ログイン

(Pre-Finals) Professional Issues In Information Technolog Mocktest BSIT 505
62問 • 2ヶ月前
  • Xai Alexandrei Delos Reyes
  • 通報

    問題一覧

  • 1

    It is committed in cyberspace using information and communication technologies such as televisions, smartphones, computers, networks, and other communication devices

    Cybercrime

  • 2

    These are offenses committed with or without technology but increased their reach using such technologies. These cybercrimes are also described as “technology-as-instrument” offenses.

    Cyber-Enabled Offenses

  • 3

    refers to obtaining or possessing another’s identity and information to commit a legal offense.

    Identity theft

  • 4

    refers to the fraudulent impersonation of someone to gain an advantage, obtain property, cause a disadvantage, or avoid prosecution.

    Identity fraud

  • 5

    refers to luring users to log onto a fake website that appears real to gather sensitive information, such as the user’s password, account number, ATM PIN, and credit card.

    Phishing

  • 6

    Online tools and social media applications are used to harass, intimidate, or embarrass another person or other identifiable groups.

    Cyberbullying and Online Harassment

  • 7

    Which of the following are the Cyber-Enabled Offenses

    Identity theft, Identity fraud, Phishing, Cyberbullying and Online Harassment

  • 8

    These are offenses that are strictly committed using information and communication technologies. Cyber-dependent crimes target network systems and data confidentiality, integrity, and availability.

    Cyber-Dependent Offenses

  • 9

    It refers to someone manipulating a computer system or private network to access digital files or systems without proper authorization.

    Hacking

  • 10

    refers to gaining logical or physical entry to a network, data, website, program, or another system, without proper authorization or credentials

    Unauthorized access

  • 11

    refers to inserting, removing, or altering data without proper authorization

    Modification of data

  • 12

    refers to disrupting the transmission or communication of data.

    Impairment of data

  • 13

    refers to the unauthorized access and alteration in the data transmission between machines for personal or financial gain.

    Interception of data

  • 14

    refers to the unauthorized use of company files, systems, computers, and networks to damage the company's properties.

    Misuse of assets

  • 15

    These are attacks that use computers against other computers or networks to modify, steal, or gain information through unauthorized access. An insider or an outsider can initiate an attack.

    Cyber-attack

  • 16

    an attack from inside the security perimeter, also called “insider.”

    Inside attack

  • 17

    an attack from outside the security perimeter or the system, also called “outsider.”

    Outside attack

  • 18

    or malicious software- is software-based hacking and cyber-attacking tools. The difference between malware and software is that malware is intentionally malicious.

    Malware

  • 19

    This is designed to spread from one program to another, which can self-replicate. When it is executed, it replicates itself by changing other computer programs, documents, or boot sectors.

    Virus

  • 20

    Unlike viruses, this standalone malware replicates itself without human intervention. It uses a computer network to spread itself by depending on the security failures of the targeted computer to access it

    Worm

  • 21

    It appears as a legitimate program when downloaded to a computer. It can be found on file-sharing sites, email attachments, sketchy websites, and hacked Wi-Fi networks.

    Trojan

  • 22

    It sends massive amounts of unsolicited commercial emails to illegally acquired email addresses. While this is illegal, these programs are not fundamentally destructive.

    Spammer

  • 23

    used to perform illegal activities such as creating malicious pop-up advertisements, capturing banking login details, and taking screenshots of the visited websites.

    Spyware

  • 24

    These offenses deal with the illegal use of computers for data storage, documentation, and communication. These offenses are instances wherein the use of the computer or network is not vital to the actual crime but may still be legally relevant to be considered as evidence or as an accessory to the crim

    Computer/Cyber-Supported Offenses

  • 25

    These are considered cyberterrorism, an umbrella term for unlawful offenses that commit terrorist activities or engage in terrorism against computers, networks, and the information stored therein. It is the conjunction of terrorism and cyberspace.

    National Security Offenses

  • 26

    sudden invasive attacks targeting computer information systems, networks, infrastructure, or personal electronic devices.

    Incursion

  • 27

    an umbrella term for destroying digital data where it becomes unreadable, inaccessible, or susceptible to unauthorized purposes

    Destruction

  • 28

    refers to the intentional dissemination of false information to mislead, confuse, or manipulate an audience.

    Disinformation

  • 29

    refers to the intentional dissemination of false information to mislead, confuse, or manipulate an audience.

    Disinformation

  • 30

    refers to malicious attempts from multiple machines to disrupt computer networks by temporarily or indefinitely making them inaccessible.

    Distributed Denial of Service (DDoS)

  • 31

    refers to malicious attacks targeting websites to replace their content with the attacker’s message. These offenses convey political or religious messages, profanity, and other inappropriate content.

    Defacement of Websites

  • 32

    What is the Punishment for Any person or group found liable for any of the offenses in Cyber- enabled, and Cyber-enabled offenses?

    prision mayor which is six (6) years and one (1) day to 12 years of imprisonment or a fine of at least P200,000.

  • 33

    What is the Punishment for any person found liable for offenses of Misuse of Assets is punished with prision mayor or a fine of not more than P500,000 or both.

    punished with prision mayor or a fine of not more than P500,000 or both.

  • 34

    What is the Punishment for offenses in Cyber-enabled offenses are committed against critical infrastructure?

    reclusion temporal which is 12 years and 1 day to 20 years of imprisonment, or a fine of at least P500,000 up to the equal amount of the damages is imposed.

  • 35

    What is the Punishment if the person is found liable for Computer/Cyber-Supported and National Security Offenses?

    imprisonment one (1) degree lower than the advised penalty for the offense or a fine of at least P100,000 but not exceeding P500,000 or both is imposed

  • 36

    It is securing computer systems, networks, and programs from any cyber-attack. It is one of the fastest-growing global challenges that is becoming increasingly important to address, with its enormous implications for government security, economic prosperity, and public safety.

    Cybersecurity

  • 37

    The technology of encrypting and decrypting information is called ____?

    cryptography

  • 38

    It takes plain text, such as a message or an email, and codes it into an unreadable format. It protects the user from illegal and unauthorized access and various malicious attacks.

    Encryption

  • 39

    What is another term for unencrypted data?

    plaintext

  • 40

    What is the other term for encrypted data?

    ciphertext

  • 41

    This is used to encode Encryption, which are part of specific algorithms.

    Encryption keys

  • 42

    This is used to make encrypted data readable again.

    decryption key

  • 43

    It is a technique to validate the identity of an end user or a computer program.

    Authentication

  • 44

    It assures good security as an individual’s physical and behavioral traits are permanent and unique. Unlike security keys and passwords, physical and behavioral traits are harder to lose and duplicate.

    Biometrics

  • 45

    It is the barrier between networks implemented in software, hardware, or cloud-based applications. It serves as the first line of defense utilized for blocking inbound specific packet types from reaching the protected network and for eliminating unauthorized data access to defend the network.

    Firewall

  • 46

    This is software for computers prevents, detects, and removes any malicious software. It helps users isolatethe infected file from cyber-attacks like ransomware, trojan horses, phishing, and DDoS attacks

    Virus Detection

  • 47

    What type of Phishing Detection is being described? "it targets the visual likeness of the phishing sites. The visual representations of the legitimate websites are stored in a database wherein the malicious website in question crosses the similarity threshold."

    Visual Similarity-Based Phishing Detection

  • 48

    What type of Phishing Detection is being described? "Most blacklist-based phishing detection technologies keeps a database of approved and unapproved URLs."

    Blacklist-Based Phishing Detection

  • 49

    What type of Phishing Detection is being described? "When the user visits a website, the first thing that this checks is whether the website link is in the DNS blacklist."

    Web Crawling-Based Phishing Attack Detection (WC-PAD)

  • 50

    Clients and partners expect extensive security to protect their data.

    Security Expectation

  • 51

    They expect organizations to adhere to lawful paths in achieving commercial goals.

    Organization Expectation

  • 52

    If organizations miss a new legal ruling, it could hurt the organization, its brand, and everyone involved.

    Damages

  • 53

    It is encouraged to be truthful and transparent in handling personal data by giving precise and timely reports and updates.

    Data Protection

  • 54

    It is stealing data from a company. IP involves ideas, design, artistic works, images, videos, symbols, and names that are assets to a company.

    IP Theft

  • 55

    It is stealing data from a company. IP involves ideas, design, artistic works, images, videos, symbols, and names that are assets to a company.

    IP Theft

  • 56

    it combines the benefits of data protection and cyber security needed for business operations in the current cyber threat landscape.

    Cyber Protection

  • 57

    which statement BEST DESCRIBES the difference between Cyber Protection and Cybersecurity

    Cyber Protection combines the benefits of data protection and cyber security needed for business operations in the current cyber threat landscape. Cybersecurity safeguards the systems that make data access, storage, transfer, and authentication possible instead of mainly focusing on data protection.

  • 58

    Which scope of Cyber Protection is being described? "This deals with ensuring that a reliable copy of the data and information is always available. "

    Safety

  • 59

    Which scope of Cyber Protection is being described? "This deals with ensuring that data and information are available from any location at any time"

    Accessibility

  • 60

    Which scope of Cyber Protection is being described? "This deals with ensuring full control and transparency over who can view and access the data and information"

    Privacy

  • 61

    Which scope of Cyber Protection is being described? "It deals with ensuring that backed-up data and information is an exact and unmodified copy of the original data."

    Authenticity

  • 62

    Which scope of Cyber Protection is being described? "It deals with ensuring that data, information, apps, and systems are protected against cyber threats."

    Security

  • The Contemporary World Mock test (Prelims)

    The Contemporary World Mock test (Prelims)

    Xai Alexandrei Delos Reyes · 58問 · 2年前

    The Contemporary World Mock test (Prelims)

    The Contemporary World Mock test (Prelims)

    58問 • 2年前
    Xai Alexandrei Delos Reyes

    Computing Mock test (Prelims)

    Computing Mock test (Prelims)

    Xai Alexandrei Delos Reyes · 67問 · 2年前

    Computing Mock test (Prelims)

    Computing Mock test (Prelims)

    67問 • 2年前
    Xai Alexandrei Delos Reyes

    Programming Mock Test (Prelims)

    Programming Mock Test (Prelims)

    Xai Alexandrei Delos Reyes · 64問 · 2年前

    Programming Mock Test (Prelims)

    Programming Mock Test (Prelims)

    64問 • 2年前
    Xai Alexandrei Delos Reyes

    Entrepreneurship Mock Test (Prelims)

    Entrepreneurship Mock Test (Prelims)

    Xai Alexandrei Delos Reyes · 23問 · 2年前

    Entrepreneurship Mock Test (Prelims)

    Entrepreneurship Mock Test (Prelims)

    23問 • 2年前
    Xai Alexandrei Delos Reyes

    Computing Mock Test (Midterms) BSIT 107

    Computing Mock Test (Midterms) BSIT 107

    Xai Alexandrei Delos Reyes · 76問 · 2年前

    Computing Mock Test (Midterms) BSIT 107

    Computing Mock Test (Midterms) BSIT 107

    76問 • 2年前
    Xai Alexandrei Delos Reyes

    Math Mock Test (Prelims)

    Math Mock Test (Prelims)

    Xai Alexandrei Delos Reyes · 48問 · 2年前

    Math Mock Test (Prelims)

    Math Mock Test (Prelims)

    48問 • 2年前
    Xai Alexandrei Delos Reyes

    Programming Mock Test (Midterms) BSIT 107

    Programming Mock Test (Midterms) BSIT 107

    Xai Alexandrei Delos Reyes · 52問 · 2年前

    Programming Mock Test (Midterms) BSIT 107

    Programming Mock Test (Midterms) BSIT 107

    52問 • 2年前
    Xai Alexandrei Delos Reyes

    UTS Mock Test (Midterms) BSIT107

    UTS Mock Test (Midterms) BSIT107

    Xai Alexandrei Delos Reyes · 40問 · 2年前

    UTS Mock Test (Midterms) BSIT107

    UTS Mock Test (Midterms) BSIT107

    40問 • 2年前
    Xai Alexandrei Delos Reyes

    Entrepreneurship Mock Test (Midterms) BSIT 107

    Entrepreneurship Mock Test (Midterms) BSIT 107

    Xai Alexandrei Delos Reyes · 38問 · 2年前

    Entrepreneurship Mock Test (Midterms) BSIT 107

    Entrepreneurship Mock Test (Midterms) BSIT 107

    38問 • 2年前
    Xai Alexandrei Delos Reyes

    Contemporary World Mock Test (Midterms) BSIT 107

    Contemporary World Mock Test (Midterms) BSIT 107

    Xai Alexandrei Delos Reyes · 28問 · 2年前

    Contemporary World Mock Test (Midterms) BSIT 107

    Contemporary World Mock Test (Midterms) BSIT 107

    28問 • 2年前
    Xai Alexandrei Delos Reyes

    Math Mocktest (Midterms) BSIT 107

    Math Mocktest (Midterms) BSIT 107

    Xai Alexandrei Delos Reyes · 24問 · 2年前

    Math Mocktest (Midterms) BSIT 107

    Math Mocktest (Midterms) BSIT 107

    24問 • 2年前
    Xai Alexandrei Delos Reyes

    Computer Programming Mocktest (Pre-finals)

    Computer Programming Mocktest (Pre-finals)

    Xai Alexandrei Delos Reyes · 26問 · 2年前

    Computer Programming Mocktest (Pre-finals)

    Computer Programming Mocktest (Pre-finals)

    26問 • 2年前
    Xai Alexandrei Delos Reyes

    Math Mocktest (Pre-Finals)

    Math Mocktest (Pre-Finals)

    Xai Alexandrei Delos Reyes · 19問 · 2年前

    Math Mocktest (Pre-Finals)

    Math Mocktest (Pre-Finals)

    19問 • 2年前
    Xai Alexandrei Delos Reyes

    Computing Mock Test (Pre-finals)

    Computing Mock Test (Pre-finals)

    Xai Alexandrei Delos Reyes · 36問 · 2年前

    Computing Mock Test (Pre-finals)

    Computing Mock Test (Pre-finals)

    36問 • 2年前
    Xai Alexandrei Delos Reyes

    Computing Mock Test Finals

    Computing Mock Test Finals

    Xai Alexandrei Delos Reyes · 26問 · 2年前

    Computing Mock Test Finals

    Computing Mock Test Finals

    26問 • 2年前
    Xai Alexandrei Delos Reyes

    Comprog 2nd sem (prelims) BSIT 205

    Comprog 2nd sem (prelims) BSIT 205

    Xai Alexandrei Delos Reyes · 63問 · 1年前

    Comprog 2nd sem (prelims) BSIT 205

    Comprog 2nd sem (prelims) BSIT 205

    63問 • 1年前
    Xai Alexandrei Delos Reyes

    Discrete Math 2nd sem (prelims) BSIT 205

    Discrete Math 2nd sem (prelims) BSIT 205

    Xai Alexandrei Delos Reyes · 36問 · 1年前

    Discrete Math 2nd sem (prelims) BSIT 205

    Discrete Math 2nd sem (prelims) BSIT 205

    36問 • 1年前
    Xai Alexandrei Delos Reyes

    Art Appreciation (Prelim) BSIT 205

    Art Appreciation (Prelim) BSIT 205

    Xai Alexandrei Delos Reyes · 56問 · 1年前

    Art Appreciation (Prelim) BSIT 205

    Art Appreciation (Prelim) BSIT 205

    56問 • 1年前
    Xai Alexandrei Delos Reyes

    Ethics 2nd sem (Prelims) BSIT 205

    Ethics 2nd sem (Prelims) BSIT 205

    Xai Alexandrei Delos Reyes · 45問 · 1年前

    Ethics 2nd sem (Prelims) BSIT 205

    Ethics 2nd sem (Prelims) BSIT 205

    45問 • 1年前
    Xai Alexandrei Delos Reyes

    STS 2nd Sem (Prelim) BSIT 205

    STS 2nd Sem (Prelim) BSIT 205

    Xai Alexandrei Delos Reyes · 40問 · 1年前

    STS 2nd Sem (Prelim) BSIT 205

    STS 2nd Sem (Prelim) BSIT 205

    40問 • 1年前
    Xai Alexandrei Delos Reyes

    問題一覧

  • 1

    It is committed in cyberspace using information and communication technologies such as televisions, smartphones, computers, networks, and other communication devices

    Cybercrime

  • 2

    These are offenses committed with or without technology but increased their reach using such technologies. These cybercrimes are also described as “technology-as-instrument” offenses.

    Cyber-Enabled Offenses

  • 3

    refers to obtaining or possessing another’s identity and information to commit a legal offense.

    Identity theft

  • 4

    refers to the fraudulent impersonation of someone to gain an advantage, obtain property, cause a disadvantage, or avoid prosecution.

    Identity fraud

  • 5

    refers to luring users to log onto a fake website that appears real to gather sensitive information, such as the user’s password, account number, ATM PIN, and credit card.

    Phishing

  • 6

    Online tools and social media applications are used to harass, intimidate, or embarrass another person or other identifiable groups.

    Cyberbullying and Online Harassment

  • 7

    Which of the following are the Cyber-Enabled Offenses

    Identity theft, Identity fraud, Phishing, Cyberbullying and Online Harassment

  • 8

    These are offenses that are strictly committed using information and communication technologies. Cyber-dependent crimes target network systems and data confidentiality, integrity, and availability.

    Cyber-Dependent Offenses

  • 9

    It refers to someone manipulating a computer system or private network to access digital files or systems without proper authorization.

    Hacking

  • 10

    refers to gaining logical or physical entry to a network, data, website, program, or another system, without proper authorization or credentials

    Unauthorized access

  • 11

    refers to inserting, removing, or altering data without proper authorization

    Modification of data

  • 12

    refers to disrupting the transmission or communication of data.

    Impairment of data

  • 13

    refers to the unauthorized access and alteration in the data transmission between machines for personal or financial gain.

    Interception of data

  • 14

    refers to the unauthorized use of company files, systems, computers, and networks to damage the company's properties.

    Misuse of assets

  • 15

    These are attacks that use computers against other computers or networks to modify, steal, or gain information through unauthorized access. An insider or an outsider can initiate an attack.

    Cyber-attack

  • 16

    an attack from inside the security perimeter, also called “insider.”

    Inside attack

  • 17

    an attack from outside the security perimeter or the system, also called “outsider.”

    Outside attack

  • 18

    or malicious software- is software-based hacking and cyber-attacking tools. The difference between malware and software is that malware is intentionally malicious.

    Malware

  • 19

    This is designed to spread from one program to another, which can self-replicate. When it is executed, it replicates itself by changing other computer programs, documents, or boot sectors.

    Virus

  • 20

    Unlike viruses, this standalone malware replicates itself without human intervention. It uses a computer network to spread itself by depending on the security failures of the targeted computer to access it

    Worm

  • 21

    It appears as a legitimate program when downloaded to a computer. It can be found on file-sharing sites, email attachments, sketchy websites, and hacked Wi-Fi networks.

    Trojan

  • 22

    It sends massive amounts of unsolicited commercial emails to illegally acquired email addresses. While this is illegal, these programs are not fundamentally destructive.

    Spammer

  • 23

    used to perform illegal activities such as creating malicious pop-up advertisements, capturing banking login details, and taking screenshots of the visited websites.

    Spyware

  • 24

    These offenses deal with the illegal use of computers for data storage, documentation, and communication. These offenses are instances wherein the use of the computer or network is not vital to the actual crime but may still be legally relevant to be considered as evidence or as an accessory to the crim

    Computer/Cyber-Supported Offenses

  • 25

    These are considered cyberterrorism, an umbrella term for unlawful offenses that commit terrorist activities or engage in terrorism against computers, networks, and the information stored therein. It is the conjunction of terrorism and cyberspace.

    National Security Offenses

  • 26

    sudden invasive attacks targeting computer information systems, networks, infrastructure, or personal electronic devices.

    Incursion

  • 27

    an umbrella term for destroying digital data where it becomes unreadable, inaccessible, or susceptible to unauthorized purposes

    Destruction

  • 28

    refers to the intentional dissemination of false information to mislead, confuse, or manipulate an audience.

    Disinformation

  • 29

    refers to the intentional dissemination of false information to mislead, confuse, or manipulate an audience.

    Disinformation

  • 30

    refers to malicious attempts from multiple machines to disrupt computer networks by temporarily or indefinitely making them inaccessible.

    Distributed Denial of Service (DDoS)

  • 31

    refers to malicious attacks targeting websites to replace their content with the attacker’s message. These offenses convey political or religious messages, profanity, and other inappropriate content.

    Defacement of Websites

  • 32

    What is the Punishment for Any person or group found liable for any of the offenses in Cyber- enabled, and Cyber-enabled offenses?

    prision mayor which is six (6) years and one (1) day to 12 years of imprisonment or a fine of at least P200,000.

  • 33

    What is the Punishment for any person found liable for offenses of Misuse of Assets is punished with prision mayor or a fine of not more than P500,000 or both.

    punished with prision mayor or a fine of not more than P500,000 or both.

  • 34

    What is the Punishment for offenses in Cyber-enabled offenses are committed against critical infrastructure?

    reclusion temporal which is 12 years and 1 day to 20 years of imprisonment, or a fine of at least P500,000 up to the equal amount of the damages is imposed.

  • 35

    What is the Punishment if the person is found liable for Computer/Cyber-Supported and National Security Offenses?

    imprisonment one (1) degree lower than the advised penalty for the offense or a fine of at least P100,000 but not exceeding P500,000 or both is imposed

  • 36

    It is securing computer systems, networks, and programs from any cyber-attack. It is one of the fastest-growing global challenges that is becoming increasingly important to address, with its enormous implications for government security, economic prosperity, and public safety.

    Cybersecurity

  • 37

    The technology of encrypting and decrypting information is called ____?

    cryptography

  • 38

    It takes plain text, such as a message or an email, and codes it into an unreadable format. It protects the user from illegal and unauthorized access and various malicious attacks.

    Encryption

  • 39

    What is another term for unencrypted data?

    plaintext

  • 40

    What is the other term for encrypted data?

    ciphertext

  • 41

    This is used to encode Encryption, which are part of specific algorithms.

    Encryption keys

  • 42

    This is used to make encrypted data readable again.

    decryption key

  • 43

    It is a technique to validate the identity of an end user or a computer program.

    Authentication

  • 44

    It assures good security as an individual’s physical and behavioral traits are permanent and unique. Unlike security keys and passwords, physical and behavioral traits are harder to lose and duplicate.

    Biometrics

  • 45

    It is the barrier between networks implemented in software, hardware, or cloud-based applications. It serves as the first line of defense utilized for blocking inbound specific packet types from reaching the protected network and for eliminating unauthorized data access to defend the network.

    Firewall

  • 46

    This is software for computers prevents, detects, and removes any malicious software. It helps users isolatethe infected file from cyber-attacks like ransomware, trojan horses, phishing, and DDoS attacks

    Virus Detection

  • 47

    What type of Phishing Detection is being described? "it targets the visual likeness of the phishing sites. The visual representations of the legitimate websites are stored in a database wherein the malicious website in question crosses the similarity threshold."

    Visual Similarity-Based Phishing Detection

  • 48

    What type of Phishing Detection is being described? "Most blacklist-based phishing detection technologies keeps a database of approved and unapproved URLs."

    Blacklist-Based Phishing Detection

  • 49

    What type of Phishing Detection is being described? "When the user visits a website, the first thing that this checks is whether the website link is in the DNS blacklist."

    Web Crawling-Based Phishing Attack Detection (WC-PAD)

  • 50

    Clients and partners expect extensive security to protect their data.

    Security Expectation

  • 51

    They expect organizations to adhere to lawful paths in achieving commercial goals.

    Organization Expectation

  • 52

    If organizations miss a new legal ruling, it could hurt the organization, its brand, and everyone involved.

    Damages

  • 53

    It is encouraged to be truthful and transparent in handling personal data by giving precise and timely reports and updates.

    Data Protection

  • 54

    It is stealing data from a company. IP involves ideas, design, artistic works, images, videos, symbols, and names that are assets to a company.

    IP Theft

  • 55

    It is stealing data from a company. IP involves ideas, design, artistic works, images, videos, symbols, and names that are assets to a company.

    IP Theft

  • 56

    it combines the benefits of data protection and cyber security needed for business operations in the current cyber threat landscape.

    Cyber Protection

  • 57

    which statement BEST DESCRIBES the difference between Cyber Protection and Cybersecurity

    Cyber Protection combines the benefits of data protection and cyber security needed for business operations in the current cyber threat landscape. Cybersecurity safeguards the systems that make data access, storage, transfer, and authentication possible instead of mainly focusing on data protection.

  • 58

    Which scope of Cyber Protection is being described? "This deals with ensuring that a reliable copy of the data and information is always available. "

    Safety

  • 59

    Which scope of Cyber Protection is being described? "This deals with ensuring that data and information are available from any location at any time"

    Accessibility

  • 60

    Which scope of Cyber Protection is being described? "This deals with ensuring full control and transparency over who can view and access the data and information"

    Privacy

  • 61

    Which scope of Cyber Protection is being described? "It deals with ensuring that backed-up data and information is an exact and unmodified copy of the original data."

    Authenticity

  • 62

    Which scope of Cyber Protection is being described? "It deals with ensuring that data, information, apps, and systems are protected against cyber threats."

    Security