問題一覧
1
The group of consumers or organizations that is interested in the product, has the resources to purchase the product, and is permitted by the law to acquire the product.
Market
2
The physical market where goods and services are traditionally bought and sold
Marketplace
3
The virtual market where transactions are conducted online.
Market Space
4
Identify segmentation variables and segment the market ;Develop profiles of resulting segments.
Market Segmentation
5
Evaluate attractiveness of each segment ;Select the target segment/s
Market Targeting
6
Identify possible positioning concepts for each target segment ;Select, develop, and communicate the chosen positioning concept.
Market Positioning
7
serves as the foundation of your online presence;It acts as a central hub to showcase your brand, products, and provide valuable information
Website
8
allows you to connect with the market directly.
Social Media
9
A program that searches for and identifies items in a database that correspond to keyword or characters specified by the user, used especially for finding particular sites on the WWW.
Search Engine
10
To configure a device or application so that it perform better.
Optimization
11
Brand collaborating with an online influencer to market one of its goods or services.
Influencer Marketing
12
Content Marketing through Social Media can be highly beneficial to you when done right.Select the correct answer:(5)
It improves brand awareness, Higher conversion rates, Improved search engine rankings, Cost-effective, Increased top-funnel traffic
13
Process of creating and distributing content to attract and retain customers.
Content Marketing
14
TYPES OF CONTEMPORARY CONTENT MARKETING.Select the correct answer (11).
Newsletter and Newsfeed , Videos, White paper and reports, E-book, Infographics , Case studies , how to guide, question and answers articles , photographs, blogs, games and apps
15
Top 5 Digital Marketing Strategies.Select the correct answer.
search engine marketing , social media marketing , narrative content marketing , video marketing, E-mail marketing
16
is a method of promotion and advertising to help companies' content rank higher among search engine traffic.
search engine marketing (SEM)
17
is the process of presenting and drawing web traffic to social media channels;also known as digital marketing and e- marketing.
social media marketing
18
focuses on storytelling to engage and connect with audiences, making brands more memorable and human.
narrative content marketing
19
The use of video content to promote or inform audiences about your brand and products.
video marketing
20
Two main factors need to be taken into consideration: expectation of the employers from their employees and the characteristics of the job.
E-mail marketing
21
refers to the volume of users visiting a website.
web-traffic
22
short for “malicious software” designed to disrupt, damage or gain unauthorized access to computer systems or networks.
malware
23
rely on user action or human intervention to spread. Propagation: File sharing, email attachments, infected removable media (flash drive), executing infected programs.
viruses
24
encrypts files or locks down computer systems, rendering them inaccessible to users until a ransom is paid
ransomware
25
capture and record keystrokes made by a users, enabling attackers to obtain sensitive information, password, credit card details and other confidential data.
keyloggers
26
types of malwares
viruses, ransomware, keyloggers
27
is a common tactic used by cybercriminals to trick individuals into revealing sensitive information, such as login credentials or financial details.
phishing
28
requesting personal information such as account numbers, passwords, PIN or pretext account verification.
BANKING & FINANCIAL SCAMS
29
these messages may offer exclusive deals or discounts. Enticing recipients to click on malicious links.
online shopping scams
30
offering lucrative job opportunities with well-known companies or abroad. Requesting passport details, bank account for employment verification.
job offers scam
31
victims receive messagesthat appear from the official support team, laiming account security issues or unauthorized access.
social media account compromises
32
impersonating government agencies in the Philippines are ent to individuals claiming urgent notifications, tax, refunds or penalties
government agency scams
33
PHISHING ATTACKS
BANKING & FINANCIAL SCAMS ONLINE SHOPPING SCAMS JOB OFFER SCAMS SOCIAL MEDIA ACCOUNT COMPROMISES GOVERNMENT AGENCY SCAMS
34
refers to risks posed by individuals within an organization who have authorized access to sensitive data and misuse it intentionally or inadvertently.
insider threat
35
intentionally exploit their access privileges to carry out harmful activities. Include theft, unauthorized disclosure of sensitive data, sabotage of system.
MALICIOUS INSIDERS
36
unknowingly or carelessly compromise security through their actions or lack of adherence to policies and procedures.
NEGLIGENT INSIDER
37
access credentials have been compromised, either through external hacking or insider collusion.
COMPROMISED INSIDERS
38
intentionally steal confidential information such as customer records, intellectual property, with the intention of selling or using it for personal gain or to benefit a competitor
DATA THEFT
39
misuse their privilege access rights to gain unauthorized access to systems, database or accounts, potentially for malicious purpose.
UNAUTHORIZED SYSTEM ACCESS
40
this can be motivated by revenge, dissatisfaction by revenge, dissatisfaction or as an act of protest.
SABOTAGE
41
intentionally or unintentionally shares sensitive or confidential information with unauthorized individuals or the public such as social media, personal email accounts or communication channels.
UNAUTHORIZED DISCLOSURE
42
accidentally sending confidential information to the wrong recipients, leaving sensitive documents unattended.
NEGLIGENT DATA HANDLING
43
leverages human psychology to manipulate individuals into divulging sensitive information or performing actions that compromise security. It often involves impersonation, manipulation, or exploiting trust to gain unauthorized access.
social engineering
44
Types of insider threat:(8)
MALICIOUS INSIDERS NEGLIGENT INSIDERS COMPROMISED INSIDERS DATA THEFT UNAUTHORIZED SYSTEM ACCESS SABOTAGE UNAUTHORIZED DISCLOSURE NEGLIGENT DATA HANDLING
45
attackers make phone calls pretending to be from a trusted organization or authority.
phone scams
46
create fraudulent websites that resemble legitimate ones.
fake website
47
attackers pose as technical support, contact individuals claiming that their device is infected or experiencing issues.
keyloggers
48
impersonate someone else to gain trust and deceive individuals.
impersonation attacks
49
leave physical or digital in public spaces like flash drive, CD or download links.
baiting
50
exploit people’s goodwill by creating fake charity organization.
charity scams
51
types of social engineering
PHONE SCAMS FAKE WEBSITES KEYLOGGERS IMPERSONATION ATTACKS BAITING CHARITY SCAMS