ログイン

(Pre-Finals) Professional Issues In Information Technolog Mocktest BSIT 505

(Pre-Finals) Professional Issues In Information Technolog Mocktest BSIT 505
62問 • 4ヶ月前
  • Xai Alexandrei Delos Reyes
  • 通報

    問題一覧

  • 1

    It is committed in cyberspace using information and communication technologies such as televisions, smartphones, computers, networks, and other communication devices

    Cybercrime

  • 2

    These are offenses committed with or without technology but increased their reach using such technologies. These cybercrimes are also described as “technology-as-instrument” offenses.

    Cyber-Enabled Offenses

  • 3

    refers to obtaining or possessing another’s identity and information to commit a legal offense.

    Identity theft

  • 4

    refers to the fraudulent impersonation of someone to gain an advantage, obtain property, cause a disadvantage, or avoid prosecution.

    Identity fraud

  • 5

    refers to luring users to log onto a fake website that appears real to gather sensitive information, such as the user’s password, account number, ATM PIN, and credit card.

    Phishing

  • 6

    Online tools and social media applications are used to harass, intimidate, or embarrass another person or other identifiable groups.

    Cyberbullying and Online Harassment

  • 7

    Which of the following are the Cyber-Enabled Offenses

    Identity theft, Identity fraud, Phishing, Cyberbullying and Online Harassment

  • 8

    These are offenses that are strictly committed using information and communication technologies. Cyber-dependent crimes target network systems and data confidentiality, integrity, and availability.

    Cyber-Dependent Offenses

  • 9

    It refers to someone manipulating a computer system or private network to access digital files or systems without proper authorization.

    Hacking

  • 10

    refers to gaining logical or physical entry to a network, data, website, program, or another system, without proper authorization or credentials

    Unauthorized access

  • 11

    refers to inserting, removing, or altering data without proper authorization

    Modification of data

  • 12

    refers to disrupting the transmission or communication of data.

    Impairment of data

  • 13

    refers to the unauthorized access and alteration in the data transmission between machines for personal or financial gain.

    Interception of data

  • 14

    refers to the unauthorized use of company files, systems, computers, and networks to damage the company's properties.

    Misuse of assets

  • 15

    These are attacks that use computers against other computers or networks to modify, steal, or gain information through unauthorized access. An insider or an outsider can initiate an attack.

    Cyber-attack

  • 16

    an attack from inside the security perimeter, also called “insider.”

    Inside attack

  • 17

    an attack from outside the security perimeter or the system, also called “outsider.”

    Outside attack

  • 18

    or malicious software- is software-based hacking and cyber-attacking tools. The difference between malware and software is that malware is intentionally malicious.

    Malware

  • 19

    This is designed to spread from one program to another, which can self-replicate. When it is executed, it replicates itself by changing other computer programs, documents, or boot sectors.

    Virus

  • 20

    Unlike viruses, this standalone malware replicates itself without human intervention. It uses a computer network to spread itself by depending on the security failures of the targeted computer to access it

    Worm

  • 21

    It appears as a legitimate program when downloaded to a computer. It can be found on file-sharing sites, email attachments, sketchy websites, and hacked Wi-Fi networks.

    Trojan

  • 22

    It sends massive amounts of unsolicited commercial emails to illegally acquired email addresses. While this is illegal, these programs are not fundamentally destructive.

    Spammer

  • 23

    used to perform illegal activities such as creating malicious pop-up advertisements, capturing banking login details, and taking screenshots of the visited websites.

    Spyware

  • 24

    These offenses deal with the illegal use of computers for data storage, documentation, and communication. These offenses are instances wherein the use of the computer or network is not vital to the actual crime but may still be legally relevant to be considered as evidence or as an accessory to the crim

    Computer/Cyber-Supported Offenses

  • 25

    These are considered cyberterrorism, an umbrella term for unlawful offenses that commit terrorist activities or engage in terrorism against computers, networks, and the information stored therein. It is the conjunction of terrorism and cyberspace.

    National Security Offenses

  • 26

    sudden invasive attacks targeting computer information systems, networks, infrastructure, or personal electronic devices.

    Incursion

  • 27

    an umbrella term for destroying digital data where it becomes unreadable, inaccessible, or susceptible to unauthorized purposes

    Destruction

  • 28

    refers to the intentional dissemination of false information to mislead, confuse, or manipulate an audience.

    Disinformation

  • 29

    refers to the intentional dissemination of false information to mislead, confuse, or manipulate an audience.

    Disinformation

  • 30

    refers to malicious attempts from multiple machines to disrupt computer networks by temporarily or indefinitely making them inaccessible.

    Distributed Denial of Service (DDoS)

  • 31

    refers to malicious attacks targeting websites to replace their content with the attacker’s message. These offenses convey political or religious messages, profanity, and other inappropriate content.

    Defacement of Websites

  • 32

    What is the Punishment for Any person or group found liable for any of the offenses in Cyber- enabled, and Cyber-enabled offenses?

    prision mayor which is six (6) years and one (1) day to 12 years of imprisonment or a fine of at least P200,000.

  • 33

    What is the Punishment for any person found liable for offenses of Misuse of Assets is punished with prision mayor or a fine of not more than P500,000 or both.

    punished with prision mayor or a fine of not more than P500,000 or both.

  • 34

    What is the Punishment for offenses in Cyber-enabled offenses are committed against critical infrastructure?

    reclusion temporal which is 12 years and 1 day to 20 years of imprisonment, or a fine of at least P500,000 up to the equal amount of the damages is imposed.

  • 35

    What is the Punishment if the person is found liable for Computer/Cyber-Supported and National Security Offenses?

    imprisonment one (1) degree lower than the advised penalty for the offense or a fine of at least P100,000 but not exceeding P500,000 or both is imposed

  • 36

    It is securing computer systems, networks, and programs from any cyber-attack. It is one of the fastest-growing global challenges that is becoming increasingly important to address, with its enormous implications for government security, economic prosperity, and public safety.

    Cybersecurity

  • 37

    The technology of encrypting and decrypting information is called ____?

    cryptography

  • 38

    It takes plain text, such as a message or an email, and codes it into an unreadable format. It protects the user from illegal and unauthorized access and various malicious attacks.

    Encryption

  • 39

    What is another term for unencrypted data?

    plaintext

  • 40

    What is the other term for encrypted data?

    ciphertext

  • 41

    This is used to encode Encryption, which are part of specific algorithms.

    Encryption keys

  • 42

    This is used to make encrypted data readable again.

    decryption key

  • 43

    It is a technique to validate the identity of an end user or a computer program.

    Authentication

  • 44

    It assures good security as an individual’s physical and behavioral traits are permanent and unique. Unlike security keys and passwords, physical and behavioral traits are harder to lose and duplicate.

    Biometrics

  • 45

    It is the barrier between networks implemented in software, hardware, or cloud-based applications. It serves as the first line of defense utilized for blocking inbound specific packet types from reaching the protected network and for eliminating unauthorized data access to defend the network.

    Firewall

  • 46

    This is software for computers prevents, detects, and removes any malicious software. It helps users isolatethe infected file from cyber-attacks like ransomware, trojan horses, phishing, and DDoS attacks

    Virus Detection

  • 47

    What type of Phishing Detection is being described? "it targets the visual likeness of the phishing sites. The visual representations of the legitimate websites are stored in a database wherein the malicious website in question crosses the similarity threshold."

    Visual Similarity-Based Phishing Detection

  • 48

    What type of Phishing Detection is being described? "Most blacklist-based phishing detection technologies keeps a database of approved and unapproved URLs."

    Blacklist-Based Phishing Detection

  • 49

    What type of Phishing Detection is being described? "When the user visits a website, the first thing that this checks is whether the website link is in the DNS blacklist."

    Web Crawling-Based Phishing Attack Detection (WC-PAD)

  • 50

    Clients and partners expect extensive security to protect their data.

    Security Expectation

  • 51

    They expect organizations to adhere to lawful paths in achieving commercial goals.

    Organization Expectation

  • 52

    If organizations miss a new legal ruling, it could hurt the organization, its brand, and everyone involved.

    Damages

  • 53

    It is encouraged to be truthful and transparent in handling personal data by giving precise and timely reports and updates.

    Data Protection

  • 54

    It is stealing data from a company. IP involves ideas, design, artistic works, images, videos, symbols, and names that are assets to a company.

    IP Theft

  • 55

    It is stealing data from a company. IP involves ideas, design, artistic works, images, videos, symbols, and names that are assets to a company.

    IP Theft

  • 56

    it combines the benefits of data protection and cyber security needed for business operations in the current cyber threat landscape.

    Cyber Protection

  • 57

    which statement BEST DESCRIBES the difference between Cyber Protection and Cybersecurity

    Cyber Protection combines the benefits of data protection and cyber security needed for business operations in the current cyber threat landscape. Cybersecurity safeguards the systems that make data access, storage, transfer, and authentication possible instead of mainly focusing on data protection.

  • 58

    Which scope of Cyber Protection is being described? "This deals with ensuring that a reliable copy of the data and information is always available. "

    Safety

  • 59

    Which scope of Cyber Protection is being described? "This deals with ensuring that data and information are available from any location at any time"

    Accessibility

  • 60

    Which scope of Cyber Protection is being described? "This deals with ensuring full control and transparency over who can view and access the data and information"

    Privacy

  • 61

    Which scope of Cyber Protection is being described? "It deals with ensuring that backed-up data and information is an exact and unmodified copy of the original data."

    Authenticity

  • 62

    Which scope of Cyber Protection is being described? "It deals with ensuring that data, information, apps, and systems are protected against cyber threats."

    Security

  • The Contemporary World Mock test (Prelims)

    The Contemporary World Mock test (Prelims)

    Xai Alexandrei Delos Reyes · 58問 · 2年前

    The Contemporary World Mock test (Prelims)

    The Contemporary World Mock test (Prelims)

    58問 • 2年前
    Xai Alexandrei Delos Reyes

    Computing Mock test (Prelims)

    Computing Mock test (Prelims)

    Xai Alexandrei Delos Reyes · 67問 · 2年前

    Computing Mock test (Prelims)

    Computing Mock test (Prelims)

    67問 • 2年前
    Xai Alexandrei Delos Reyes

    Programming Mock Test (Prelims)

    Programming Mock Test (Prelims)

    Xai Alexandrei Delos Reyes · 64問 · 2年前

    Programming Mock Test (Prelims)

    Programming Mock Test (Prelims)

    64問 • 2年前
    Xai Alexandrei Delos Reyes

    Entrepreneurship Mock Test (Prelims)

    Entrepreneurship Mock Test (Prelims)

    Xai Alexandrei Delos Reyes · 23問 · 2年前

    Entrepreneurship Mock Test (Prelims)

    Entrepreneurship Mock Test (Prelims)

    23問 • 2年前
    Xai Alexandrei Delos Reyes

    Computing Mock Test (Midterms) BSIT 107

    Computing Mock Test (Midterms) BSIT 107

    Xai Alexandrei Delos Reyes · 76問 · 2年前

    Computing Mock Test (Midterms) BSIT 107

    Computing Mock Test (Midterms) BSIT 107

    76問 • 2年前
    Xai Alexandrei Delos Reyes

    Math Mock Test (Prelims)

    Math Mock Test (Prelims)

    Xai Alexandrei Delos Reyes · 48問 · 2年前

    Math Mock Test (Prelims)

    Math Mock Test (Prelims)

    48問 • 2年前
    Xai Alexandrei Delos Reyes

    Programming Mock Test (Midterms) BSIT 107

    Programming Mock Test (Midterms) BSIT 107

    Xai Alexandrei Delos Reyes · 52問 · 2年前

    Programming Mock Test (Midterms) BSIT 107

    Programming Mock Test (Midterms) BSIT 107

    52問 • 2年前
    Xai Alexandrei Delos Reyes

    UTS Mock Test (Midterms) BSIT107

    UTS Mock Test (Midterms) BSIT107

    Xai Alexandrei Delos Reyes · 40問 · 2年前

    UTS Mock Test (Midterms) BSIT107

    UTS Mock Test (Midterms) BSIT107

    40問 • 2年前
    Xai Alexandrei Delos Reyes

    Entrepreneurship Mock Test (Midterms) BSIT 107

    Entrepreneurship Mock Test (Midterms) BSIT 107

    Xai Alexandrei Delos Reyes · 38問 · 2年前

    Entrepreneurship Mock Test (Midterms) BSIT 107

    Entrepreneurship Mock Test (Midterms) BSIT 107

    38問 • 2年前
    Xai Alexandrei Delos Reyes

    Contemporary World Mock Test (Midterms) BSIT 107

    Contemporary World Mock Test (Midterms) BSIT 107

    Xai Alexandrei Delos Reyes · 28問 · 2年前

    Contemporary World Mock Test (Midterms) BSIT 107

    Contemporary World Mock Test (Midterms) BSIT 107

    28問 • 2年前
    Xai Alexandrei Delos Reyes

    Math Mocktest (Midterms) BSIT 107

    Math Mocktest (Midterms) BSIT 107

    Xai Alexandrei Delos Reyes · 24問 · 2年前

    Math Mocktest (Midterms) BSIT 107

    Math Mocktest (Midterms) BSIT 107

    24問 • 2年前
    Xai Alexandrei Delos Reyes

    Computer Programming Mocktest (Pre-finals)

    Computer Programming Mocktest (Pre-finals)

    Xai Alexandrei Delos Reyes · 26問 · 2年前

    Computer Programming Mocktest (Pre-finals)

    Computer Programming Mocktest (Pre-finals)

    26問 • 2年前
    Xai Alexandrei Delos Reyes

    Math Mocktest (Pre-Finals)

    Math Mocktest (Pre-Finals)

    Xai Alexandrei Delos Reyes · 19問 · 2年前

    Math Mocktest (Pre-Finals)

    Math Mocktest (Pre-Finals)

    19問 • 2年前
    Xai Alexandrei Delos Reyes

    Computing Mock Test (Pre-finals)

    Computing Mock Test (Pre-finals)

    Xai Alexandrei Delos Reyes · 36問 · 2年前

    Computing Mock Test (Pre-finals)

    Computing Mock Test (Pre-finals)

    36問 • 2年前
    Xai Alexandrei Delos Reyes

    Computing Mock Test Finals

    Computing Mock Test Finals

    Xai Alexandrei Delos Reyes · 26問 · 2年前

    Computing Mock Test Finals

    Computing Mock Test Finals

    26問 • 2年前
    Xai Alexandrei Delos Reyes

    Comprog 2nd sem (prelims) BSIT 205

    Comprog 2nd sem (prelims) BSIT 205

    Xai Alexandrei Delos Reyes · 63問 · 2年前

    Comprog 2nd sem (prelims) BSIT 205

    Comprog 2nd sem (prelims) BSIT 205

    63問 • 2年前
    Xai Alexandrei Delos Reyes

    Discrete Math 2nd sem (prelims) BSIT 205

    Discrete Math 2nd sem (prelims) BSIT 205

    Xai Alexandrei Delos Reyes · 36問 · 2年前

    Discrete Math 2nd sem (prelims) BSIT 205

    Discrete Math 2nd sem (prelims) BSIT 205

    36問 • 2年前
    Xai Alexandrei Delos Reyes

    Art Appreciation (Prelim) BSIT 205

    Art Appreciation (Prelim) BSIT 205

    Xai Alexandrei Delos Reyes · 56問 · 2年前

    Art Appreciation (Prelim) BSIT 205

    Art Appreciation (Prelim) BSIT 205

    56問 • 2年前
    Xai Alexandrei Delos Reyes

    Ethics 2nd sem (Prelims) BSIT 205

    Ethics 2nd sem (Prelims) BSIT 205

    Xai Alexandrei Delos Reyes · 45問 · 2年前

    Ethics 2nd sem (Prelims) BSIT 205

    Ethics 2nd sem (Prelims) BSIT 205

    45問 • 2年前
    Xai Alexandrei Delos Reyes

    STS 2nd Sem (Prelim) BSIT 205

    STS 2nd Sem (Prelim) BSIT 205

    Xai Alexandrei Delos Reyes · 40問 · 2年前

    STS 2nd Sem (Prelim) BSIT 205

    STS 2nd Sem (Prelim) BSIT 205

    40問 • 2年前
    Xai Alexandrei Delos Reyes

    Systems Administration 2nd sem (Prelims) BSIT 205

    Systems Administration 2nd sem (Prelims) BSIT 205

    Xai Alexandrei Delos Reyes · 72問 · 2年前

    Systems Administration 2nd sem (Prelims) BSIT 205

    Systems Administration 2nd sem (Prelims) BSIT 205

    72問 • 2年前
    Xai Alexandrei Delos Reyes

    Discrete Mathematics (Midterms) BSIT 205

    Discrete Mathematics (Midterms) BSIT 205

    Xai Alexandrei Delos Reyes · 52問 · 1年前

    Discrete Mathematics (Midterms) BSIT 205

    Discrete Mathematics (Midterms) BSIT 205

    52問 • 1年前
    Xai Alexandrei Delos Reyes

    Art Appreciation (Midterm) BSIT 205

    Art Appreciation (Midterm) BSIT 205

    Xai Alexandrei Delos Reyes · 56問 · 1年前

    Art Appreciation (Midterm) BSIT 205

    Art Appreciation (Midterm) BSIT 205

    56問 • 1年前
    Xai Alexandrei Delos Reyes

    Ethics Mocktest (Midterms) BSIT205

    Ethics Mocktest (Midterms) BSIT205

    Xai Alexandrei Delos Reyes · 29問 · 1年前

    Ethics Mocktest (Midterms) BSIT205

    Ethics Mocktest (Midterms) BSIT205

    29問 • 1年前
    Xai Alexandrei Delos Reyes

    Comprog Mocktest (Midterm) BSIT 205

    Comprog Mocktest (Midterm) BSIT 205

    Xai Alexandrei Delos Reyes · 61問 · 1年前

    Comprog Mocktest (Midterm) BSIT 205

    Comprog Mocktest (Midterm) BSIT 205

    61問 • 1年前
    Xai Alexandrei Delos Reyes

    System Administration Mocktest (Midterms) BSIT 205

    System Administration Mocktest (Midterms) BSIT 205

    Xai Alexandrei Delos Reyes · 65問 · 1年前

    System Administration Mocktest (Midterms) BSIT 205

    System Administration Mocktest (Midterms) BSIT 205

    65問 • 1年前
    Xai Alexandrei Delos Reyes

    Math Mocktest (Pre-finals) BSIT 205

    Math Mocktest (Pre-finals) BSIT 205

    Xai Alexandrei Delos Reyes · 49問 · 1年前

    Math Mocktest (Pre-finals) BSIT 205

    Math Mocktest (Pre-finals) BSIT 205

    49問 • 1年前
    Xai Alexandrei Delos Reyes

    Art Appreciation Mocktest (Pre-finals) BSIT 205

    Art Appreciation Mocktest (Pre-finals) BSIT 205

    Xai Alexandrei Delos Reyes · 66問 · 1年前

    Art Appreciation Mocktest (Pre-finals) BSIT 205

    Art Appreciation Mocktest (Pre-finals) BSIT 205

    66問 • 1年前
    Xai Alexandrei Delos Reyes

    Ethics Mocktest (Pre-finals) BSIT 205

    Ethics Mocktest (Pre-finals) BSIT 205

    Xai Alexandrei Delos Reyes · 50問 · 1年前

    Ethics Mocktest (Pre-finals) BSIT 205

    Ethics Mocktest (Pre-finals) BSIT 205

    50問 • 1年前
    Xai Alexandrei Delos Reyes

    Computer Programming Mocktest (Pre-finals) BSIT 205

    Computer Programming Mocktest (Pre-finals) BSIT 205

    Xai Alexandrei Delos Reyes · 33問 · 1年前

    Computer Programming Mocktest (Pre-finals) BSIT 205

    Computer Programming Mocktest (Pre-finals) BSIT 205

    33問 • 1年前
    Xai Alexandrei Delos Reyes

    System Administration (Pre-finals) BSIT 205

    System Administration (Pre-finals) BSIT 205

    Xai Alexandrei Delos Reyes · 52問 · 1年前

    System Administration (Pre-finals) BSIT 205

    System Administration (Pre-finals) BSIT 205

    52問 • 1年前
    Xai Alexandrei Delos Reyes

    Art Appreciation Finals BSIT 205

    Art Appreciation Finals BSIT 205

    Xai Alexandrei Delos Reyes · 35問 · 1年前

    Art Appreciation Finals BSIT 205

    Art Appreciation Finals BSIT 205

    35問 • 1年前
    Xai Alexandrei Delos Reyes

    Data Structures and Algorithms (Mocktest) BSIT 307

    Data Structures and Algorithms (Mocktest) BSIT 307

    Xai Alexandrei Delos Reyes · 52問 · 1年前

    Data Structures and Algorithms (Mocktest) BSIT 307

    Data Structures and Algorithms (Mocktest) BSIT 307

    52問 • 1年前
    Xai Alexandrei Delos Reyes

    Object Oriented Programming Mock Test (Mocktest) BSIT 307

    Object Oriented Programming Mock Test (Mocktest) BSIT 307

    Xai Alexandrei Delos Reyes · 23問 · 1年前

    Object Oriented Programming Mock Test (Mocktest) BSIT 307

    Object Oriented Programming Mock Test (Mocktest) BSIT 307

    23問 • 1年前
    Xai Alexandrei Delos Reyes

    Human Computer Interactions Mocktest (Prelims) BSIT 307

    Human Computer Interactions Mocktest (Prelims) BSIT 307

    Xai Alexandrei Delos Reyes · 58問 · 1年前

    Human Computer Interactions Mocktest (Prelims) BSIT 307

    Human Computer Interactions Mocktest (Prelims) BSIT 307

    58問 • 1年前
    Xai Alexandrei Delos Reyes

    Principles of Communication Mocktest (Prelims) BSIT 307

    Principles of Communication Mocktest (Prelims) BSIT 307

    Xai Alexandrei Delos Reyes · 37問 · 1年前

    Principles of Communication Mocktest (Prelims) BSIT 307

    Principles of Communication Mocktest (Prelims) BSIT 307

    37問 • 1年前
    Xai Alexandrei Delos Reyes

    Principles of Communication Mocktest (Midterms) BSIT 307

    Principles of Communication Mocktest (Midterms) BSIT 307

    Xai Alexandrei Delos Reyes · 29問 · 1年前

    Principles of Communication Mocktest (Midterms) BSIT 307

    Principles of Communication Mocktest (Midterms) BSIT 307

    29問 • 1年前
    Xai Alexandrei Delos Reyes

    Data Structures and Algorithms Mocktest (Midterm) BSIT 307

    Data Structures and Algorithms Mocktest (Midterm) BSIT 307

    Xai Alexandrei Delos Reyes · 50問 · 1年前

    Data Structures and Algorithms Mocktest (Midterm) BSIT 307

    Data Structures and Algorithms Mocktest (Midterm) BSIT 307

    50問 • 1年前
    Xai Alexandrei Delos Reyes

    Object Oriented Programming Mock Test (Midterm) BSIT 307

    Object Oriented Programming Mock Test (Midterm) BSIT 307

    Xai Alexandrei Delos Reyes · 13問 · 1年前

    Object Oriented Programming Mock Test (Midterm) BSIT 307

    Object Oriented Programming Mock Test (Midterm) BSIT 307

    13問 • 1年前
    Xai Alexandrei Delos Reyes

    Human Computer Interactions Mocktest (Midterms) BSIT 307

    Human Computer Interactions Mocktest (Midterms) BSIT 307

    Xai Alexandrei Delos Reyes · 35問 · 1年前

    Human Computer Interactions Mocktest (Midterms) BSIT 307

    Human Computer Interactions Mocktest (Midterms) BSIT 307

    35問 • 1年前
    Xai Alexandrei Delos Reyes

    Readings In Philippine History (Midterms) Mocktest

    Readings In Philippine History (Midterms) Mocktest

    Xai Alexandrei Delos Reyes · 16問 · 1年前

    Readings In Philippine History (Midterms) Mocktest

    Readings In Philippine History (Midterms) Mocktest

    16問 • 1年前
    Xai Alexandrei Delos Reyes

    Discrete Structures and Algorithms (Midterms) Mocktest

    Discrete Structures and Algorithms (Midterms) Mocktest

    Xai Alexandrei Delos Reyes · 10問 · 1年前

    Discrete Structures and Algorithms (Midterms) Mocktest

    Discrete Structures and Algorithms (Midterms) Mocktest

    10問 • 1年前
    Xai Alexandrei Delos Reyes

    Principles of Communication (Midterm) Mocktest

    Principles of Communication (Midterm) Mocktest

    Xai Alexandrei Delos Reyes · 29問 · 1年前

    Principles of Communication (Midterm) Mocktest

    Principles of Communication (Midterm) Mocktest

    29問 • 1年前
    Xai Alexandrei Delos Reyes

    TECHNOPRENEURSHIP PRELIMS BSIT 402

    TECHNOPRENEURSHIP PRELIMS BSIT 402

    Xai Alexandrei Delos Reyes · 74問 · 1年前

    TECHNOPRENEURSHIP PRELIMS BSIT 402

    TECHNOPRENEURSHIP PRELIMS BSIT 402

    74問 • 1年前
    Xai Alexandrei Delos Reyes

    (Prelim) PH Popular Culture Mocktest BSIT 402

    (Prelim) PH Popular Culture Mocktest BSIT 402

    Xai Alexandrei Delos Reyes · 19問 · 1年前

    (Prelim) PH Popular Culture Mocktest BSIT 402

    (Prelim) PH Popular Culture Mocktest BSIT 402

    19問 • 1年前
    Xai Alexandrei Delos Reyes

    (Prelim) Integrative Programming BSIT 402

    (Prelim) Integrative Programming BSIT 402

    Xai Alexandrei Delos Reyes · 46問 · 1年前

    (Prelim) Integrative Programming BSIT 402

    (Prelim) Integrative Programming BSIT 402

    46問 • 1年前
    Xai Alexandrei Delos Reyes

    (Prelim) Quantitive Methods Mocktest BSIT 402

    (Prelim) Quantitive Methods Mocktest BSIT 402

    Xai Alexandrei Delos Reyes · 39問 · 1年前

    (Prelim) Quantitive Methods Mocktest BSIT 402

    (Prelim) Quantitive Methods Mocktest BSIT 402

    39問 • 1年前
    Xai Alexandrei Delos Reyes

    (Prelim) System Integration and Architecture BSIT 402

    (Prelim) System Integration and Architecture BSIT 402

    Xai Alexandrei Delos Reyes · 29問 · 1年前

    (Prelim) System Integration and Architecture BSIT 402

    (Prelim) System Integration and Architecture BSIT 402

    29問 • 1年前
    Xai Alexandrei Delos Reyes

    (Prelim) Network Technology Mocktest BSIT 402

    (Prelim) Network Technology Mocktest BSIT 402

    Xai Alexandrei Delos Reyes · 68問 · 1年前

    (Prelim) Network Technology Mocktest BSIT 402

    (Prelim) Network Technology Mocktest BSIT 402

    68問 • 1年前
    Xai Alexandrei Delos Reyes

    (Prelim) Information Management Mocktest BSIT 402

    (Prelim) Information Management Mocktest BSIT 402

    Xai Alexandrei Delos Reyes · 45問 · 1年前

    (Prelim) Information Management Mocktest BSIT 402

    (Prelim) Information Management Mocktest BSIT 402

    45問 • 1年前
    Xai Alexandrei Delos Reyes

    (Pre-Finals) Quantitative Research Mocktest BSIT 402

    (Pre-Finals) Quantitative Research Mocktest BSIT 402

    Xai Alexandrei Delos Reyes · 28問 · 10ヶ月前

    (Pre-Finals) Quantitative Research Mocktest BSIT 402

    (Pre-Finals) Quantitative Research Mocktest BSIT 402

    28問 • 10ヶ月前
    Xai Alexandrei Delos Reyes

    (Finals) Information Management Mocktest

    (Finals) Information Management Mocktest

    Xai Alexandrei Delos Reyes · 64問 · 9ヶ月前

    (Finals) Information Management Mocktest

    (Finals) Information Management Mocktest

    64問 • 9ヶ月前
    Xai Alexandrei Delos Reyes

    (Finals) Philippine Popular Culture Mocktest

    (Finals) Philippine Popular Culture Mocktest

    Xai Alexandrei Delos Reyes · 46問 · 9ヶ月前

    (Finals) Philippine Popular Culture Mocktest

    (Finals) Philippine Popular Culture Mocktest

    46問 • 9ヶ月前
    Xai Alexandrei Delos Reyes

    (Finals) Integrative Programming Mocktest BSIT 402

    (Finals) Integrative Programming Mocktest BSIT 402

    Xai Alexandrei Delos Reyes · 24問 · 9ヶ月前

    (Finals) Integrative Programming Mocktest BSIT 402

    (Finals) Integrative Programming Mocktest BSIT 402

    24問 • 9ヶ月前
    Xai Alexandrei Delos Reyes

    (Finals) Network Technology Mocktest BSIT 402

    (Finals) Network Technology Mocktest BSIT 402

    Xai Alexandrei Delos Reyes · 37問 · 9ヶ月前

    (Finals) Network Technology Mocktest BSIT 402

    (Finals) Network Technology Mocktest BSIT 402

    37問 • 9ヶ月前
    Xai Alexandrei Delos Reyes

    (Finals) Quantitative Methods Mocktest BSIT 402

    (Finals) Quantitative Methods Mocktest BSIT 402

    Xai Alexandrei Delos Reyes · 18問 · 9ヶ月前

    (Finals) Quantitative Methods Mocktest BSIT 402

    (Finals) Quantitative Methods Mocktest BSIT 402

    18問 • 9ヶ月前
    Xai Alexandrei Delos Reyes

    Application Development Mocktest (Prelim) BSIT 505

    Application Development Mocktest (Prelim) BSIT 505

    Xai Alexandrei Delos Reyes · 72問 · 6ヶ月前

    Application Development Mocktest (Prelim) BSIT 505

    Application Development Mocktest (Prelim) BSIT 505

    72問 • 6ヶ月前
    Xai Alexandrei Delos Reyes

    Data and Digital Communication Mocktest (Prelim) BSIT 505

    Data and Digital Communication Mocktest (Prelim) BSIT 505

    Xai Alexandrei Delos Reyes · 60問 · 6ヶ月前

    Data and Digital Communication Mocktest (Prelim) BSIT 505

    Data and Digital Communication Mocktest (Prelim) BSIT 505

    60問 • 6ヶ月前
    Xai Alexandrei Delos Reyes

    (Handout 1 Only!) Advanced Systems Integration and Architecture Mocktest (Prelim) BSIT 505

    (Handout 1 Only!) Advanced Systems Integration and Architecture Mocktest (Prelim) BSIT 505

    Xai Alexandrei Delos Reyes · 38問 · 6ヶ月前

    (Handout 1 Only!) Advanced Systems Integration and Architecture Mocktest (Prelim) BSIT 505

    (Handout 1 Only!) Advanced Systems Integration and Architecture Mocktest (Prelim) BSIT 505

    38問 • 6ヶ月前
    Xai Alexandrei Delos Reyes

    Enterprise Architecture Mocktest (Prelims) BSIT 505

    Enterprise Architecture Mocktest (Prelims) BSIT 505

    Xai Alexandrei Delos Reyes · 42問 · 6ヶ月前

    Enterprise Architecture Mocktest (Prelims) BSIT 505

    Enterprise Architecture Mocktest (Prelims) BSIT 505

    42問 • 6ヶ月前
    Xai Alexandrei Delos Reyes

    Professional Issues in Information Technology Mocktest (Prelims) BSIT 505

    Professional Issues in Information Technology Mocktest (Prelims) BSIT 505

    Xai Alexandrei Delos Reyes · 44問 · 6ヶ月前

    Professional Issues in Information Technology Mocktest (Prelims) BSIT 505

    Professional Issues in Information Technology Mocktest (Prelims) BSIT 505

    44問 • 6ヶ月前
    Xai Alexandrei Delos Reyes

    Application Development Mocktest (Midterm) BSIT 505

    Application Development Mocktest (Midterm) BSIT 505

    Xai Alexandrei Delos Reyes · 42問 · 6ヶ月前

    Application Development Mocktest (Midterm) BSIT 505

    Application Development Mocktest (Midterm) BSIT 505

    42問 • 6ヶ月前
    Xai Alexandrei Delos Reyes

    Event-Driven Programming Mocktest (Midterm) BSIT - 505

    Event-Driven Programming Mocktest (Midterm) BSIT - 505

    Xai Alexandrei Delos Reyes · 61問 · 6ヶ月前

    Event-Driven Programming Mocktest (Midterm) BSIT - 505

    Event-Driven Programming Mocktest (Midterm) BSIT - 505

    61問 • 6ヶ月前
    Xai Alexandrei Delos Reyes

    Data and Digital Communication Mocktest (Midterm) BSIT - 505

    Data and Digital Communication Mocktest (Midterm) BSIT - 505

    Xai Alexandrei Delos Reyes · 80問 · 6ヶ月前

    Data and Digital Communication Mocktest (Midterm) BSIT - 505

    Data and Digital Communication Mocktest (Midterm) BSIT - 505

    80問 • 6ヶ月前
    Xai Alexandrei Delos Reyes

    (Midterm) Advanced Systems and Integration Architecture BSIT - 505

    (Midterm) Advanced Systems and Integration Architecture BSIT - 505

    Xai Alexandrei Delos Reyes · 68問 · 5ヶ月前

    (Midterm) Advanced Systems and Integration Architecture BSIT - 505

    (Midterm) Advanced Systems and Integration Architecture BSIT - 505

    68問 • 5ヶ月前
    Xai Alexandrei Delos Reyes

    (Midterm) Advanced Database Systems Mocktest BSIT - 505

    (Midterm) Advanced Database Systems Mocktest BSIT - 505

    Xai Alexandrei Delos Reyes · 82問 · 5ヶ月前

    (Midterm) Advanced Database Systems Mocktest BSIT - 505

    (Midterm) Advanced Database Systems Mocktest BSIT - 505

    82問 • 5ヶ月前
    Xai Alexandrei Delos Reyes

    (Midterms) Enterprise Architecture Mocktest BSIT 505

    (Midterms) Enterprise Architecture Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 69問 · 5ヶ月前

    (Midterms) Enterprise Architecture Mocktest BSIT 505

    (Midterms) Enterprise Architecture Mocktest BSIT 505

    69問 • 5ヶ月前
    Xai Alexandrei Delos Reyes

    (Midterm) Professional Issues in Information Technology BSIT 505

    (Midterm) Professional Issues in Information Technology BSIT 505

    Xai Alexandrei Delos Reyes · 38問 · 5ヶ月前

    (Midterm) Professional Issues in Information Technology BSIT 505

    (Midterm) Professional Issues in Information Technology BSIT 505

    38問 • 5ヶ月前
    Xai Alexandrei Delos Reyes

    (Pre-Finals)Event-Driven Programming Mocktest BSIT 505

    (Pre-Finals)Event-Driven Programming Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 59問 · 4ヶ月前

    (Pre-Finals)Event-Driven Programming Mocktest BSIT 505

    (Pre-Finals)Event-Driven Programming Mocktest BSIT 505

    59問 • 4ヶ月前
    Xai Alexandrei Delos Reyes

    (Pre-finals) Application Development Mocktest BSIT 505

    (Pre-finals) Application Development Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 41問 · 4ヶ月前

    (Pre-finals) Application Development Mocktest BSIT 505

    (Pre-finals) Application Development Mocktest BSIT 505

    41問 • 4ヶ月前
    Xai Alexandrei Delos Reyes

    (Pre-Finals) Data and Digital Communication Mocktest BSIT 505

    (Pre-Finals) Data and Digital Communication Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 57問 · 4ヶ月前

    (Pre-Finals) Data and Digital Communication Mocktest BSIT 505

    (Pre-Finals) Data and Digital Communication Mocktest BSIT 505

    57問 • 4ヶ月前
    Xai Alexandrei Delos Reyes

    (Pre-Finals) ASIA Mocktest BSIT 505

    (Pre-Finals) ASIA Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 44問 · 4ヶ月前

    (Pre-Finals) ASIA Mocktest BSIT 505

    (Pre-Finals) ASIA Mocktest BSIT 505

    44問 • 4ヶ月前
    Xai Alexandrei Delos Reyes

    (Pre-Finals) Advanced Database Systems Mocktest BSIT 505

    (Pre-Finals) Advanced Database Systems Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 72問 · 4ヶ月前

    (Pre-Finals) Advanced Database Systems Mocktest BSIT 505

    (Pre-Finals) Advanced Database Systems Mocktest BSIT 505

    72問 • 4ヶ月前
    Xai Alexandrei Delos Reyes

    (Pre-Finals) Enterprise Architecture Mocktest BSIT 505

    (Pre-Finals) Enterprise Architecture Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 42問 · 4ヶ月前

    (Pre-Finals) Enterprise Architecture Mocktest BSIT 505

    (Pre-Finals) Enterprise Architecture Mocktest BSIT 505

    42問 • 4ヶ月前
    Xai Alexandrei Delos Reyes

    (Finals) Application Development Mocktest BSIT 505

    (Finals) Application Development Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 62問 · 3ヶ月前

    (Finals) Application Development Mocktest BSIT 505

    (Finals) Application Development Mocktest BSIT 505

    62問 • 3ヶ月前
    Xai Alexandrei Delos Reyes

    (Finals) Data and Digital Communication Mocktest BSIT - 505

    (Finals) Data and Digital Communication Mocktest BSIT - 505

    Xai Alexandrei Delos Reyes · 61問 · 3ヶ月前

    (Finals) Data and Digital Communication Mocktest BSIT - 505

    (Finals) Data and Digital Communication Mocktest BSIT - 505

    61問 • 3ヶ月前
    Xai Alexandrei Delos Reyes

    (Finals) Advanced Database Systems Mocktest BSIT 505

    (Finals) Advanced Database Systems Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 62問 · 3ヶ月前

    (Finals) Advanced Database Systems Mocktest BSIT 505

    (Finals) Advanced Database Systems Mocktest BSIT 505

    62問 • 3ヶ月前
    Xai Alexandrei Delos Reyes

    (Finals) Enterprise Architecture Mocktest BSIT 505

    (Finals) Enterprise Architecture Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 60問 · 3ヶ月前

    (Finals) Enterprise Architecture Mocktest BSIT 505

    (Finals) Enterprise Architecture Mocktest BSIT 505

    60問 • 3ヶ月前
    Xai Alexandrei Delos Reyes

    (Finals) Professional issues in Information Technology Mocktest BSIT 505

    (Finals) Professional issues in Information Technology Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 27問 · 3ヶ月前

    (Finals) Professional issues in Information Technology Mocktest BSIT 505

    (Finals) Professional issues in Information Technology Mocktest BSIT 505

    27問 • 3ヶ月前
    Xai Alexandrei Delos Reyes

    (Finals) Event-Driven Programming Mocktest BSIT 505

    (Finals) Event-Driven Programming Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 65問 · 4ヶ月前

    (Finals) Event-Driven Programming Mocktest BSIT 505

    (Finals) Event-Driven Programming Mocktest BSIT 505

    65問 • 4ヶ月前
    Xai Alexandrei Delos Reyes

    (Prelims) Mobile Systems and Technologies Mocktest BSIT 604

    (Prelims) Mobile Systems and Technologies Mocktest BSIT 604

    Xai Alexandrei Delos Reyes · 41回閲覧 · 42問 · 1ヶ月前

    (Prelims) Mobile Systems and Technologies Mocktest BSIT 604

    (Prelims) Mobile Systems and Technologies Mocktest BSIT 604

    41回閲覧 • 42問 • 1ヶ月前
    Xai Alexandrei Delos Reyes

    (Prelims) Great Books Mocktest BSIT 604

    (Prelims) Great Books Mocktest BSIT 604

    Xai Alexandrei Delos Reyes · 46回閲覧 · 75問 · 1ヶ月前

    (Prelims) Great Books Mocktest BSIT 604

    (Prelims) Great Books Mocktest BSIT 604

    46回閲覧 • 75問 • 1ヶ月前
    Xai Alexandrei Delos Reyes

    (Prelims) Management Information Systems Mocktest BSIT - 604

    (Prelims) Management Information Systems Mocktest BSIT - 604

    Xai Alexandrei Delos Reyes · 70回閲覧 · 94問 · 1ヶ月前

    (Prelims) Management Information Systems Mocktest BSIT - 604

    (Prelims) Management Information Systems Mocktest BSIT - 604

    70回閲覧 • 94問 • 1ヶ月前
    Xai Alexandrei Delos Reyes

    (Prelims) Programming Languages Mocktest BSIT 604

    (Prelims) Programming Languages Mocktest BSIT 604

    Xai Alexandrei Delos Reyes · 26回閲覧 · 79問 · 1ヶ月前

    (Prelims) Programming Languages Mocktest BSIT 604

    (Prelims) Programming Languages Mocktest BSIT 604

    26回閲覧 • 79問 • 1ヶ月前
    Xai Alexandrei Delos Reyes

    (Prelims) Web Systems and Technologies Mocktest BSIT 604

    (Prelims) Web Systems and Technologies Mocktest BSIT 604

    Xai Alexandrei Delos Reyes · 33回閲覧 · 99問 · 26日前

    (Prelims) Web Systems and Technologies Mocktest BSIT 604

    (Prelims) Web Systems and Technologies Mocktest BSIT 604

    33回閲覧 • 99問 • 26日前
    Xai Alexandrei Delos Reyes

    (Prelims) Information Assurance and Security Mocktest BSIT 604

    (Prelims) Information Assurance and Security Mocktest BSIT 604

    Xai Alexandrei Delos Reyes · 33回閲覧 · 92問 · 25日前

    (Prelims) Information Assurance and Security Mocktest BSIT 604

    (Prelims) Information Assurance and Security Mocktest BSIT 604

    33回閲覧 • 92問 • 25日前
    Xai Alexandrei Delos Reyes

    (Midterms) Mobile Systems and Technologies Mocktest BSIT 604

    (Midterms) Mobile Systems and Technologies Mocktest BSIT 604

    Xai Alexandrei Delos Reyes · 54問 · 14日前

    (Midterms) Mobile Systems and Technologies Mocktest BSIT 604

    (Midterms) Mobile Systems and Technologies Mocktest BSIT 604

    54問 • 14日前
    Xai Alexandrei Delos Reyes

    (Midterm) Great Books Mocktest BSIT 604

    (Midterm) Great Books Mocktest BSIT 604

    Xai Alexandrei Delos Reyes · 74問 · 8日前

    (Midterm) Great Books Mocktest BSIT 604

    (Midterm) Great Books Mocktest BSIT 604

    74問 • 8日前
    Xai Alexandrei Delos Reyes

    (Midterms) 04 to 05_Handout Management Information Systems Mocktest BSIT 604

    (Midterms) 04 to 05_Handout Management Information Systems Mocktest BSIT 604

    Xai Alexandrei Delos Reyes · 76問 · 1日前

    (Midterms) 04 to 05_Handout Management Information Systems Mocktest BSIT 604

    (Midterms) 04 to 05_Handout Management Information Systems Mocktest BSIT 604

    76問 • 1日前
    Xai Alexandrei Delos Reyes

    (Midterms) 06_Handout Management Information Systems Mocktest BSIT 604

    (Midterms) 06_Handout Management Information Systems Mocktest BSIT 604

    Xai Alexandrei Delos Reyes · 36問 · 1日前

    (Midterms) 06_Handout Management Information Systems Mocktest BSIT 604

    (Midterms) 06_Handout Management Information Systems Mocktest BSIT 604

    36問 • 1日前
    Xai Alexandrei Delos Reyes

    (Midterms) Information Assurance and Security Mocktest BSIT 604

    (Midterms) Information Assurance and Security Mocktest BSIT 604

    Xai Alexandrei Delos Reyes · 84問 · 1日前

    (Midterms) Information Assurance and Security Mocktest BSIT 604

    (Midterms) Information Assurance and Security Mocktest BSIT 604

    84問 • 1日前
    Xai Alexandrei Delos Reyes

    (Midterms) Programming Languages Mocktest BSIT 604

    (Midterms) Programming Languages Mocktest BSIT 604

    Xai Alexandrei Delos Reyes · 81問 · 10時間前

    (Midterms) Programming Languages Mocktest BSIT 604

    (Midterms) Programming Languages Mocktest BSIT 604

    81問 • 10時間前
    Xai Alexandrei Delos Reyes

    (Midterms) Web Systems an Technologies Mocktest BSIT 604

    (Midterms) Web Systems an Technologies Mocktest BSIT 604

    Xai Alexandrei Delos Reyes · 30問 · 4時間前

    (Midterms) Web Systems an Technologies Mocktest BSIT 604

    (Midterms) Web Systems an Technologies Mocktest BSIT 604

    30問 • 4時間前
    Xai Alexandrei Delos Reyes

    問題一覧

  • 1

    It is committed in cyberspace using information and communication technologies such as televisions, smartphones, computers, networks, and other communication devices

    Cybercrime

  • 2

    These are offenses committed with or without technology but increased their reach using such technologies. These cybercrimes are also described as “technology-as-instrument” offenses.

    Cyber-Enabled Offenses

  • 3

    refers to obtaining or possessing another’s identity and information to commit a legal offense.

    Identity theft

  • 4

    refers to the fraudulent impersonation of someone to gain an advantage, obtain property, cause a disadvantage, or avoid prosecution.

    Identity fraud

  • 5

    refers to luring users to log onto a fake website that appears real to gather sensitive information, such as the user’s password, account number, ATM PIN, and credit card.

    Phishing

  • 6

    Online tools and social media applications are used to harass, intimidate, or embarrass another person or other identifiable groups.

    Cyberbullying and Online Harassment

  • 7

    Which of the following are the Cyber-Enabled Offenses

    Identity theft, Identity fraud, Phishing, Cyberbullying and Online Harassment

  • 8

    These are offenses that are strictly committed using information and communication technologies. Cyber-dependent crimes target network systems and data confidentiality, integrity, and availability.

    Cyber-Dependent Offenses

  • 9

    It refers to someone manipulating a computer system or private network to access digital files or systems without proper authorization.

    Hacking

  • 10

    refers to gaining logical or physical entry to a network, data, website, program, or another system, without proper authorization or credentials

    Unauthorized access

  • 11

    refers to inserting, removing, or altering data without proper authorization

    Modification of data

  • 12

    refers to disrupting the transmission or communication of data.

    Impairment of data

  • 13

    refers to the unauthorized access and alteration in the data transmission between machines for personal or financial gain.

    Interception of data

  • 14

    refers to the unauthorized use of company files, systems, computers, and networks to damage the company's properties.

    Misuse of assets

  • 15

    These are attacks that use computers against other computers or networks to modify, steal, or gain information through unauthorized access. An insider or an outsider can initiate an attack.

    Cyber-attack

  • 16

    an attack from inside the security perimeter, also called “insider.”

    Inside attack

  • 17

    an attack from outside the security perimeter or the system, also called “outsider.”

    Outside attack

  • 18

    or malicious software- is software-based hacking and cyber-attacking tools. The difference between malware and software is that malware is intentionally malicious.

    Malware

  • 19

    This is designed to spread from one program to another, which can self-replicate. When it is executed, it replicates itself by changing other computer programs, documents, or boot sectors.

    Virus

  • 20

    Unlike viruses, this standalone malware replicates itself without human intervention. It uses a computer network to spread itself by depending on the security failures of the targeted computer to access it

    Worm

  • 21

    It appears as a legitimate program when downloaded to a computer. It can be found on file-sharing sites, email attachments, sketchy websites, and hacked Wi-Fi networks.

    Trojan

  • 22

    It sends massive amounts of unsolicited commercial emails to illegally acquired email addresses. While this is illegal, these programs are not fundamentally destructive.

    Spammer

  • 23

    used to perform illegal activities such as creating malicious pop-up advertisements, capturing banking login details, and taking screenshots of the visited websites.

    Spyware

  • 24

    These offenses deal with the illegal use of computers for data storage, documentation, and communication. These offenses are instances wherein the use of the computer or network is not vital to the actual crime but may still be legally relevant to be considered as evidence or as an accessory to the crim

    Computer/Cyber-Supported Offenses

  • 25

    These are considered cyberterrorism, an umbrella term for unlawful offenses that commit terrorist activities or engage in terrorism against computers, networks, and the information stored therein. It is the conjunction of terrorism and cyberspace.

    National Security Offenses

  • 26

    sudden invasive attacks targeting computer information systems, networks, infrastructure, or personal electronic devices.

    Incursion

  • 27

    an umbrella term for destroying digital data where it becomes unreadable, inaccessible, or susceptible to unauthorized purposes

    Destruction

  • 28

    refers to the intentional dissemination of false information to mislead, confuse, or manipulate an audience.

    Disinformation

  • 29

    refers to the intentional dissemination of false information to mislead, confuse, or manipulate an audience.

    Disinformation

  • 30

    refers to malicious attempts from multiple machines to disrupt computer networks by temporarily or indefinitely making them inaccessible.

    Distributed Denial of Service (DDoS)

  • 31

    refers to malicious attacks targeting websites to replace their content with the attacker’s message. These offenses convey political or religious messages, profanity, and other inappropriate content.

    Defacement of Websites

  • 32

    What is the Punishment for Any person or group found liable for any of the offenses in Cyber- enabled, and Cyber-enabled offenses?

    prision mayor which is six (6) years and one (1) day to 12 years of imprisonment or a fine of at least P200,000.

  • 33

    What is the Punishment for any person found liable for offenses of Misuse of Assets is punished with prision mayor or a fine of not more than P500,000 or both.

    punished with prision mayor or a fine of not more than P500,000 or both.

  • 34

    What is the Punishment for offenses in Cyber-enabled offenses are committed against critical infrastructure?

    reclusion temporal which is 12 years and 1 day to 20 years of imprisonment, or a fine of at least P500,000 up to the equal amount of the damages is imposed.

  • 35

    What is the Punishment if the person is found liable for Computer/Cyber-Supported and National Security Offenses?

    imprisonment one (1) degree lower than the advised penalty for the offense or a fine of at least P100,000 but not exceeding P500,000 or both is imposed

  • 36

    It is securing computer systems, networks, and programs from any cyber-attack. It is one of the fastest-growing global challenges that is becoming increasingly important to address, with its enormous implications for government security, economic prosperity, and public safety.

    Cybersecurity

  • 37

    The technology of encrypting and decrypting information is called ____?

    cryptography

  • 38

    It takes plain text, such as a message or an email, and codes it into an unreadable format. It protects the user from illegal and unauthorized access and various malicious attacks.

    Encryption

  • 39

    What is another term for unencrypted data?

    plaintext

  • 40

    What is the other term for encrypted data?

    ciphertext

  • 41

    This is used to encode Encryption, which are part of specific algorithms.

    Encryption keys

  • 42

    This is used to make encrypted data readable again.

    decryption key

  • 43

    It is a technique to validate the identity of an end user or a computer program.

    Authentication

  • 44

    It assures good security as an individual’s physical and behavioral traits are permanent and unique. Unlike security keys and passwords, physical and behavioral traits are harder to lose and duplicate.

    Biometrics

  • 45

    It is the barrier between networks implemented in software, hardware, or cloud-based applications. It serves as the first line of defense utilized for blocking inbound specific packet types from reaching the protected network and for eliminating unauthorized data access to defend the network.

    Firewall

  • 46

    This is software for computers prevents, detects, and removes any malicious software. It helps users isolatethe infected file from cyber-attacks like ransomware, trojan horses, phishing, and DDoS attacks

    Virus Detection

  • 47

    What type of Phishing Detection is being described? "it targets the visual likeness of the phishing sites. The visual representations of the legitimate websites are stored in a database wherein the malicious website in question crosses the similarity threshold."

    Visual Similarity-Based Phishing Detection

  • 48

    What type of Phishing Detection is being described? "Most blacklist-based phishing detection technologies keeps a database of approved and unapproved URLs."

    Blacklist-Based Phishing Detection

  • 49

    What type of Phishing Detection is being described? "When the user visits a website, the first thing that this checks is whether the website link is in the DNS blacklist."

    Web Crawling-Based Phishing Attack Detection (WC-PAD)

  • 50

    Clients and partners expect extensive security to protect their data.

    Security Expectation

  • 51

    They expect organizations to adhere to lawful paths in achieving commercial goals.

    Organization Expectation

  • 52

    If organizations miss a new legal ruling, it could hurt the organization, its brand, and everyone involved.

    Damages

  • 53

    It is encouraged to be truthful and transparent in handling personal data by giving precise and timely reports and updates.

    Data Protection

  • 54

    It is stealing data from a company. IP involves ideas, design, artistic works, images, videos, symbols, and names that are assets to a company.

    IP Theft

  • 55

    It is stealing data from a company. IP involves ideas, design, artistic works, images, videos, symbols, and names that are assets to a company.

    IP Theft

  • 56

    it combines the benefits of data protection and cyber security needed for business operations in the current cyber threat landscape.

    Cyber Protection

  • 57

    which statement BEST DESCRIBES the difference between Cyber Protection and Cybersecurity

    Cyber Protection combines the benefits of data protection and cyber security needed for business operations in the current cyber threat landscape. Cybersecurity safeguards the systems that make data access, storage, transfer, and authentication possible instead of mainly focusing on data protection.

  • 58

    Which scope of Cyber Protection is being described? "This deals with ensuring that a reliable copy of the data and information is always available. "

    Safety

  • 59

    Which scope of Cyber Protection is being described? "This deals with ensuring that data and information are available from any location at any time"

    Accessibility

  • 60

    Which scope of Cyber Protection is being described? "This deals with ensuring full control and transparency over who can view and access the data and information"

    Privacy

  • 61

    Which scope of Cyber Protection is being described? "It deals with ensuring that backed-up data and information is an exact and unmodified copy of the original data."

    Authenticity

  • 62

    Which scope of Cyber Protection is being described? "It deals with ensuring that data, information, apps, and systems are protected against cyber threats."

    Security