ログイン

IT- ICT Security

IT- ICT Security
48問 • 2年前
  • Anndrea S. Galupo
  • 通報

    問題一覧

  • 1

    It is defined as a risk that which can potentially harm computer systems and organization

    SECURITY THREAT

  • 2

    The cause of security threat could be _____ & ______.

    PHYSICAL AND NON-PHYSICAL

  • 3

    It is anything that leads to loss or corruption of data or physical damage to the hardware and/or infrastructure

    COMPUTER SYSTEM THREAT

  • 4

    It is a potential cause of an incident that may result in loss or physical damage to the computer systems.

    PHYSICAL THREAT

  • 5

    What are the 3 categories of Physical Threat?

    INTERNAL, EXTERNAL AND HUMAN

  • 6

    The threats include fire, unstable power supply, humidity in the rooms housing the hardware, etc.

    INTERNAL

  • 7

    These threats include Lightning, floods, earthquakes, etc

    EXTERNAL

  • 8

    These threats include theft, vandalism of the infrastructure and/or hardware, disruption, accidental or intentional errors.

    HUMAN

  • 9

    It target the software and data on the computer systems.

    NON-PHYSICAL THREAT

  • 10

    To protect computer systems from threats, an organization must have _______________ in place.

    LOGICAL SECURITY MEASURES

  • 11

    To protect against viruses, Trojans, worms, etc. an organization can use __________.

    ANTI-VIRUS SOFTWARE

  • 12

    Unauthorized access to computer system resources can be prevented by the use of _______________.

    AUTHENTICATION METHODS

  • 13

    It can be used to protect against denial of service attacks

    INTRUSION-DETECTION/ PREVENTION SYSTEMS

  • 14

    What are the 5 common computer security threats?

    INSTALLING UNVERIFIED SOFTWARE, MAN-IN-THE-MIDDLE ATTACKS, PHISHING & SPEAR PHISHING, LEAVING YOUR COMPUTER OR DEVICE UNATTENDED, VISITING WEBSITES WITHOUT SSL CERTIFICATES

  • 15

    When people don’t understand the ramifications of installing unverified software, they open their computer up to potential attacks.

    INSTALLING UNVERIFIED SOFTWARE

  • 16

    These are somewhat similar to someone secretly and directly listening to a phone conversation through wire tapping or picking up another landline in the house.

    MAN-IN-THE-MIDDLE ATTACKS

  • 17

    It is standard technology for securing an internet connection by encrypting data sent between a website and a browser (or between two servers).

    SECURE SOCKETS LAYER (SSL)

  • 18

    Just as buildings and houses have a street address, webpages also have unique addresses to help people locate them. On the Internet, these addresses are called _______.

    UNIFORM RESOURCE LOCATORS (URL)

  • 19

    These are notorious for trying to trick you into opening unknown attachments and links in emails.These attachments and links have the potential to add viruses and other malware to your system.

    PHISHING ATTACKS

  • 20

    It is a more advanced form of phishing. It is a specific and targeted attack on one or a select number of victims.

    SPEAR PHISHING

  • 21

    It is a phishing that attempts to scam masses of people.

    REGULAR PHISHING

  • 22

    It has been one of the highest-praised antivirus programs available over the years because it doesn’t slow down your system, and it’s free

    AVAST

  • 23

    If you’re looking for a paid antivirus option that comes with product support, we recommend ________ or ________. They’re both highly praised in the tech community and are powerful applications that keep up-to-date.

    TRENDMICRO OR ESET

  • 24

    A type of industrial espionage that is controlled by and benefits private companies.

    INDUSTRIAL ESPIONAGE

  • 25

    A type of industrial espionage that is governed by foreign states.

    ECONOMIC ESPIONAGE

  • 26

    What are data at risk of corporate espionage?

    TRADE SECRETS, CLIENT INFORMATION, FINANCIAL INFORMATION AND MARKETING INFORMATION

  • 27

    It generally means sensitive information about existing products or products under development. This information may help your rivals get a competitive advantage.

    TRADE SECRETS

  • 28

    Data about your clients, including their financial information, can be exploited to steal your business. Another possible scenario is leaking illegally acquired data to damage your company’s reputation.

    CLIENT INFORMATION

  • 29

    It is about your company can be used to offer better deals to your clients and partners, win bids, and even make better offers to your valuable employees.

    FINANCIAL INFORMATION

  • 30

    With this information, competitors can prepare a timely answer for your marketing campaigns and make them ineffective.

    MARKETING INFORMATION

  • 31

    These are hostile attempts to steal, compromise, change, or destroy information by gaining unauthorized access to an organization’s computer systems.

    CYBER ATTACKS

  • 32

    Deploying malware or hacking into existing software to gain access to sensitive data

    HACKING AND MALWARE

  • 33

    Imitating a trusted server to track valuable information or gain data through the transmission network.

    EAVESDROPPING

  • 34

    Embedding malicious code into applocations to interdere with internal command and exploit a database.

    SQL INJECTION

  • 35

    A fictional employee stealing data for other companies or governments.

    OUTSIDE AGENT

  • 36

    An employee illegally accessing confidential data for personal advantage.

    MALICIOUS EMPLOYEE

  • 37

    An employee who installs unauthorized applications, neglects password recommendations and fails to follow other security measures.

    CARELESS EMPLOYEE

  • 38

    Usually a former employee who wants to harm the company reputationally or using other means.

    DISGRUNTLED EMPLOYEE

  • 39

    Business partners or stakeholders who compromise security through neglect, misuse, or unauthorized access.

    CARELESS THIRD PARTY

  • 40

    Which of the following includes in the 7 high-profile industrial espionage cases?

    COCA-COLA, MONSANTO, GENERAL ELECTRIC AVIATION, AMAZON, TESLA, GOOGLE, VOLVO AND SCANIA

  • 41

    Which of the following includes in the 7 best practices to detect and prevent industrial espionage?

    CONDUCT A RISK ASSESSMENT, ESTABLISH AN EFFECTIVE SECURITY POLICY, MONITOR EMPLOYEE ACTIVITY, DEVELOP A RELIABLE INCIDENT RESPONSE PLAN, SECURE YOUR INFRASTRUCTURE, THINK OF YOUR EMPLOYEES SECURITY-WISE, MANAGE DATA ACCESS WISELY

  • 42

    Include guidelines for computer network access, describe the architecture of your network security environment, and explain how security rules are implemented within it.

    NETWORK SECURITY

  • 43

    Describe measures aimed at informing your personnel about your security procedures and mechanisms.

    SECURITY AWARENESS

  • 44

    Define procedures for proper employee onboarding and termination in terms of security

    EMPLOYEE ONBOARDING/ TERMINATION

  • 45

    Establish strict rules on how passwords must be created, stored, and managed in your organization.

    PASSWORD MANAGEMENT

  • 46

    Specify procedures for providing access to various categories of data and systems for regular, privileged, and remote users.

    ACCESS MANAGEMENT

  • 47

    Describe how your system activity is monitored, analyzed, and investigated.

    AUDIT AND ACCOUNTABILITY

  • 48

    Develop a plan for what your personnel will do if a cybersecurity incident is detected.

    INCIDENT RESPONSE

  • VITMOLOGY-PPT2

    VITMOLOGY-PPT2

    Anndrea S. Galupo · 22問 · 1年前

    VITMOLOGY-PPT2

    VITMOLOGY-PPT2

    22問 • 1年前
    Anndrea S. Galupo

    INTRODUCTION TO CRIMINALISTICS

    INTRODUCTION TO CRIMINALISTICS

    Anndrea S. Galupo · 100問 · 1年前

    INTRODUCTION TO CRIMINALISTICS

    INTRODUCTION TO CRIMINALISTICS

    100問 • 1年前
    Anndrea S. Galupo

    INTRODUCTION TO CRIMINALISTIC- PART 2

    INTRODUCTION TO CRIMINALISTIC- PART 2

    Anndrea S. Galupo · 39問 · 1年前

    INTRODUCTION TO CRIMINALISTIC- PART 2

    INTRODUCTION TO CRIMINALISTIC- PART 2

    39問 • 1年前
    Anndrea S. Galupo

    HRM- CHAPTER 5

    HRM- CHAPTER 5

    Anndrea S. Galupo · 64問 · 1年前

    HRM- CHAPTER 5

    HRM- CHAPTER 5

    64問 • 1年前
    Anndrea S. Galupo

    HRM- CHAPTER 6

    HRM- CHAPTER 6

    Anndrea S. Galupo · 14問 · 1年前

    HRM- CHAPTER 6

    HRM- CHAPTER 6

    14問 • 1年前
    Anndrea S. Galupo

    HRM- CHAPTER 7

    HRM- CHAPTER 7

    Anndrea S. Galupo · 52問 · 1年前

    HRM- CHAPTER 7

    HRM- CHAPTER 7

    52問 • 1年前
    Anndrea S. Galupo

    HRM- CHAPTER 8

    HRM- CHAPTER 8

    Anndrea S. Galupo · 38問 · 1年前

    HRM- CHAPTER 8

    HRM- CHAPTER 8

    38問 • 1年前
    Anndrea S. Galupo

    SBA CHAPTER 5

    SBA CHAPTER 5

    Anndrea S. Galupo · 35問 · 1年前

    SBA CHAPTER 5

    SBA CHAPTER 5

    35問 • 1年前
    Anndrea S. Galupo

    SBA CHAPTER 6

    SBA CHAPTER 6

    Anndrea S. Galupo · 23問 · 1年前

    SBA CHAPTER 6

    SBA CHAPTER 6

    23問 • 1年前
    Anndrea S. Galupo

    SBA CHAPTER 7

    SBA CHAPTER 7

    Anndrea S. Galupo · 11問 · 1年前

    SBA CHAPTER 7

    SBA CHAPTER 7

    11問 • 1年前
    Anndrea S. Galupo

    SBA- CHAPTER 8

    SBA- CHAPTER 8

    Anndrea S. Galupo · 17問 · 1年前

    SBA- CHAPTER 8

    SBA- CHAPTER 8

    17問 • 1年前
    Anndrea S. Galupo

    SBA- CHAPTER 9

    SBA- CHAPTER 9

    Anndrea S. Galupo · 7問 · 1年前

    SBA- CHAPTER 9

    SBA- CHAPTER 9

    7問 • 1年前
    Anndrea S. Galupo

    HRM- CHAPTER 1

    HRM- CHAPTER 1

    Anndrea S. Galupo · 31問 · 1年前

    HRM- CHAPTER 1

    HRM- CHAPTER 1

    31問 • 1年前
    Anndrea S. Galupo

    HRM- CHAPTER 2

    HRM- CHAPTER 2

    Anndrea S. Galupo · 61問 · 1年前

    HRM- CHAPTER 2

    HRM- CHAPTER 2

    61問 • 1年前
    Anndrea S. Galupo

    HRM- CHAPTER 3

    HRM- CHAPTER 3

    Anndrea S. Galupo · 13問 · 1年前

    HRM- CHAPTER 3

    HRM- CHAPTER 3

    13問 • 1年前
    Anndrea S. Galupo

    HRM- CHAPTER 4

    HRM- CHAPTER 4

    Anndrea S. Galupo · 37問 · 1年前

    HRM- CHAPTER 4

    HRM- CHAPTER 4

    37問 • 1年前
    Anndrea S. Galupo

    Taxation- Part 1

    Taxation- Part 1

    Anndrea S. Galupo · 66問 · 1年前

    Taxation- Part 1

    Taxation- Part 1

    66問 • 1年前
    Anndrea S. Galupo

    Taxation- Part 2

    Taxation- Part 2

    Anndrea S. Galupo · 45問 · 1年前

    Taxation- Part 2

    Taxation- Part 2

    45問 • 1年前
    Anndrea S. Galupo

    SBA- CHAPTER 1

    SBA- CHAPTER 1

    Anndrea S. Galupo · 30問 · 1年前

    SBA- CHAPTER 1

    SBA- CHAPTER 1

    30問 • 1年前
    Anndrea S. Galupo

    SBA- CHAPTER 2

    SBA- CHAPTER 2

    Anndrea S. Galupo · 24問 · 1年前

    SBA- CHAPTER 2

    SBA- CHAPTER 2

    24問 • 1年前
    Anndrea S. Galupo

    SBA- CHAPTER 3

    SBA- CHAPTER 3

    Anndrea S. Galupo · 35問 · 1年前

    SBA- CHAPTER 3

    SBA- CHAPTER 3

    35問 • 1年前
    Anndrea S. Galupo

    SBA- CHAPTER 4

    SBA- CHAPTER 4

    Anndrea S. Galupo · 13問 · 1年前

    SBA- CHAPTER 4

    SBA- CHAPTER 4

    13問 • 1年前
    Anndrea S. Galupo

    STS 301

    STS 301

    Anndrea S. Galupo · 42問 · 1年前

    STS 301

    STS 301

    42問 • 1年前
    Anndrea S. Galupo

    ASEAN-MODULE 1

    ASEAN-MODULE 1

    Anndrea S. Galupo · 73問 · 1年前

    ASEAN-MODULE 1

    ASEAN-MODULE 1

    73問 • 1年前
    Anndrea S. Galupo

    ASEAN - MODULE 2

    ASEAN - MODULE 2

    Anndrea S. Galupo · 46問 · 1年前

    ASEAN - MODULE 2

    ASEAN - MODULE 2

    46問 • 1年前
    Anndrea S. Galupo

    AIS

    AIS

    Anndrea S. Galupo · 30問 · 1年前

    AIS

    AIS

    30問 • 1年前
    Anndrea S. Galupo

    PURPOSIVE- CHAPTER 6

    PURPOSIVE- CHAPTER 6

    Anndrea S. Galupo · 47問 · 1年前

    PURPOSIVE- CHAPTER 6

    PURPOSIVE- CHAPTER 6

    47問 • 1年前
    Anndrea S. Galupo

    PURPOSIVE- CHAPTER 5.2

    PURPOSIVE- CHAPTER 5.2

    Anndrea S. Galupo · 28問 · 1年前

    PURPOSIVE- CHAPTER 5.2

    PURPOSIVE- CHAPTER 5.2

    28問 • 1年前
    Anndrea S. Galupo

    PUPOSIVE CHAPTERr 5.1

    PUPOSIVE CHAPTERr 5.1

    Anndrea S. Galupo · 22問 · 1年前

    PUPOSIVE CHAPTERr 5.1

    PUPOSIVE CHAPTERr 5.1

    22問 • 1年前
    Anndrea S. Galupo

    RIZAL- POEMS (10)

    RIZAL- POEMS (10)

    Anndrea S. Galupo · 14問 · 1年前

    RIZAL- POEMS (10)

    RIZAL- POEMS (10)

    14問 • 1年前
    Anndrea S. Galupo

    RIZAL- WOMEN (9)

    RIZAL- WOMEN (9)

    Anndrea S. Galupo · 10問 · 1年前

    RIZAL- WOMEN (9)

    RIZAL- WOMEN (9)

    10問 • 1年前
    Anndrea S. Galupo

    RIZAL- CENTURY HENCE (7)

    RIZAL- CENTURY HENCE (7)

    Anndrea S. Galupo · 8問 · 1年前

    RIZAL- CENTURY HENCE (7)

    RIZAL- CENTURY HENCE (7)

    8問 • 1年前
    Anndrea S. Galupo

    RIZAL- EL FILI(6)

    RIZAL- EL FILI(6)

    Anndrea S. Galupo · 28問 · 1年前

    RIZAL- EL FILI(6)

    RIZAL- EL FILI(6)

    28問 • 1年前
    Anndrea S. Galupo

    RIZAL- NOLI (5)

    RIZAL- NOLI (5)

    Anndrea S. Galupo · 36問 · 1年前

    RIZAL- NOLI (5)

    RIZAL- NOLI (5)

    36問 • 1年前
    Anndrea S. Galupo

    RIZAL- ANNOTATION (4)

    RIZAL- ANNOTATION (4)

    Anndrea S. Galupo · 12問 · 1年前

    RIZAL- ANNOTATION (4)

    RIZAL- ANNOTATION (4)

    12問 • 1年前
    Anndrea S. Galupo

    STS- CHAPTER 4

    STS- CHAPTER 4

    Anndrea S. Galupo · 37問 · 1年前

    STS- CHAPTER 4

    STS- CHAPTER 4

    37問 • 1年前
    Anndrea S. Galupo

    STS- CHAPTER 5

    STS- CHAPTER 5

    Anndrea S. Galupo · 36問 · 1年前

    STS- CHAPTER 5

    STS- CHAPTER 5

    36問 • 1年前
    Anndrea S. Galupo

    STS- CHAPTER 5- THE NANO WORLD

    STS- CHAPTER 5- THE NANO WORLD

    Anndrea S. Galupo · 11問 · 1年前

    STS- CHAPTER 5- THE NANO WORLD

    STS- CHAPTER 5- THE NANO WORLD

    11問 • 1年前
    Anndrea S. Galupo

    STS-CHAPTER 5- GENE THERAPY

    STS-CHAPTER 5- GENE THERAPY

    Anndrea S. Galupo · 25問 · 1年前

    STS-CHAPTER 5- GENE THERAPY

    STS-CHAPTER 5- GENE THERAPY

    25問 • 1年前
    Anndrea S. Galupo

    STS- CHAPTER 5- BIODIVERSITY AND CLIMATE CHANGE

    STS- CHAPTER 5- BIODIVERSITY AND CLIMATE CHANGE

    Anndrea S. Galupo · 12問 · 1年前

    STS- CHAPTER 5- BIODIVERSITY AND CLIMATE CHANGE

    STS- CHAPTER 5- BIODIVERSITY AND CLIMATE CHANGE

    12問 • 1年前
    Anndrea S. Galupo

    RIZAL I- (RIZAL LAW)

    RIZAL I- (RIZAL LAW)

    Anndrea S. Galupo · 13問 · 1年前

    RIZAL I- (RIZAL LAW)

    RIZAL I- (RIZAL LAW)

    13問 • 1年前
    Anndrea S. Galupo

    RIZAL II- (PHILIPPINES/WORLD IN THE 19TH CENTURY RIZAL'S CONTEXT)

    RIZAL II- (PHILIPPINES/WORLD IN THE 19TH CENTURY RIZAL'S CONTEXT)

    Anndrea S. Galupo · 19問 · 1年前

    RIZAL II- (PHILIPPINES/WORLD IN THE 19TH CENTURY RIZAL'S CONTEXT)

    RIZAL II- (PHILIPPINES/WORLD IN THE 19TH CENTURY RIZAL'S CONTEXT)

    19問 • 1年前
    Anndrea S. Galupo

    RIZAL III- (GENEOLOGY FAMILY EARLY EDUCATION)

    RIZAL III- (GENEOLOGY FAMILY EARLY EDUCATION)

    Anndrea S. Galupo · 50問 · 1年前

    RIZAL III- (GENEOLOGY FAMILY EARLY EDUCATION)

    RIZAL III- (GENEOLOGY FAMILY EARLY EDUCATION)

    50問 • 1年前
    Anndrea S. Galupo

    RIZAL IV- (RIZAL'S LIFE ATENEO UST)

    RIZAL IV- (RIZAL'S LIFE ATENEO UST)

    Anndrea S. Galupo · 22問 · 1年前

    RIZAL IV- (RIZAL'S LIFE ATENEO UST)

    RIZAL IV- (RIZAL'S LIFE ATENEO UST)

    22問 • 1年前
    Anndrea S. Galupo

    RIZAL V- (RIZAL'S TRAVEL ABROAD)

    RIZAL V- (RIZAL'S TRAVEL ABROAD)

    Anndrea S. Galupo · 24問 · 1年前

    RIZAL V- (RIZAL'S TRAVEL ABROAD)

    RIZAL V- (RIZAL'S TRAVEL ABROAD)

    24問 • 1年前
    Anndrea S. Galupo

    RIZAL VII- (RIZAL'S EXILE AND DEATH)

    RIZAL VII- (RIZAL'S EXILE AND DEATH)

    Anndrea S. Galupo · 14問 · 1年前

    RIZAL VII- (RIZAL'S EXILE AND DEATH)

    RIZAL VII- (RIZAL'S EXILE AND DEATH)

    14問 • 1年前
    Anndrea S. Galupo

    STS REVIEWER FOR MIDTERM- LESSON 1

    STS REVIEWER FOR MIDTERM- LESSON 1

    Anndrea S. Galupo · 25問 · 1年前

    STS REVIEWER FOR MIDTERM- LESSON 1

    STS REVIEWER FOR MIDTERM- LESSON 1

    25問 • 1年前
    Anndrea S. Galupo

    STS REVIEWER FOR MIDTERM- LESSON 2 (PART I)

    STS REVIEWER FOR MIDTERM- LESSON 2 (PART I)

    Anndrea S. Galupo · 37問 · 1年前

    STS REVIEWER FOR MIDTERM- LESSON 2 (PART I)

    STS REVIEWER FOR MIDTERM- LESSON 2 (PART I)

    37問 • 1年前
    Anndrea S. Galupo

    STS REVIEWER FOR MIDTERM- LESSON 2 (PART II)

    STS REVIEWER FOR MIDTERM- LESSON 2 (PART II)

    Anndrea S. Galupo · 42問 · 1年前

    STS REVIEWER FOR MIDTERM- LESSON 2 (PART II)

    STS REVIEWER FOR MIDTERM- LESSON 2 (PART II)

    42問 • 1年前
    Anndrea S. Galupo

    STS REVIEWER FOR MIDTERM- LESSON 3

    STS REVIEWER FOR MIDTERM- LESSON 3

    Anndrea S. Galupo · 14問 · 1年前

    STS REVIEWER FOR MIDTERM- LESSON 3

    STS REVIEWER FOR MIDTERM- LESSON 3

    14問 • 1年前
    Anndrea S. Galupo

    PE

    PE

    Anndrea S. Galupo · 62問 · 1年前

    PE

    PE

    62問 • 1年前
    Anndrea S. Galupo

    AIS- INTRODUCTION TO TRANSACTION PROCESSING

    AIS- INTRODUCTION TO TRANSACTION PROCESSING

    Anndrea S. Galupo · 21問 · 1年前

    AIS- INTRODUCTION TO TRANSACTION PROCESSING

    AIS- INTRODUCTION TO TRANSACTION PROCESSING

    21問 • 1年前
    Anndrea S. Galupo

    AIS- EXPENDITURE CYCLE

    AIS- EXPENDITURE CYCLE

    Anndrea S. Galupo · 13問 · 1年前

    AIS- EXPENDITURE CYCLE

    AIS- EXPENDITURE CYCLE

    13問 • 1年前
    Anndrea S. Galupo

    AIS- REVENUE CYCLE II

    AIS- REVENUE CYCLE II

    Anndrea S. Galupo · 7問 · 1年前

    AIS- REVENUE CYCLE II

    AIS- REVENUE CYCLE II

    7問 • 1年前
    Anndrea S. Galupo

    AIS- REVENUE CYCLE I

    AIS- REVENUE CYCLE I

    Anndrea S. Galupo · 27問 · 1年前

    AIS- REVENUE CYCLE I

    AIS- REVENUE CYCLE I

    27問 • 1年前
    Anndrea S. Galupo

    AIS- OVERVIEW OF AIS

    AIS- OVERVIEW OF AIS

    Anndrea S. Galupo · 55問 · 1年前

    AIS- OVERVIEW OF AIS

    AIS- OVERVIEW OF AIS

    55問 • 1年前
    Anndrea S. Galupo

    CHAPTER 1- INTERMEDIATE ACCOUNTING

    CHAPTER 1- INTERMEDIATE ACCOUNTING

    Anndrea S. Galupo · 72問 · 2年前

    CHAPTER 1- INTERMEDIATE ACCOUNTING

    CHAPTER 1- INTERMEDIATE ACCOUNTING

    72問 • 2年前
    Anndrea S. Galupo

    CHAPTER 2- INTERMEDIATE ACCOUNTING

    CHAPTER 2- INTERMEDIATE ACCOUNTING

    Anndrea S. Galupo · 38問 · 2年前

    CHAPTER 2- INTERMEDIATE ACCOUNTING

    CHAPTER 2- INTERMEDIATE ACCOUNTING

    38問 • 2年前
    Anndrea S. Galupo

    CHAPTER 3- INTERMEDIATE ACCOUNTING

    CHAPTER 3- INTERMEDIATE ACCOUNTING

    Anndrea S. Galupo · 19問 · 2年前

    CHAPTER 3- INTERMEDIATE ACCOUNTING

    CHAPTER 3- INTERMEDIATE ACCOUNTING

    19問 • 2年前
    Anndrea S. Galupo

    CHAPTER 4- INTERMEDIATE ACCOUNTING

    CHAPTER 4- INTERMEDIATE ACCOUNTING

    Anndrea S. Galupo · 40問 · 2年前

    CHAPTER 4- INTERMEDIATE ACCOUNTING

    CHAPTER 4- INTERMEDIATE ACCOUNTING

    40問 • 2年前
    Anndrea S. Galupo

    PURPOSIVE COMMUNICATION- LESSON 4

    PURPOSIVE COMMUNICATION- LESSON 4

    Anndrea S. Galupo · 15問 · 1年前

    PURPOSIVE COMMUNICATION- LESSON 4

    PURPOSIVE COMMUNICATION- LESSON 4

    15問 • 1年前
    Anndrea S. Galupo

    PURPOSIVE COMMUNICATION- LESSON 3

    PURPOSIVE COMMUNICATION- LESSON 3

    Anndrea S. Galupo · 28問 · 1年前

    PURPOSIVE COMMUNICATION- LESSON 3

    PURPOSIVE COMMUNICATION- LESSON 3

    28問 • 1年前
    Anndrea S. Galupo

    PURPOSIVE COMMUNICATION- LESSON 2

    PURPOSIVE COMMUNICATION- LESSON 2

    Anndrea S. Galupo · 45問 · 1年前

    PURPOSIVE COMMUNICATION- LESSON 2

    PURPOSIVE COMMUNICATION- LESSON 2

    45問 • 1年前
    Anndrea S. Galupo

    PURPOSIVE COMMUNICATION

    PURPOSIVE COMMUNICATION

    Anndrea S. Galupo · 44問 · 2年前

    PURPOSIVE COMMUNICATION

    PURPOSIVE COMMUNICATION

    44問 • 2年前
    Anndrea S. Galupo

    PURPOSIVE COMMUNICATION (PART 2)

    PURPOSIVE COMMUNICATION (PART 2)

    Anndrea S. Galupo · 33問 · 2年前

    PURPOSIVE COMMUNICATION (PART 2)

    PURPOSIVE COMMUNICATION (PART 2)

    33問 • 2年前
    Anndrea S. Galupo

    QUIZ- (SCM)

    QUIZ- (SCM)

    Anndrea S. Galupo · 38問 · 2年前

    QUIZ- (SCM)

    QUIZ- (SCM)

    38問 • 2年前
    Anndrea S. Galupo

    REVIEWER

    REVIEWER

    Anndrea S. Galupo · 31問 · 2年前

    REVIEWER

    REVIEWER

    31問 • 2年前
    Anndrea S. Galupo

    MGT 209- CHAPTER 4

    MGT 209- CHAPTER 4

    Anndrea S. Galupo · 49問 · 2年前

    MGT 209- CHAPTER 4

    MGT 209- CHAPTER 4

    49問 • 2年前
    Anndrea S. Galupo

    MGT 209- CHAPTER 5

    MGT 209- CHAPTER 5

    Anndrea S. Galupo · 23問 · 2年前

    MGT 209- CHAPTER 5

    MGT 209- CHAPTER 5

    23問 • 2年前
    Anndrea S. Galupo

    MGT 209- CHAPTER 6

    MGT 209- CHAPTER 6

    Anndrea S. Galupo · 36問 · 2年前

    MGT 209- CHAPTER 6

    MGT 209- CHAPTER 6

    36問 • 2年前
    Anndrea S. Galupo

    MGT 209- CHAPTER 7

    MGT 209- CHAPTER 7

    Anndrea S. Galupo · 19問 · 2年前

    MGT 209- CHAPTER 7

    MGT 209- CHAPTER 7

    19問 • 2年前
    Anndrea S. Galupo

    ART APPRECIATION- LESSON 1

    ART APPRECIATION- LESSON 1

    Anndrea S. Galupo · 48問 · 2年前

    ART APPRECIATION- LESSON 1

    ART APPRECIATION- LESSON 1

    48問 • 2年前
    Anndrea S. Galupo

    ART APPRECIATION- LESSON 2

    ART APPRECIATION- LESSON 2

    Anndrea S. Galupo · 37問 · 2年前

    ART APPRECIATION- LESSON 2

    ART APPRECIATION- LESSON 2

    37問 • 2年前
    Anndrea S. Galupo

    ART APPRECIATION- LESSON 3

    ART APPRECIATION- LESSON 3

    Anndrea S. Galupo · 26問 · 2年前

    ART APPRECIATION- LESSON 3

    ART APPRECIATION- LESSON 3

    26問 • 2年前
    Anndrea S. Galupo

    ART APPRECIATION- LESSON 4

    ART APPRECIATION- LESSON 4

    Anndrea S. Galupo · 7問 · 2年前

    ART APPRECIATION- LESSON 4

    ART APPRECIATION- LESSON 4

    7問 • 2年前
    Anndrea S. Galupo

    ART APPRECIATION- UNIT 6- LESSON 2

    ART APPRECIATION- UNIT 6- LESSON 2

    Anndrea S. Galupo · 10問 · 2年前

    ART APPRECIATION- UNIT 6- LESSON 2

    ART APPRECIATION- UNIT 6- LESSON 2

    10問 • 2年前
    Anndrea S. Galupo

    ART APPRECIATION- UNIT 6- LESSON 3

    ART APPRECIATION- UNIT 6- LESSON 3

    Anndrea S. Galupo · 11問 · 2年前

    ART APPRECIATION- UNIT 6- LESSON 3

    ART APPRECIATION- UNIT 6- LESSON 3

    11問 • 2年前
    Anndrea S. Galupo

    IT- MS Access

    IT- MS Access

    Anndrea S. Galupo · 19問 · 2年前

    IT- MS Access

    IT- MS Access

    19問 • 2年前
    Anndrea S. Galupo

    IT- Digital Law and Ethics in Business

    IT- Digital Law and Ethics in Business

    Anndrea S. Galupo · 53問 · 2年前

    IT- Digital Law and Ethics in Business

    IT- Digital Law and Ethics in Business

    53問 • 2年前
    Anndrea S. Galupo

    CFAS-PAS 19

    CFAS-PAS 19

    Anndrea S. Galupo · 18問 · 2年前

    CFAS-PAS 19

    CFAS-PAS 19

    18問 • 2年前
    Anndrea S. Galupo

    CFAS- PAS 20

    CFAS- PAS 20

    Anndrea S. Galupo · 10問 · 2年前

    CFAS- PAS 20

    CFAS- PAS 20

    10問 • 2年前
    Anndrea S. Galupo

    CFAS PAS 21

    CFAS PAS 21

    Anndrea S. Galupo · 14問 · 2年前

    CFAS PAS 21

    CFAS PAS 21

    14問 • 2年前
    Anndrea S. Galupo

    ART APPRECIATION- UNIT 3 continuation

    ART APPRECIATION- UNIT 3 continuation

    Anndrea S. Galupo · 13問 · 2年前

    ART APPRECIATION- UNIT 3 continuation

    ART APPRECIATION- UNIT 3 continuation

    13問 • 2年前
    Anndrea S. Galupo

    ACCOUNTING PAS 1

    ACCOUNTING PAS 1

    Anndrea S. Galupo · 23問 · 2年前

    ACCOUNTING PAS 1

    ACCOUNTING PAS 1

    23問 • 2年前
    Anndrea S. Galupo

    ACCOUNTING- PAS 2

    ACCOUNTING- PAS 2

    Anndrea S. Galupo · 21問 · 2年前

    ACCOUNTING- PAS 2

    ACCOUNTING- PAS 2

    21問 • 2年前
    Anndrea S. Galupo

    ACCOUNTING- PAS 7

    ACCOUNTING- PAS 7

    Anndrea S. Galupo · 11問 · 2年前

    ACCOUNTING- PAS 7

    ACCOUNTING- PAS 7

    11問 • 2年前
    Anndrea S. Galupo

    ACCOUNTING- PAS 8

    ACCOUNTING- PAS 8

    Anndrea S. Galupo · 16問 · 2年前

    ACCOUNTING- PAS 8

    ACCOUNTING- PAS 8

    16問 • 2年前
    Anndrea S. Galupo

    ACCOUNTING- PAS 10

    ACCOUNTING- PAS 10

    Anndrea S. Galupo · 13問 · 2年前

    ACCOUNTING- PAS 10

    ACCOUNTING- PAS 10

    13問 • 2年前
    Anndrea S. Galupo

    ACCOUNTING- PAS 16

    ACCOUNTING- PAS 16

    Anndrea S. Galupo · 19問 · 2年前

    ACCOUNTING- PAS 16

    ACCOUNTING- PAS 16

    19問 • 2年前
    Anndrea S. Galupo

    ACCOUNTING- PAS 12

    ACCOUNTING- PAS 12

    Anndrea S. Galupo · 8問 · 2年前

    ACCOUNTING- PAS 12

    ACCOUNTING- PAS 12

    8問 • 2年前
    Anndrea S. Galupo

    FILI 101- YUNIT 2

    FILI 101- YUNIT 2

    Anndrea S. Galupo · 28問 · 2年前

    FILI 101- YUNIT 2

    FILI 101- YUNIT 2

    28問 • 2年前
    Anndrea S. Galupo

    問題一覧

  • 1

    It is defined as a risk that which can potentially harm computer systems and organization

    SECURITY THREAT

  • 2

    The cause of security threat could be _____ & ______.

    PHYSICAL AND NON-PHYSICAL

  • 3

    It is anything that leads to loss or corruption of data or physical damage to the hardware and/or infrastructure

    COMPUTER SYSTEM THREAT

  • 4

    It is a potential cause of an incident that may result in loss or physical damage to the computer systems.

    PHYSICAL THREAT

  • 5

    What are the 3 categories of Physical Threat?

    INTERNAL, EXTERNAL AND HUMAN

  • 6

    The threats include fire, unstable power supply, humidity in the rooms housing the hardware, etc.

    INTERNAL

  • 7

    These threats include Lightning, floods, earthquakes, etc

    EXTERNAL

  • 8

    These threats include theft, vandalism of the infrastructure and/or hardware, disruption, accidental or intentional errors.

    HUMAN

  • 9

    It target the software and data on the computer systems.

    NON-PHYSICAL THREAT

  • 10

    To protect computer systems from threats, an organization must have _______________ in place.

    LOGICAL SECURITY MEASURES

  • 11

    To protect against viruses, Trojans, worms, etc. an organization can use __________.

    ANTI-VIRUS SOFTWARE

  • 12

    Unauthorized access to computer system resources can be prevented by the use of _______________.

    AUTHENTICATION METHODS

  • 13

    It can be used to protect against denial of service attacks

    INTRUSION-DETECTION/ PREVENTION SYSTEMS

  • 14

    What are the 5 common computer security threats?

    INSTALLING UNVERIFIED SOFTWARE, MAN-IN-THE-MIDDLE ATTACKS, PHISHING & SPEAR PHISHING, LEAVING YOUR COMPUTER OR DEVICE UNATTENDED, VISITING WEBSITES WITHOUT SSL CERTIFICATES

  • 15

    When people don’t understand the ramifications of installing unverified software, they open their computer up to potential attacks.

    INSTALLING UNVERIFIED SOFTWARE

  • 16

    These are somewhat similar to someone secretly and directly listening to a phone conversation through wire tapping or picking up another landline in the house.

    MAN-IN-THE-MIDDLE ATTACKS

  • 17

    It is standard technology for securing an internet connection by encrypting data sent between a website and a browser (or between two servers).

    SECURE SOCKETS LAYER (SSL)

  • 18

    Just as buildings and houses have a street address, webpages also have unique addresses to help people locate them. On the Internet, these addresses are called _______.

    UNIFORM RESOURCE LOCATORS (URL)

  • 19

    These are notorious for trying to trick you into opening unknown attachments and links in emails.These attachments and links have the potential to add viruses and other malware to your system.

    PHISHING ATTACKS

  • 20

    It is a more advanced form of phishing. It is a specific and targeted attack on one or a select number of victims.

    SPEAR PHISHING

  • 21

    It is a phishing that attempts to scam masses of people.

    REGULAR PHISHING

  • 22

    It has been one of the highest-praised antivirus programs available over the years because it doesn’t slow down your system, and it’s free

    AVAST

  • 23

    If you’re looking for a paid antivirus option that comes with product support, we recommend ________ or ________. They’re both highly praised in the tech community and are powerful applications that keep up-to-date.

    TRENDMICRO OR ESET

  • 24

    A type of industrial espionage that is controlled by and benefits private companies.

    INDUSTRIAL ESPIONAGE

  • 25

    A type of industrial espionage that is governed by foreign states.

    ECONOMIC ESPIONAGE

  • 26

    What are data at risk of corporate espionage?

    TRADE SECRETS, CLIENT INFORMATION, FINANCIAL INFORMATION AND MARKETING INFORMATION

  • 27

    It generally means sensitive information about existing products or products under development. This information may help your rivals get a competitive advantage.

    TRADE SECRETS

  • 28

    Data about your clients, including their financial information, can be exploited to steal your business. Another possible scenario is leaking illegally acquired data to damage your company’s reputation.

    CLIENT INFORMATION

  • 29

    It is about your company can be used to offer better deals to your clients and partners, win bids, and even make better offers to your valuable employees.

    FINANCIAL INFORMATION

  • 30

    With this information, competitors can prepare a timely answer for your marketing campaigns and make them ineffective.

    MARKETING INFORMATION

  • 31

    These are hostile attempts to steal, compromise, change, or destroy information by gaining unauthorized access to an organization’s computer systems.

    CYBER ATTACKS

  • 32

    Deploying malware or hacking into existing software to gain access to sensitive data

    HACKING AND MALWARE

  • 33

    Imitating a trusted server to track valuable information or gain data through the transmission network.

    EAVESDROPPING

  • 34

    Embedding malicious code into applocations to interdere with internal command and exploit a database.

    SQL INJECTION

  • 35

    A fictional employee stealing data for other companies or governments.

    OUTSIDE AGENT

  • 36

    An employee illegally accessing confidential data for personal advantage.

    MALICIOUS EMPLOYEE

  • 37

    An employee who installs unauthorized applications, neglects password recommendations and fails to follow other security measures.

    CARELESS EMPLOYEE

  • 38

    Usually a former employee who wants to harm the company reputationally or using other means.

    DISGRUNTLED EMPLOYEE

  • 39

    Business partners or stakeholders who compromise security through neglect, misuse, or unauthorized access.

    CARELESS THIRD PARTY

  • 40

    Which of the following includes in the 7 high-profile industrial espionage cases?

    COCA-COLA, MONSANTO, GENERAL ELECTRIC AVIATION, AMAZON, TESLA, GOOGLE, VOLVO AND SCANIA

  • 41

    Which of the following includes in the 7 best practices to detect and prevent industrial espionage?

    CONDUCT A RISK ASSESSMENT, ESTABLISH AN EFFECTIVE SECURITY POLICY, MONITOR EMPLOYEE ACTIVITY, DEVELOP A RELIABLE INCIDENT RESPONSE PLAN, SECURE YOUR INFRASTRUCTURE, THINK OF YOUR EMPLOYEES SECURITY-WISE, MANAGE DATA ACCESS WISELY

  • 42

    Include guidelines for computer network access, describe the architecture of your network security environment, and explain how security rules are implemented within it.

    NETWORK SECURITY

  • 43

    Describe measures aimed at informing your personnel about your security procedures and mechanisms.

    SECURITY AWARENESS

  • 44

    Define procedures for proper employee onboarding and termination in terms of security

    EMPLOYEE ONBOARDING/ TERMINATION

  • 45

    Establish strict rules on how passwords must be created, stored, and managed in your organization.

    PASSWORD MANAGEMENT

  • 46

    Specify procedures for providing access to various categories of data and systems for regular, privileged, and remote users.

    ACCESS MANAGEMENT

  • 47

    Describe how your system activity is monitored, analyzed, and investigated.

    AUDIT AND ACCOUNTABILITY

  • 48

    Develop a plan for what your personnel will do if a cybersecurity incident is detected.

    INCIDENT RESPONSE