問題一覧
1
Threat
2
Natural, Unintentional, Intentional
3
Floods, Hurricanes, Tornadoes
4
Unintentional Threat
5
Spyware, Malware, Adware Companies, Actions of a disgruntled employee
6
harm to an organization
7
Exposure to an automated attack
8
May 12, 2017
9
WannaCry Ransomware
10
2017 Internet Security Threat Report
11
Worms, Viruses, WannaCry Ransomware
12
Ensure team members are informed on current trends in cyber security so that it will be easier for them to identify new threats. Perform regular threat assessments.
13
Perform regular threat assessments
14
Perform regular threat assessments
15
Vulnerability
16
Both intentional and unintentional threats
17
Automated Attackers
18
Quick Response
19
Understanding your vulnerabilities
20
I remembered
21
Risk
22
Financial Losses, Loss of Privacy, Reputational Damage, Legal Implications, Loss of Life
23
Creating and implementing risk management plan
24
Assess risk and determine needs. Include a total stakeholder perspective. Designate a central group of employees. Implement appropriate policies and related controls. Monitor and evaluate policy and control effectiveness.
25
Assess risk and determine needs
26
Include a total stakeholder perspective
27
Designate a central group of employees
28
Implement appropriate policies and related controls
29
Monitor and evaluate policy and control effectiveness
30
Threat
31
Intentional or Accidental
32
Malware, Phishing Attacks, DDOS, Data Breaches, Cryptojacking
33
Accidental Data Exposure, Misconfiguration, Lost Devices, Outdated Software, Weak Passwords, Human Error, Inadequate Security Training
34
I remembered
35
Physical Damage, Natural Events, Loss of Essential Services, Compromise of Information, Technical Failures, Compromise of Functions
36
Fire, Water, Pollution
37
Climatic, Seismic, Volcanic
38
Electrical Power, Air Conditioning, Telecommunication
39
Eavesdropping, Theft of Media, Retrieval of Discarded Materials
40
Equipment, Software, Capacity Saturation
41
Error in Use, Abuse of Rights, Denial of Actions
42
Spoofing Attack
43
Tampering
44
Repudiation Attack
45
Denial of Services
46
Elevation of Privileges
47
DOS
48
Theft
49
Substitution
50
Deletion
51
Loss
52
Involuntary Machine Slaughter
53
Involuntary Machine Slaughter
54
Voluntary Machine Slaughter
55
Machinicide
56
True
57
Theft or Destruction
58
locks, guards
59
600,000
60
True
61
enhance
62
Software is enhanced
63
Configuration Management
64
Configuration Management
65
Configuration Management
66
delete, modifications
67
Because it is susceptible to "off by one" errors
68
True
69
Logic Bomb
70
Extended Program Functioning
71
Trojan Horse, Virus, Trapdoor
72
Trojan Horse
73
Virus
74
Trapdoor
75
Software Theft
76
Hardware Security
77
Software Security
78
True
79
Data Attack
80
Principle of Adequate Protection
81
Principle of Adequate Protection
82
Unauthorized Disclosure
83
Unauthorized Modification
84
Denial of Authorized Access
85
Tapping wires, Planting bugs in output devices, Sifting through trash receptacles, Monitoring electromagnetic radiation, Bribing key employees, Inferring one data point from other values, Requesting the data
86
True
87
Data Integrity
88
Salami Attack
89
Salami Attack
90
Data Integrity
91
Identity Theft
92
I remembered
93
1,473, 2019, Identity Theft Resource Center's End-of-Year 2019 Data Breach Report, 17
94
July 2019
95
Phishing, Skimming, Wifi Hacking, Dumpster Diving, Phone Scams, Data Breaches, Malware, Mail Theft, Child ID Theft, Tax ID Theft
96
Steal your money or benefits. Sell it on the dark web. Impersonate you.
97
I remembered
98
I remembered
99
Criminal, Medical, Financial, Child Identity Theft, Synthetic Identity Theft
100
Criminal Identity Theft
Networking 2 quiz1
Networking 2 quiz1
Jamaica Rose Gilo · 83問 · 1年前Networking 2 quiz1
Networking 2 quiz1
83問 • 1年前MIDTERM-IT 313
MIDTERM-IT 313
Jamaica Rose Gilo · 100問 · 1年前MIDTERM-IT 313
MIDTERM-IT 313
100問 • 1年前MIDTERM-IT 313
MIDTERM-IT 313
Jamaica Rose Gilo · 94問 · 1年前MIDTERM-IT 313
MIDTERM-IT 313
94問 • 1年前MIDTERM-IT 313
MIDTERM-IT 313
Jamaica Rose Gilo · 58問 · 1年前MIDTERM-IT 313
MIDTERM-IT 313
58問 • 1年前MIDTERM-APPDEV 3 CHAPTER 5
MIDTERM-APPDEV 3 CHAPTER 5
Jamaica Rose Gilo · 42問 · 1年前MIDTERM-APPDEV 3 CHAPTER 5
MIDTERM-APPDEV 3 CHAPTER 5
42問 • 1年前MIDTERM-APPDEV 3 CHAPTER 4
MIDTERM-APPDEV 3 CHAPTER 4
Jamaica Rose Gilo · 48問 · 1年前MIDTERM-APPDEV 3 CHAPTER 4
MIDTERM-APPDEV 3 CHAPTER 4
48問 • 1年前MIDTERM-ADVANCED DBM C3 L2
MIDTERM-ADVANCED DBM C3 L2
Jamaica Rose Gilo · 97問 · 1年前MIDTERM-ADVANCED DBM C3 L2
MIDTERM-ADVANCED DBM C3 L2
97問 • 1年前Mga MALI mo!
Mga MALI mo!
Jamaica Rose Gilo · 29問 · 1年前Mga MALI mo!
Mga MALI mo!
29問 • 1年前INFO. ASSURANCE & SECURITY
INFO. ASSURANCE & SECURITY
Jamaica Rose Gilo · 33問 · 1年前INFO. ASSURANCE & SECURITY
INFO. ASSURANCE & SECURITY
33問 • 1年前3 BRANCHES OF THE PHIL. GOVERNMENT
3 BRANCHES OF THE PHIL. GOVERNMENT
Jamaica Rose Gilo · 20問 · 11ヶ月前3 BRANCHES OF THE PHIL. GOVERNMENT
3 BRANCHES OF THE PHIL. GOVERNMENT
20問 • 11ヶ月前ENVIRONMENTAL MANAGEMENT AND PROTECTION
ENVIRONMENTAL MANAGEMENT AND PROTECTION
Jamaica Rose Gilo · 16問 · 11ヶ月前ENVIRONMENTAL MANAGEMENT AND PROTECTION
ENVIRONMENTAL MANAGEMENT AND PROTECTION
16問 • 11ヶ月前ARTICLE VI-1987 CONST.
ARTICLE VI-1987 CONST.
Jamaica Rose Gilo · 16問 · 11ヶ月前ARTICLE VI-1987 CONST.
ARTICLE VI-1987 CONST.
16問 • 11ヶ月前ARTICLE 1-NATIONAL TERRITORY
ARTICLE 1-NATIONAL TERRITORY
Jamaica Rose Gilo · 10問 · 11ヶ月前ARTICLE 1-NATIONAL TERRITORY
ARTICLE 1-NATIONAL TERRITORY
10問 • 11ヶ月前ARTICLE II-DECLARATION FOR PRINCIPLES AND STATE POLICIES
ARTICLE II-DECLARATION FOR PRINCIPLES AND STATE POLICIES
Jamaica Rose Gilo · 11問 · 11ヶ月前ARTICLE II-DECLARATION FOR PRINCIPLES AND STATE POLICIES
ARTICLE II-DECLARATION FOR PRINCIPLES AND STATE POLICIES
11問 • 11ヶ月前ARTICLE III
ARTICLE III
Jamaica Rose Gilo · 6問 · 11ヶ月前ARTICLE III
ARTICLE III
6問 • 11ヶ月前BILL OF RIGHTS
BILL OF RIGHTS
Jamaica Rose Gilo · 20問 · 11ヶ月前BILL OF RIGHTS
BILL OF RIGHTS
20問 • 11ヶ月前PEACE & HUMAN RIGHTS ISSUES AND CONCEPTS
PEACE & HUMAN RIGHTS ISSUES AND CONCEPTS
Jamaica Rose Gilo · 8問 · 11ヶ月前PEACE & HUMAN RIGHTS ISSUES AND CONCEPTS
PEACE & HUMAN RIGHTS ISSUES AND CONCEPTS
8問 • 11ヶ月前RA 6713
RA 6713
Jamaica Rose Gilo · 9問 · 11ヶ月前RA 6713
RA 6713
9問 • 11ヶ月前MATH PROBLEMS AND BASIC OPERATIONS
MATH PROBLEMS AND BASIC OPERATIONS
Jamaica Rose Gilo · 62問 · 11ヶ月前MATH PROBLEMS AND BASIC OPERATIONS
MATH PROBLEMS AND BASIC OPERATIONS
62問 • 11ヶ月前問題一覧
1
Threat
2
Natural, Unintentional, Intentional
3
Floods, Hurricanes, Tornadoes
4
Unintentional Threat
5
Spyware, Malware, Adware Companies, Actions of a disgruntled employee
6
harm to an organization
7
Exposure to an automated attack
8
May 12, 2017
9
WannaCry Ransomware
10
2017 Internet Security Threat Report
11
Worms, Viruses, WannaCry Ransomware
12
Ensure team members are informed on current trends in cyber security so that it will be easier for them to identify new threats. Perform regular threat assessments.
13
Perform regular threat assessments
14
Perform regular threat assessments
15
Vulnerability
16
Both intentional and unintentional threats
17
Automated Attackers
18
Quick Response
19
Understanding your vulnerabilities
20
I remembered
21
Risk
22
Financial Losses, Loss of Privacy, Reputational Damage, Legal Implications, Loss of Life
23
Creating and implementing risk management plan
24
Assess risk and determine needs. Include a total stakeholder perspective. Designate a central group of employees. Implement appropriate policies and related controls. Monitor and evaluate policy and control effectiveness.
25
Assess risk and determine needs
26
Include a total stakeholder perspective
27
Designate a central group of employees
28
Implement appropriate policies and related controls
29
Monitor and evaluate policy and control effectiveness
30
Threat
31
Intentional or Accidental
32
Malware, Phishing Attacks, DDOS, Data Breaches, Cryptojacking
33
Accidental Data Exposure, Misconfiguration, Lost Devices, Outdated Software, Weak Passwords, Human Error, Inadequate Security Training
34
I remembered
35
Physical Damage, Natural Events, Loss of Essential Services, Compromise of Information, Technical Failures, Compromise of Functions
36
Fire, Water, Pollution
37
Climatic, Seismic, Volcanic
38
Electrical Power, Air Conditioning, Telecommunication
39
Eavesdropping, Theft of Media, Retrieval of Discarded Materials
40
Equipment, Software, Capacity Saturation
41
Error in Use, Abuse of Rights, Denial of Actions
42
Spoofing Attack
43
Tampering
44
Repudiation Attack
45
Denial of Services
46
Elevation of Privileges
47
DOS
48
Theft
49
Substitution
50
Deletion
51
Loss
52
Involuntary Machine Slaughter
53
Involuntary Machine Slaughter
54
Voluntary Machine Slaughter
55
Machinicide
56
True
57
Theft or Destruction
58
locks, guards
59
600,000
60
True
61
enhance
62
Software is enhanced
63
Configuration Management
64
Configuration Management
65
Configuration Management
66
delete, modifications
67
Because it is susceptible to "off by one" errors
68
True
69
Logic Bomb
70
Extended Program Functioning
71
Trojan Horse, Virus, Trapdoor
72
Trojan Horse
73
Virus
74
Trapdoor
75
Software Theft
76
Hardware Security
77
Software Security
78
True
79
Data Attack
80
Principle of Adequate Protection
81
Principle of Adequate Protection
82
Unauthorized Disclosure
83
Unauthorized Modification
84
Denial of Authorized Access
85
Tapping wires, Planting bugs in output devices, Sifting through trash receptacles, Monitoring electromagnetic radiation, Bribing key employees, Inferring one data point from other values, Requesting the data
86
True
87
Data Integrity
88
Salami Attack
89
Salami Attack
90
Data Integrity
91
Identity Theft
92
I remembered
93
1,473, 2019, Identity Theft Resource Center's End-of-Year 2019 Data Breach Report, 17
94
July 2019
95
Phishing, Skimming, Wifi Hacking, Dumpster Diving, Phone Scams, Data Breaches, Malware, Mail Theft, Child ID Theft, Tax ID Theft
96
Steal your money or benefits. Sell it on the dark web. Impersonate you.
97
I remembered
98
I remembered
99
Criminal, Medical, Financial, Child Identity Theft, Synthetic Identity Theft
100
Criminal Identity Theft