問題一覧
1
is the process of presenting and drawing web traffic to social media channels;also known as digital marketing and e- marketing.
social media marketing
2
leverages human psychology to manipulate individuals into divulging sensitive information or performing actions that compromise security. It often involves impersonation, manipulation, or exploiting trust to gain unauthorized access.
social engineering
3
PHISHING ATTACKS
BANKING & FINANCIAL SCAMS ONLINE SHOPPING SCAMS JOB OFFER SCAMS SOCIAL MEDIA ACCOUNT COMPROMISES GOVERNMENT AGENCY SCAMS
4
Content Marketing through Social Media can be highly beneficial to you when done right.Select the correct answer:(5)
It improves brand awareness, Higher conversion rates, Improved search engine rankings, Cost-effective, Increased top-funnel traffic
5
intentionally steal confidential information such as customer records, intellectual property, with the intention of selling or using it for personal gain or to benefit a competitor
DATA THEFT
6
Top 5 Digital Marketing Strategies.Select the correct answer.
search engine marketing , social media marketing , narrative content marketing , video marketing, E-mail marketing
7
serves as the foundation of your online presence;It acts as a central hub to showcase your brand, products, and provide valuable information
Website
8
leave physical or digital in public spaces like flash drive, CD or download links.
baiting
9
encrypts files or locks down computer systems, rendering them inaccessible to users until a ransom is paid
ransomware
10
offering lucrative job opportunities with well-known companies or abroad. Requesting passport details, bank account for employment verification.
job offers scam
11
access credentials have been compromised, either through external hacking or insider collusion.
COMPROMISED INSIDERS
12
To configure a device or application so that it perform better.
Optimization
13
refers to the volume of users visiting a website.
web-traffic
14
is a method of promotion and advertising to help companies' content rank higher among search engine traffic.
search engine marketing (SEM)
15
types of social engineering
PHONE SCAMS FAKE WEBSITES KEYLOGGERS IMPERSONATION ATTACKS BAITING CHARITY SCAMS
16
these messages may offer exclusive deals or discounts. Enticing recipients to click on malicious links.
online shopping scams
17
The group of consumers or organizations that is interested in the product, has the resources to purchase the product, and is permitted by the law to acquire the product.
Market
18
impersonate someone else to gain trust and deceive individuals.
impersonation attacks
19
A program that searches for and identifies items in a database that correspond to keyword or characters specified by the user, used especially for finding particular sites on the WWW.
Search Engine
20
types of malwares
viruses, ransomware, keyloggers
21
Two main factors need to be taken into consideration: expectation of the employers from their employees and the characteristics of the job.
E-mail marketing
22
allows you to connect with the market directly.
Social Media
23
create fraudulent websites that resemble legitimate ones.
fake website
24
exploit people’s goodwill by creating fake charity organization.
charity scams
25
Process of creating and distributing content to attract and retain customers.
Content Marketing
26
Evaluate attractiveness of each segment ;Select the target segment/s
Market Targeting
27
rely on user action or human intervention to spread. Propagation: File sharing, email attachments, infected removable media (flash drive), executing infected programs.
viruses
28
The virtual market where transactions are conducted online.
Market Space
29
capture and record keystrokes made by a users, enabling attackers to obtain sensitive information, password, credit card details and other confidential data.
keyloggers
30
requesting personal information such as account numbers, passwords, PIN or pretext account verification.
BANKING & FINANCIAL SCAMS
31
attackers make phone calls pretending to be from a trusted organization or authority.
phone scams
32
victims receive messagesthat appear from the official support team, laiming account security issues or unauthorized access.
social media account compromises
33
misuse their privilege access rights to gain unauthorized access to systems, database or accounts, potentially for malicious purpose.
UNAUTHORIZED SYSTEM ACCESS
34
The physical market where goods and services are traditionally bought and sold
Marketplace
35
attackers pose as technical support, contact individuals claiming that their device is infected or experiencing issues.
keyloggers
36
Types of insider threat:(8)
MALICIOUS INSIDERS NEGLIGENT INSIDERS COMPROMISED INSIDERS DATA THEFT UNAUTHORIZED SYSTEM ACCESS SABOTAGE UNAUTHORIZED DISCLOSURE NEGLIGENT DATA HANDLING
37
Identify possible positioning concepts for each target segment ;Select, develop, and communicate the chosen positioning concept.
Market Positioning
38
TYPES OF CONTEMPORARY CONTENT MARKETING.Select the correct answer (11).
Newsletter and Newsfeed , Videos, White paper and reports, E-book, Infographics , Case studies , how to guide, question and answers articles , photographs, blogs, games and apps
39
impersonating government agencies in the Philippines are ent to individuals claiming urgent notifications, tax, refunds or penalties
government agency scams
40
focuses on storytelling to engage and connect with audiences, making brands more memorable and human.
narrative content marketing
41
Identify segmentation variables and segment the market ;Develop profiles of resulting segments.
Market Segmentation
42
intentionally exploit their access privileges to carry out harmful activities. Include theft, unauthorized disclosure of sensitive data, sabotage of system.
MALICIOUS INSIDERS
43
Brand collaborating with an online influencer to market one of its goods or services.
Influencer Marketing
44
accidentally sending confidential information to the wrong recipients, leaving sensitive documents unattended.
NEGLIGENT DATA HANDLING
45
intentionally or unintentionally shares sensitive or confidential information with unauthorized individuals or the public such as social media, personal email accounts or communication channels.
UNAUTHORIZED DISCLOSURE
46
The use of video content to promote or inform audiences about your brand and products.
video marketing
47
unknowingly or carelessly compromise security through their actions or lack of adherence to policies and procedures.
NEGLIGENT INSIDER
48
this can be motivated by revenge, dissatisfaction by revenge, dissatisfaction or as an act of protest.
SABOTAGE
49
short for “malicious software” designed to disrupt, damage or gain unauthorized access to computer systems or networks.
malware
50
refers to risks posed by individuals within an organization who have authorized access to sensitive data and misuse it intentionally or inadvertently.
insider threat
51
is a common tactic used by cybercriminals to trick individuals into revealing sensitive information, such as login credentials or financial details.
phishing