosures. This act does not explain how an organization must store records but describes the records that organizations must store and the duration of their storage.

    Sarbanes-Oxley (SOX) Act

  • 40

    An American copyright law that implements two (2) 1996 treaties from the World Intellectual Property Organization (WIPO): the WIPO Copyright Treaty and the WIPO Performances and Phonograms Treaty.

    The Digital Millennium Copyright Act (DMCA)

  • 41

    It was enacted to produce several key security standards and guidelines required by Congressional legislation. This provides a comprehensive framework for ensuring the effectiveness of information security controls over information resources that support federal operations and assets.

    The Federal Information Security Management Act (FISMA):

  • 42

    It is one of the most stringent privacy and security laws globally. Though it was drafted and passed by the European Union (EU), it imposes obligations on organizations anywhere, so long as they target or collect data related to people in the EU

    General Data Protection Regulation

  • 43

    This sets out the framework for data protection law in the UK. It updates and replaces the Data Protection Act 1998 and came into effect on 25 May 2018. This is an act to make provision for the regulation of the processing of information relating to individuals; to make provision in connection with the Information Commissioner’s functions under specific rules relating to information; to make provision for a direct marketing code of practice and connected purposes

    Data Protection Act 2018 (DPA)

  • 44

    It refers to any laws that deal with protecting the Internet and other online communication technologies. This covers topics such as Internet access and usage, privacy, freedom of expression, and jurisdiction.

    Cyberlaw or Internet law

  • 45

    It is an efficient and effective way of illustrating how an adversary can attack the target organization.

    Cyber Kill Chain

  • 46

    "The adversary has to collect as much information about the target as possible to probe for weak points before actually attacking" What Cyber Kill Chain Phase is being described?

    Reconnaissance

  • 47

    "The adversary analyzes the data collected in the previous stage to identify the vulnerabilities and techniques that can be exploited and gain unauthorized access to the target organization " What Cyber Kill Chain Phase is being described?

    Weaponization

  • 48

    "The previous stage included creating a weapon. Its payload is transmitted to the intended victim(s) as an e-mail attachment, via a malicious link on websites, or through a vulnerable web application or USB drive" What Cyber Kill Chain Phase is being described?

    Delivery

  • 49

    "After the weapon is transmitted to the intended victim, exploitation triggers the adversary’s malicious code to exploit a vulnerability in the operating system, application, or server on a target system." What Cyber Kill Chain Phase is being described?

    Exploitation

  • 50

    "The adversary downloads and installs more malicious software on the target system to maintain access to the target network for an extended period. They may use the weapon to install a backdoor to gain remote access" What Cyber Kill Chain Phase is being described?

    Installation

  • 51

    "The adversary establishes a two-way communication between the victim’s system and the adversary-controlled server to communicate and pass data back and forth." What Cyber Kill Chain Phase is being described?

    Command and Control

  • 52

    "The adversary controls the victim’s system from a remote location and finally accomplishes their intended goals." What Cyber Kill Chain Phase is being described?

    Actions on Objectives

  • 53

    Which best describes “tactics, techniques, and procedures” ?

    It refer to the patterns of activities and methods associated with specific threat actors or groups of threat actors.

  • 54

    It is defined as a guideline that describes the way an attacker performs their attack from beginning to end.

    Tactics

  • 55

    It is defined as the technical methods used by an attacker to achieve intermediate results during their attack

    Techniques

  • 56

    It is defined as the organizational approach followed by the threat actors to launch their attack.

    Procedures

  • 57

    "usually prefer these services to send malicious data to the target organization or individual. Such socially engineered and are preferred due to their ease of use and comparative anonymity. Examples of this include the sender’s e-mail address, e-mail subject, and attachments or links." What Indicators of Compromise is being described?

    E-mail Indicators

  • 58

    "Useful for command and control, malware delivery, and identifying details about the operating system, browser type, and other computer-specific information." What Indicators of Compromise is being described?

    Network Indicators

  • 59

    "Found by performing an analysis of the infected system within the organizational network. Examples of this include filenames, file hashes, registry keys, DLLs, and mutex." What Indicators of Compromise is being described?

    Host-Based Indicators

  • 60

    "Are used to identify specific behavior related to malicious activities, such as code injection into the memory or running the scripts of an application." What Indicators of Compromise is being described?

    Behavioral Indicators

  • 61

    It refers to exploiting system vulnerabilities and compromising security controls to gain unauthorized or inappropriate access to system resources.

    Hacking

  • 62

    A person who breaks into a system or network without authorization to destroy, steal sensitive data, or perform malicious attacks.

    Hacker

  • 63

    Individuals who use their extraordinary computing skills for illegal or malicious purposes. This category of hacker is often involved in criminal activities. They are also known as crackers.

    Black Hats

  • 64

    These are individuals who use their hacking skills for defensive purposes.

    White Hats, or penetration testers

  • 65

    Individuals who work both offensively and defensively at various times

    Gray Hats

  • 66

    Individuals who aim to bring down critical infrastructure for a “cause” and are not worried about facing jail terms or any other kind of punishment.

    Suicide Hackers

  • 67

    Unskilled hackers who compromise systems by running scripts, tools, and software developed by real hackers.

    Script Kiddies

  • 68

    Individuals with a wide range of skills who are motivated by religious or political beliefs to create the fear of large-scale disruption of computer networks.

    Cyber Terrorists

  • 69

    Skilled individuals having expertise in hacking and are employed by the government to penetrate, gain top-secret information from, and damage the information systems of other government or military organizations.

    State-Sponsored Hackers

  • 70

    They use hacking to increase awareness of their social or political agendas, as well as to boost their reputations in both online and offline arenas. They promote a political agenda, especially by using hacking to deface or disable websites.

    Hacktivist

  • 71

    It is a form of activism in which hackers break into government or corporate computer systems as an act of protest.

    Hacktivism

  • 72

    A consortium of skilled hackers having their own resources and funding

    Hacker Teams

  • 73

    Individuals who perform corporate espionage by illegally spying on competitor organizations. They focus on stealing critical information such as blueprints, formulas, product designs, and trade secrets

    Industrial Spies

  • 74

    Any employee (trusted person) who has access to critical assets of an organization.

    Insiders

  • 75

    Groups of individuals or communities that are involved in organized, planned, and prolonged criminal activities

    Criminal Syndicates

  • 76

    A group of hackers working together in criminal activities

    Organized Hackers

  • 77

    It is the preparatory phase in which an attacker gathers as much information as possible about the target prior to launching the attack. In this phase, the attacker draws on competitive intelligence to learn more about the target. What Hacking Phase is being described?

    Reconnaissance

  • 78

    When an attacker is using these techniques, they do not interact with the target directly. Instead, the attacker relies on publicly available information, news releases, or other non-contact methods.

    Passive Reconnaissance

  • 79

    When an attacker is using these on the other hand, involve direct interactions with the target system by using tools to detect open ports, accessible hosts, router locations, network mapping, details of operating systems, and applications.

    Active Reconnaissance

  • 80

    This is the phase immediately preceding the attack. Here, the attacker uses the details gathered during reconnaissance to scan the network for specific information. What Hacking Phase is being described?

    Scanning

  • 81

    This detect listening ports to find information about the nature of services running on the target machine

    Port scanners

  • 82

    This is the phase in which real hacking occurs. Attackers use vulnerabilities identified during the reconnaissance and scanning phases to gain access to the target system and network. What Hacking Phase is being described?

    Gaining Access

  • 83

    Using a technique called _____ to exploit the system by pretending to be a legitimate user or a different system, attackers can send a data packet containing a bug to the target system to exploit a vulnerability.

    Spoofing

  • 84

    This attack attempt to cause users on a network to flood each other with data, making it appear as if everyone is attacking each other, and leaving the hacker anonymous.

    Smurf attacks

  • 85

    is the phase when the attacker tries to retain their ownership of the system. What Hacking Phase is being described?

    Maintaining Access

  • 86

    Attackers who choose to remain undetected remove evidence of their entry and install a ______ to gain repeat access.

    Backdoor or a Trojan

  • 87

    This refers to the activities carried out by an attacker to hide malicious acts What Hacking Phase is being described?

    Clearing Tracks

  • 88

    This is the process of hiding data in other data, for instance, in image and sound files.

    Steganography

  • 89

    The practice of employing computer and network skills to assist organizations in testing their network security for possible loopholes and vulnerabilities

    Ethical Hacking

  • 90

    This team works together to perform a full-scale test covering all aspects of the network, as well as physical and system intrusion.

    Tiger Team

  • 91

    It is the use of advanced Google search operators for creating complex search queries to extract sensitive or hidden information.

    Google hacking

  • 92

    It is the art of creating complex search engine queries. Queries can retrieve valuable data about a target company from Google search results.

    Advanced Google hacking