ログイン

INFO. ASS. & SEC. 2
51問 • 11ヶ月前
  • Jamaica Rose Gilo
  • 通報

    問題一覧

  • 1

    These are actions on how to I terrupt/stop attacks, threats and vulnerabilities.

    IOC

  • 2

    It is an evidence that someone may have breached an org's network or endpoint.

    IOC

  • 3

    This forensic data doesn't just indicate a potential threat, it signals that an attack, such as malware, compromised credentials, or data exhilaration, has already occurred.

    IOC

  • 4

    4 EXAMPLES OF IOCs

    Unusual network traffic, Unknown files/process, Changes to file's integrity, Suspicious login patterns

  • 5

    Abnormal pattern of data flows

    Unusual network traffic

  • 6

    Happens when downloading files where files you chose to download doesn't matched the files being downloaded.

    Unknown files/process

  • 7

    Illegal modifying or stealing of files/data.

    Chnahes to file's integrity

  • 8

    Unusual pattern of entry

    Suspicious login patterns

  • 9

    Detectors of cyberattacks

    IOC

  • 10

    Importance of IOC in cyber security. There are 4, what are they?

    Detect malicious activity, Respond to threats quickly, Prevent future attacks, Strengthen overall security posture

  • 11

    3 types of IOC

    Network-Based, Host-Based, Email-Based

  • 12

    Forced entry on ports

    Network-Based IOC

  • 13

    traffic anomalies

    Network-Based IOC

  • 14

    Port scanning

    Network-Based IOC

  • 15

    File modifications

    Host-Based IOC

  • 16

    Registry chnages

    Host-Based IOC

  • 17

    Phishing attempts

    Email-Based IOC

  • 18

    Malicious attachments

    Email-Based IOC

  • 19

    The best way to interrupt unusual actions/attacks is.....

    Rebooting

  • 20

    TYPES OF MALWARES

    Virus, Worm, Trojan, Ransomware

  • 21

    Attached to files and spread

    Virus

  • 22

    Self-replicating programs

    Worms

  • 23

    Disguised as legitimate software

    Trojan

  • 24

    Encryptsdata for ransom

    Ransomware

  • 25

    4 MALWARE DELIVERY METHODS

    Phishing emails, Drive-by downloads, Flash drives, Exploit kits

  • 26

    Signs of Malware Infection

    Slow performance, Frequent crashes, Unexpected pop-ups, Unauthorized changes to files

  • 27

    Impacts of Malware Systems

    Data theft, System crashes, Financial losses, Reputational damage

  • 28

    Refers to abnormal patterns of data flow, such as unexpected spikes or unfamiliar sources, which could indicate a security breach, attack, or system malfunction.

    Unusual network traffic

  • 29

    Unfamiliar programs or files running on a system that may be malicious, indicating potential malware or unauthorized access.

    Unknown files/process

  • 30

    Occur when files are altered, deleted, or corrupted unexpectedly, which could indicate unauthorized access, malware activity, or data breaches

    Changes to file's integrity

  • 31

    Involve unusual login activities, such as multiple failed attempts, logins from unfamiliar locations, or access at odd times, which may indicate unauthorized access or an attempted security breach.

    Suspicious login patterns

  • 32

    Involves monitoring systems for signs of harmful actions, like unauthorized access, malware infections, or abnormal behavior, to prevent damage and secure data.

    Detect malicious activity

  • 33

    Involves taking immediate action to contain, mitigate, and resolve security incidents, minimizing damage and preventing further compromise of systems or data.

    Respond to threats quickly

  • 34

    Involves strengthening security measures, such as updating software, using firewalls, training users, and implementing proactive monitoring to reduce vulnerabilities and protect against new threats.

    Prevent future attacks

  • 35

    Enhancing an organization's defenses through a combination of updated policies, regular risk assessments, robust security tools, and employee training to better protect against potential threats.

    Strengthen overall security posture

  • 36

    Refers to programs or code designed to harm systems, networks, or users

    Malware

  • 37

    Occurs when a system or application runs slower than usual, often due to resource issues, malware, or network problems.

    Slow performance

  • 38

    Happen when a system or application unexpectedly stops working, often due to software bugs, hardware issues, or malware

    Frequent crashes

  • 39

    Intrusive windows or ads that appear without warning, often caused by malware or malicious websites.

    Unexpected pop-ups

  • 40

    Occur when files are modified, deleted, or accessed without permission, often indicating a security breach or malware infection.

    Unauthorized changes to files

  • 41

    Occurs when sensitive or personal information is accessed, stolen, or transferred without authorization, often for malicious purposes like identity theft or fraud.

    Data theft

  • 42

    Occur when a computer or application unexpectedly stops functioning, often due to software bugs, hardware failure, or malware.

    System crashes

  • 43

    Refer to the loss of money due to events like cyberattacks, fraud, system downtime, or legal fines, impacting an organization's profitability

    Financial losses

  • 44

    Refers to the harm caused to an organization's public image or trust, often resulting from security breaches, unethical behavior, or poor service.

    Reputational damage

  • 45

    can damage or disrupt systems and steal sensitive information.

    Malware attacks

  • 46

    involve tricking individuals into divulging confidential information by impersonating trustworthy entities.

    Phishing attacks

  • 47

    occur when a hacker intercepts communication between two parties to steal data or alter the messages

    MITM attacks

  • 48

    floods a system with excessive traffic, rendering it unavailable to legitimate users

    DOS attacks

  • 49

    amplify the impact of DoS attacks by using multiple systems to target a single victim

    DDOS attacks

  • 50

    exploit vulnerabilities in web applications to execute malicious SQL commands

    SQL injection attacks

  • 51

    involve injecting malicious scripts into web pages to exploit users' browsers

    XSS attacks

  • Networking 2 quiz1

    Networking 2 quiz1

    Jamaica Rose Gilo · 83問 · 1年前

    Networking 2 quiz1

    Networking 2 quiz1

    83問 • 1年前
    Jamaica Rose Gilo

    MIDTERM-IT 313

    MIDTERM-IT 313

    Jamaica Rose Gilo · 100問 · 1年前

    MIDTERM-IT 313

    MIDTERM-IT 313

    100問 • 1年前
    Jamaica Rose Gilo

    MIDTERM-IT 313

    MIDTERM-IT 313

    Jamaica Rose Gilo · 94問 · 1年前

    MIDTERM-IT 313

    MIDTERM-IT 313

    94問 • 1年前
    Jamaica Rose Gilo

    MIDTERM-IT 313

    MIDTERM-IT 313

    Jamaica Rose Gilo · 58問 · 1年前

    MIDTERM-IT 313

    MIDTERM-IT 313

    58問 • 1年前
    Jamaica Rose Gilo

    MIDTERM-APPDEV 3 CHAPTER 5

    MIDTERM-APPDEV 3 CHAPTER 5

    Jamaica Rose Gilo · 42問 · 1年前

    MIDTERM-APPDEV 3 CHAPTER 5

    MIDTERM-APPDEV 3 CHAPTER 5

    42問 • 1年前
    Jamaica Rose Gilo

    MIDTERM-APPDEV 3 CHAPTER 4

    MIDTERM-APPDEV 3 CHAPTER 4

    Jamaica Rose Gilo · 48問 · 1年前

    MIDTERM-APPDEV 3 CHAPTER 4

    MIDTERM-APPDEV 3 CHAPTER 4

    48問 • 1年前
    Jamaica Rose Gilo

    MIDTERM-ADVANCED DBM C3 L2

    MIDTERM-ADVANCED DBM C3 L2

    Jamaica Rose Gilo · 97問 · 1年前

    MIDTERM-ADVANCED DBM C3 L2

    MIDTERM-ADVANCED DBM C3 L2

    97問 • 1年前
    Jamaica Rose Gilo

    Mga MALI mo!

    Mga MALI mo!

    Jamaica Rose Gilo · 29問 · 1年前

    Mga MALI mo!

    Mga MALI mo!

    29問 • 1年前
    Jamaica Rose Gilo

    INFO. ASSURANCE &SECURITY

    INFO. ASSURANCE &SECURITY

    Jamaica Rose Gilo · 100問 · 1年前

    INFO. ASSURANCE &SECURITY

    INFO. ASSURANCE &SECURITY

    100問 • 1年前
    Jamaica Rose Gilo

    INFO. ASSURANCE & SECURITY

    INFO. ASSURANCE & SECURITY

    Jamaica Rose Gilo · 33問 · 1年前

    INFO. ASSURANCE & SECURITY

    INFO. ASSURANCE & SECURITY

    33問 • 1年前
    Jamaica Rose Gilo

    3 BRANCHES OF THE PHIL. GOVERNMENT

    3 BRANCHES OF THE PHIL. GOVERNMENT

    Jamaica Rose Gilo · 20問 · 11ヶ月前

    3 BRANCHES OF THE PHIL. GOVERNMENT

    3 BRANCHES OF THE PHIL. GOVERNMENT

    20問 • 11ヶ月前
    Jamaica Rose Gilo

    ENVIRONMENTAL MANAGEMENT AND PROTECTION

    ENVIRONMENTAL MANAGEMENT AND PROTECTION

    Jamaica Rose Gilo · 16問 · 11ヶ月前

    ENVIRONMENTAL MANAGEMENT AND PROTECTION

    ENVIRONMENTAL MANAGEMENT AND PROTECTION

    16問 • 11ヶ月前
    Jamaica Rose Gilo

    ARTICLE VI-1987 CONST.

    ARTICLE VI-1987 CONST.

    Jamaica Rose Gilo · 16問 · 11ヶ月前

    ARTICLE VI-1987 CONST.

    ARTICLE VI-1987 CONST.

    16問 • 11ヶ月前
    Jamaica Rose Gilo

    ARTICLE 1-NATIONAL TERRITORY

    ARTICLE 1-NATIONAL TERRITORY

    Jamaica Rose Gilo · 10問 · 11ヶ月前

    ARTICLE 1-NATIONAL TERRITORY

    ARTICLE 1-NATIONAL TERRITORY

    10問 • 11ヶ月前
    Jamaica Rose Gilo

    ARTICLE II-DECLARATION FOR PRINCIPLES AND STATE POLICIES

    ARTICLE II-DECLARATION FOR PRINCIPLES AND STATE POLICIES

    Jamaica Rose Gilo · 11問 · 11ヶ月前

    ARTICLE II-DECLARATION FOR PRINCIPLES AND STATE POLICIES

    ARTICLE II-DECLARATION FOR PRINCIPLES AND STATE POLICIES

    11問 • 11ヶ月前
    Jamaica Rose Gilo

    ARTICLE III

    ARTICLE III

    Jamaica Rose Gilo · 6問 · 11ヶ月前

    ARTICLE III

    ARTICLE III

    6問 • 11ヶ月前
    Jamaica Rose Gilo

    BILL OF RIGHTS

    BILL OF RIGHTS

    Jamaica Rose Gilo · 20問 · 11ヶ月前

    BILL OF RIGHTS

    BILL OF RIGHTS

    20問 • 11ヶ月前
    Jamaica Rose Gilo

    PEACE & HUMAN RIGHTS ISSUES AND CONCEPTS

    PEACE & HUMAN RIGHTS ISSUES AND CONCEPTS

    Jamaica Rose Gilo · 8問 · 11ヶ月前

    PEACE & HUMAN RIGHTS ISSUES AND CONCEPTS

    PEACE & HUMAN RIGHTS ISSUES AND CONCEPTS

    8問 • 11ヶ月前
    Jamaica Rose Gilo

    RA 6713

    RA 6713

    Jamaica Rose Gilo · 9問 · 11ヶ月前

    RA 6713

    RA 6713

    9問 • 11ヶ月前
    Jamaica Rose Gilo

    MATH PROBLEMS AND BASIC OPERATIONS

    MATH PROBLEMS AND BASIC OPERATIONS

    Jamaica Rose Gilo · 62問 · 11ヶ月前

    MATH PROBLEMS AND BASIC OPERATIONS

    MATH PROBLEMS AND BASIC OPERATIONS

    62問 • 11ヶ月前
    Jamaica Rose Gilo

    問題一覧

  • 1

    These are actions on how to I terrupt/stop attacks, threats and vulnerabilities.

    IOC

  • 2

    It is an evidence that someone may have breached an org's network or endpoint.

    IOC

  • 3

    This forensic data doesn't just indicate a potential threat, it signals that an attack, such as malware, compromised credentials, or data exhilaration, has already occurred.

    IOC

  • 4

    4 EXAMPLES OF IOCs

    Unusual network traffic, Unknown files/process, Changes to file's integrity, Suspicious login patterns

  • 5

    Abnormal pattern of data flows

    Unusual network traffic

  • 6

    Happens when downloading files where files you chose to download doesn't matched the files being downloaded.

    Unknown files/process

  • 7

    Illegal modifying or stealing of files/data.

    Chnahes to file's integrity

  • 8

    Unusual pattern of entry

    Suspicious login patterns

  • 9

    Detectors of cyberattacks

    IOC

  • 10

    Importance of IOC in cyber security. There are 4, what are they?

    Detect malicious activity, Respond to threats quickly, Prevent future attacks, Strengthen overall security posture

  • 11

    3 types of IOC

    Network-Based, Host-Based, Email-Based

  • 12

    Forced entry on ports

    Network-Based IOC

  • 13

    traffic anomalies

    Network-Based IOC

  • 14

    Port scanning

    Network-Based IOC

  • 15

    File modifications

    Host-Based IOC

  • 16

    Registry chnages

    Host-Based IOC

  • 17

    Phishing attempts

    Email-Based IOC

  • 18

    Malicious attachments

    Email-Based IOC

  • 19

    The best way to interrupt unusual actions/attacks is.....

    Rebooting

  • 20

    TYPES OF MALWARES

    Virus, Worm, Trojan, Ransomware

  • 21

    Attached to files and spread

    Virus

  • 22

    Self-replicating programs

    Worms

  • 23

    Disguised as legitimate software

    Trojan

  • 24

    Encryptsdata for ransom

    Ransomware

  • 25

    4 MALWARE DELIVERY METHODS

    Phishing emails, Drive-by downloads, Flash drives, Exploit kits

  • 26

    Signs of Malware Infection

    Slow performance, Frequent crashes, Unexpected pop-ups, Unauthorized changes to files

  • 27

    Impacts of Malware Systems

    Data theft, System crashes, Financial losses, Reputational damage

  • 28

    Refers to abnormal patterns of data flow, such as unexpected spikes or unfamiliar sources, which could indicate a security breach, attack, or system malfunction.

    Unusual network traffic

  • 29

    Unfamiliar programs or files running on a system that may be malicious, indicating potential malware or unauthorized access.

    Unknown files/process

  • 30

    Occur when files are altered, deleted, or corrupted unexpectedly, which could indicate unauthorized access, malware activity, or data breaches

    Changes to file's integrity

  • 31

    Involve unusual login activities, such as multiple failed attempts, logins from unfamiliar locations, or access at odd times, which may indicate unauthorized access or an attempted security breach.

    Suspicious login patterns

  • 32

    Involves monitoring systems for signs of harmful actions, like unauthorized access, malware infections, or abnormal behavior, to prevent damage and secure data.

    Detect malicious activity

  • 33

    Involves taking immediate action to contain, mitigate, and resolve security incidents, minimizing damage and preventing further compromise of systems or data.

    Respond to threats quickly

  • 34

    Involves strengthening security measures, such as updating software, using firewalls, training users, and implementing proactive monitoring to reduce vulnerabilities and protect against new threats.

    Prevent future attacks

  • 35

    Enhancing an organization's defenses through a combination of updated policies, regular risk assessments, robust security tools, and employee training to better protect against potential threats.

    Strengthen overall security posture

  • 36

    Refers to programs or code designed to harm systems, networks, or users

    Malware

  • 37

    Occurs when a system or application runs slower than usual, often due to resource issues, malware, or network problems.

    Slow performance

  • 38

    Happen when a system or application unexpectedly stops working, often due to software bugs, hardware issues, or malware

    Frequent crashes

  • 39

    Intrusive windows or ads that appear without warning, often caused by malware or malicious websites.

    Unexpected pop-ups

  • 40

    Occur when files are modified, deleted, or accessed without permission, often indicating a security breach or malware infection.

    Unauthorized changes to files

  • 41

    Occurs when sensitive or personal information is accessed, stolen, or transferred without authorization, often for malicious purposes like identity theft or fraud.

    Data theft

  • 42

    Occur when a computer or application unexpectedly stops functioning, often due to software bugs, hardware failure, or malware.

    System crashes

  • 43

    Refer to the loss of money due to events like cyberattacks, fraud, system downtime, or legal fines, impacting an organization's profitability

    Financial losses

  • 44

    Refers to the harm caused to an organization's public image or trust, often resulting from security breaches, unethical behavior, or poor service.

    Reputational damage

  • 45

    can damage or disrupt systems and steal sensitive information.

    Malware attacks

  • 46

    involve tricking individuals into divulging confidential information by impersonating trustworthy entities.

    Phishing attacks

  • 47

    occur when a hacker intercepts communication between two parties to steal data or alter the messages

    MITM attacks

  • 48

    floods a system with excessive traffic, rendering it unavailable to legitimate users

    DOS attacks

  • 49

    amplify the impact of DoS attacks by using multiple systems to target a single victim

    DDOS attacks

  • 50

    exploit vulnerabilities in web applications to execute malicious SQL commands

    SQL injection attacks

  • 51

    involve injecting malicious scripts into web pages to exploit users' browsers

    XSS attacks