暗記メーカー
ログイン
Ma'am Jamie
  • MAICA RODA

  • 問題数 51 • 6/15/2024

    記憶度

    完璧

    7

    覚えた

    20

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    The group of consumers or organizations that is interested in the product, has the resources to purchase the product, and is permitted by the law to acquire the product.

    Market

  • 2

    The physical market where goods and services are traditionally bought and sold

    Marketplace

  • 3

    The virtual market where transactions are conducted online.

    Market Space

  • 4

    Identify segmentation variables and segment the market ;Develop profiles of resulting segments.

    Market Segmentation

  • 5

    Evaluate attractiveness of each segment ;Select the target segment/s

    Market Targeting

  • 6

    Identify possible positioning concepts for each target segment ;Select, develop, and communicate the chosen positioning concept.

    Market Positioning

  • 7

    serves as the foundation of your online presence;It acts as a central hub to showcase your brand, products, and provide valuable information

    Website

  • 8

    allows you to connect with the market directly.

    Social Media

  • 9

    A program that searches for and identifies items in a database that correspond to keyword or characters specified by the user, used especially for finding particular sites on the WWW.

    Search Engine

  • 10

    To configure a device or application so that it perform better.

    Optimization

  • 11

    Brand collaborating with an online influencer to market one of its goods or services.

    Influencer Marketing

  • 12

    Content Marketing through Social Media can be highly beneficial to you when done right.Select the correct answer:(5)

    It improves brand awareness, Higher conversion rates, Improved search engine rankings, Cost-effective, Increased top-funnel traffic

  • 13

    Process of creating and distributing content to attract and retain customers.

    Content Marketing

  • 14

    TYPES OF CONTEMPORARY CONTENT MARKETING.Select the correct answer (11).

    Newsletter and Newsfeed , Videos, White paper and reports, E-book, Infographics , Case studies , how to guide, question and answers articles , photographs, blogs, games and apps

  • 15

    Top 5 Digital Marketing Strategies.Select the correct answer.

    search engine marketing , social media marketing , narrative content marketing , video marketing, E-mail marketing

  • 16

    is a method of promotion and advertising to help companies' content rank higher among search engine traffic.

    search engine marketing (SEM)

  • 17

    is the process of presenting and drawing web traffic to social media channels;also known as digital marketing and e- marketing.

    social media marketing

  • 18

    focuses on storytelling to engage and connect with audiences, making brands more memorable and human.

    narrative content marketing

  • 19

    The use of video content to promote or inform audiences about your brand and products.

    video marketing

  • 20

    Two main factors need to be taken into consideration: expectation of the employers from their employees and the characteristics of the job.

    E-mail marketing

  • 21

    refers to the volume of users visiting a website.

    web-traffic

  • 22

    short for “malicious software” designed to disrupt, damage or gain unauthorized access to computer systems or networks.

    malware

  • 23

    rely on user action or human intervention to spread. Propagation: File sharing, email attachments, infected removable media (flash drive), executing infected programs.

    viruses

  • 24

    encrypts files or locks down computer systems, rendering them inaccessible to users until a ransom is paid

    ransomware

  • 25

    capture and record keystrokes made by a users, enabling attackers to obtain sensitive information, password, credit card details and other confidential data.

    keyloggers

  • 26

    types of malwares

    viruses, ransomware, keyloggers

  • 27

    is a common tactic used by cybercriminals to trick individuals into revealing sensitive information, such as login credentials or financial details.

    phishing

  • 28

    requesting personal information such as account numbers, passwords, PIN or pretext account verification.

    BANKING & FINANCIAL SCAMS

  • 29

    these messages may offer exclusive deals or discounts. Enticing recipients to click on malicious links.

    online shopping scams

  • 30

    offering lucrative job opportunities with well-known companies or abroad. Requesting passport details, bank account for employment verification.

    job offers scam

  • 31

    victims receive messagesthat appear from the official support team, laiming account security issues or unauthorized access.

    social media account compromises

  • 32

    impersonating government agencies in the Philippines are ent to individuals claiming urgent notifications, tax, refunds or penalties

    government agency scams

  • 33

    PHISHING ATTACKS

    BANKING & FINANCIAL SCAMS ONLINE SHOPPING SCAMS JOB OFFER SCAMS SOCIAL MEDIA ACCOUNT COMPROMISES GOVERNMENT AGENCY SCAMS

  • 34

    refers to risks posed by individuals within an organization who have authorized access to sensitive data and misuse it intentionally or inadvertently.

    insider threat

  • 35

    intentionally exploit their access privileges to carry out harmful activities. Include theft, unauthorized disclosure of sensitive data, sabotage of system.

    MALICIOUS INSIDERS

  • 36

    unknowingly or carelessly compromise security through their actions or lack of adherence to policies and procedures.

    NEGLIGENT INSIDER

  • 37

    access credentials have been compromised, either through external hacking or insider collusion.

    COMPROMISED INSIDERS

  • 38

    intentionally steal confidential information such as customer records, intellectual property, with the intention of selling or using it for personal gain or to benefit a competitor

    DATA THEFT

  • 39

    misuse their privilege access rights to gain unauthorized access to systems, database or accounts, potentially for malicious purpose.

    UNAUTHORIZED SYSTEM ACCESS

  • 40

    this can be motivated by revenge, dissatisfaction by revenge, dissatisfaction or as an act of protest.

    SABOTAGE

  • 41

    intentionally or unintentionally shares sensitive or confidential information with unauthorized individuals or the public such as social media, personal email accounts or communication channels.

    UNAUTHORIZED DISCLOSURE

  • 42

    accidentally sending confidential information to the wrong recipients, leaving sensitive documents unattended.

    NEGLIGENT DATA HANDLING

  • 43

    leverages human psychology to manipulate individuals into divulging sensitive information or performing actions that compromise security. It often involves impersonation, manipulation, or exploiting trust to gain unauthorized access.

    social engineering

  • 44

    Types of insider threat:(8)

    MALICIOUS INSIDERS NEGLIGENT INSIDERS COMPROMISED INSIDERS DATA THEFT UNAUTHORIZED SYSTEM ACCESS SABOTAGE UNAUTHORIZED DISCLOSURE NEGLIGENT DATA HANDLING

  • 45

    attackers make phone calls pretending to be from a trusted organization or authority.

    phone scams

  • 46

    create fraudulent websites that resemble legitimate ones.

    fake website

  • 47

    attackers pose as technical support, contact individuals claiming that their device is infected or experiencing issues.

    keyloggers

  • 48

    impersonate someone else to gain trust and deceive individuals.

    impersonation attacks

  • 49

    leave physical or digital in public spaces like flash drive, CD or download links.

    baiting

  • 50

    exploit people’s goodwill by creating fake charity organization.

    charity scams

  • 51

    types of social engineering

    PHONE SCAMS FAKE WEBSITES KEYLOGGERS IMPERSONATION ATTACKS BAITING CHARITY SCAMS