ログイン

chap 9
33問 • 1年前
  • Lydster Joy Baquero Alonzo
  • 通報

    問題一覧

  • 1

    Unauthorized access to sensitive business and customer data.

    Data Breaches

  • 2

    Falling victim to phishing attacks can damage a business reputation, customers may lose trust in the organization’s ability to protect their information.

    Reputational Damage

  • 3

    System Crashes, Slow Performance or Disabling Critical Services and Application

    Operational/Service Disruption

  • 4

    Through the theft of financial information, fraudulent transactions or ransom demands.

    Financial Loss

  • 5

    Inaccessible until ransom is paid. If backups are not available or compromised. Business may permanently lose data.

    Data Encryption & Loss

  • 6

    “malicious software” designed to disrupt, damage or gain unauthorized access to computer systems or networks.

    MALWARE

  • 7

    Primary goal of ___ is to compromise the security and integrity of system, steal sensitive information, enable unauthorized access, can be spread such as infected email attachments, compromised websites, malicious downloads, or removable media.

    MALWARE

  • 8

    MALWARE short for “___” designed to disrupt, damage or gain unauthorized access to computer systems or networks.

    malicious software

  • 9

    ___ rely on user action or human intervention to spread. Propagation: File sharing, email attachments, infected removable media (flash drive), executing infected programs.

    VIRUSES

  • 10

    ___ encrypts files or locks down computer systems, rendering them inaccessible to users until a ransom is paid.

    RANSOMWARE

  • 11

    ____ capture and record keystrokes made by a user’s, enabling attackers to obtain sensitive information, password, credit card details and other confidential data.

    KEYLOGGERS

  • 12

    ____ is a common tactic used by cybercriminals to trick individuals into revealing sensitive information, such as login credentials or financial details.

    PHISHING

  • 13

    (email or text messages) - requesting personal information such as account numbers, passwords, PIN or pretext account verification.

    BANKING & FINANCIAL SCAMS

  • 14

    (emails or advertisements) - these messages may offer exclusive deals or discounts. Enticing recipients to click on malicious links.

    ONLINE SHOPPING SCAMS

  • 15

    (emails sent to job seekers) – offering lucrative job opportunities with well-known companies or abroad. Requesting passport details, bank account for employment verification.

    JOB OFFER SCAMS

  • 16

    (target users of popular social media platforms) - victims receive messages that appear from the official support team, claiming account security issues or unauthorized access.

    SOCIAL MEDIA ACCOUNT COMPROMISES

  • 17

    (emails or messages) - impersonating government agencies in the Philippines are sent to individuals claiming urgent notifications, tax, refunds or penalties

    GOVERNMENT AGENCY SCAMS

  • 18

    ____ refers to risks posed by individuals within an organization who have authorized access to sensitive data and misuse it intentionally or inadvertently. This can include employees, contractors, or partners with access to critical systems or information.

    INSIDER THREAT

  • 19

    intentionally exploit their access privileges to carry out harmful activities. Include theft, unauthorized disclosure of sensitive data, sabotage of system.

    MALICIOUS INSIDERS

  • 20

    unknowingly or carelessly compromise security through their actions or lack of adherence to policies and procedures.

    NEGLIGENT INSIDERS

  • 21

    access credentials have been compromised, either through external hacking or insider collusion.

    COMPROMISED INSIDERS

  • 22

    ___ intentionally steal confidential information such as customer records, intellectual property, with the intention of selling or using it for personal gain or to benefit a competitor

    DATA THEFT

  • 23

    misuse their privilege access rights to gain unauthorized access to systems, database or accounts, potentially for malicious purpose.

    UNAUTHORIZED SYSTEM ACCESS

  • 24

    This can be motivated by revenge, dissatisfaction by revenge, dissatisfaction or as an act of protest.

    SABOTAGE

  • 25

    intentionally or unintentionally shares sensitive or confidential information with unauthorized individuals or the public such as social media, personal email accounts or communication channels.

    UNAUTHORIZED DISCLOSURE

  • 26

    accidentally sending confidential information to the wrong recipients, leaving sensitive documents unattended.

    NEGLIGENT DATA HANDLING

  • 27

    leverages human psychology to manipulate individuals into divulging sensitive information or performing actions that compromise security. It often involves impersonation, manipulation, or exploiting trust to gain unauthorized access.

    SOCIAL ENGINEERING

  • 28

    attackers make phone calls pretending to be from a trusted organization or authority.

    PHONE SCAMS

  • 29

    create fraudulent websites that resemble legitimate ones.

    FAKE WEBSITES

  • 30

    attackers pose as technical support, contact individuals claiming that their device is infected or experiencing issues.

    KEYLOGGERS

  • 31

    impersonate someone else to gain trust and deceive individuals.

    IMPERSONATION ATTACKS

  • 32

    leave physical or digital in public spaces like flash drive, CD or download links.

    BAITING

  • 33

    exploit people’s goodwill by creating fake charity organization.

    CHARITY SCAMS

  • exam

    exam

    Lydster Joy Baquero Alonzo · 24問 · 1年前

    exam

    exam

    24問 • 1年前
    Lydster Joy Baquero Alonzo

    exam..

    exam..

    Lydster Joy Baquero Alonzo · 21問 · 1年前

    exam..

    exam..

    21問 • 1年前
    Lydster Joy Baquero Alonzo

    exam...

    exam...

    Lydster Joy Baquero Alonzo · 24問 · 1年前

    exam...

    exam...

    24問 • 1年前
    Lydster Joy Baquero Alonzo

    lesson 8

    lesson 8

    Lydster Joy Baquero Alonzo · 20問 · 1年前

    lesson 8

    lesson 8

    20問 • 1年前
    Lydster Joy Baquero Alonzo

    noli me

    noli me

    Lydster Joy Baquero Alonzo · 31問 · 1年前

    noli me

    noli me

    31問 • 1年前
    Lydster Joy Baquero Alonzo

    el fili

    el fili

    Lydster Joy Baquero Alonzo · 20問 · 1年前

    el fili

    el fili

    20問 • 1年前
    Lydster Joy Baquero Alonzo

    exam

    exam

    Lydster Joy Baquero Alonzo · 24問 · 1年前

    exam

    exam

    24問 • 1年前
    Lydster Joy Baquero Alonzo

    exam.

    exam.

    Lydster Joy Baquero Alonzo · 14問 · 1年前

    exam.

    exam.

    14問 • 1年前
    Lydster Joy Baquero Alonzo

    exam....

    exam....

    Lydster Joy Baquero Alonzo · 20問 · 1年前

    exam....

    exam....

    20問 • 1年前
    Lydster Joy Baquero Alonzo

    p.e.

    p.e.

    Lydster Joy Baquero Alonzo · 37問 · 1年前

    p.e.

    p.e.

    37問 • 1年前
    Lydster Joy Baquero Alonzo

    chap 6

    chap 6

    Lydster Joy Baquero Alonzo · 7問 · 1年前

    chap 6

    chap 6

    7問 • 1年前
    Lydster Joy Baquero Alonzo

    chap 6

    chap 6

    Lydster Joy Baquero Alonzo · 18問 · 1年前

    chap 6

    chap 6

    18問 • 1年前
    Lydster Joy Baquero Alonzo

    chap 7

    chap 7

    Lydster Joy Baquero Alonzo · 9問 · 1年前

    chap 7

    chap 7

    9問 • 1年前
    Lydster Joy Baquero Alonzo

    chap 7

    chap 7

    Lydster Joy Baquero Alonzo · 54問 · 1年前

    chap 7

    chap 7

    54問 • 1年前
    Lydster Joy Baquero Alonzo

    chap 8

    chap 8

    Lydster Joy Baquero Alonzo · 60問 · 1年前

    chap 8

    chap 8

    60問 • 1年前
    Lydster Joy Baquero Alonzo

    chap 8. part 2

    chap 8. part 2

    Lydster Joy Baquero Alonzo · 49問 · 1年前

    chap 8. part 2

    chap 8. part 2

    49問 • 1年前
    Lydster Joy Baquero Alonzo

    chap 9

    chap 9

    Lydster Joy Baquero Alonzo · 44問 · 1年前

    chap 9

    chap 9

    44問 • 1年前
    Lydster Joy Baquero Alonzo

    chap 10

    chap 10

    Lydster Joy Baquero Alonzo · 30問 · 1年前

    chap 10

    chap 10

    30問 • 1年前
    Lydster Joy Baquero Alonzo

    chap 7

    chap 7

    Lydster Joy Baquero Alonzo · 32問 · 1年前

    chap 7

    chap 7

    32問 • 1年前
    Lydster Joy Baquero Alonzo

    chap 8

    chap 8

    Lydster Joy Baquero Alonzo · 46問 · 1年前

    chap 8

    chap 8

    46問 • 1年前
    Lydster Joy Baquero Alonzo

    chap 9

    chap 9

    Lydster Joy Baquero Alonzo · 34問 · 1年前

    chap 9

    chap 9

    34問 • 1年前
    Lydster Joy Baquero Alonzo

    chap 9

    chap 9

    Lydster Joy Baquero Alonzo · 24問 · 1年前

    chap 9

    chap 9

    24問 • 1年前
    Lydster Joy Baquero Alonzo

    chap 10

    chap 10

    Lydster Joy Baquero Alonzo · 27問 · 1年前

    chap 10

    chap 10

    27問 • 1年前
    Lydster Joy Baquero Alonzo

    chap11

    chap11

    Lydster Joy Baquero Alonzo · 26問 · 1年前

    chap11

    chap11

    26問 • 1年前
    Lydster Joy Baquero Alonzo

    chap 8

    chap 8

    Lydster Joy Baquero Alonzo · 19問 · 1年前

    chap 8

    chap 8

    19問 • 1年前
    Lydster Joy Baquero Alonzo

    oba

    oba

    Lydster Joy Baquero Alonzo · 30問 · 1年前

    oba

    oba

    30問 • 1年前
    Lydster Joy Baquero Alonzo

    obaa

    obaa

    Lydster Joy Baquero Alonzo · 12問 · 1年前

    obaa

    obaa

    12問 • 1年前
    Lydster Joy Baquero Alonzo

    chap 4

    chap 4

    Lydster Joy Baquero Alonzo · 15問 · 1年前

    chap 4

    chap 4

    15問 • 1年前
    Lydster Joy Baquero Alonzo

    chap 4.1

    chap 4.1

    Lydster Joy Baquero Alonzo · 24問 · 1年前

    chap 4.1

    chap 4.1

    24問 • 1年前
    Lydster Joy Baquero Alonzo

    chap3

    chap3

    Lydster Joy Baquero Alonzo · 46問 · 1年前

    chap3

    chap3

    46問 • 1年前
    Lydster Joy Baquero Alonzo

    chap 4

    chap 4

    Lydster Joy Baquero Alonzo · 25問 · 1年前

    chap 4

    chap 4

    25問 • 1年前
    Lydster Joy Baquero Alonzo

    chap 5

    chap 5

    Lydster Joy Baquero Alonzo · 18問 · 1年前

    chap 5

    chap 5

    18問 • 1年前
    Lydster Joy Baquero Alonzo

    問題一覧

  • 1

    Unauthorized access to sensitive business and customer data.

    Data Breaches

  • 2

    Falling victim to phishing attacks can damage a business reputation, customers may lose trust in the organization’s ability to protect their information.

    Reputational Damage

  • 3

    System Crashes, Slow Performance or Disabling Critical Services and Application

    Operational/Service Disruption

  • 4

    Through the theft of financial information, fraudulent transactions or ransom demands.

    Financial Loss

  • 5

    Inaccessible until ransom is paid. If backups are not available or compromised. Business may permanently lose data.

    Data Encryption & Loss

  • 6

    “malicious software” designed to disrupt, damage or gain unauthorized access to computer systems or networks.

    MALWARE

  • 7

    Primary goal of ___ is to compromise the security and integrity of system, steal sensitive information, enable unauthorized access, can be spread such as infected email attachments, compromised websites, malicious downloads, or removable media.

    MALWARE

  • 8

    MALWARE short for “___” designed to disrupt, damage or gain unauthorized access to computer systems or networks.

    malicious software

  • 9

    ___ rely on user action or human intervention to spread. Propagation: File sharing, email attachments, infected removable media (flash drive), executing infected programs.

    VIRUSES

  • 10

    ___ encrypts files or locks down computer systems, rendering them inaccessible to users until a ransom is paid.

    RANSOMWARE

  • 11

    ____ capture and record keystrokes made by a user’s, enabling attackers to obtain sensitive information, password, credit card details and other confidential data.

    KEYLOGGERS

  • 12

    ____ is a common tactic used by cybercriminals to trick individuals into revealing sensitive information, such as login credentials or financial details.

    PHISHING

  • 13

    (email or text messages) - requesting personal information such as account numbers, passwords, PIN or pretext account verification.

    BANKING & FINANCIAL SCAMS

  • 14

    (emails or advertisements) - these messages may offer exclusive deals or discounts. Enticing recipients to click on malicious links.

    ONLINE SHOPPING SCAMS

  • 15

    (emails sent to job seekers) – offering lucrative job opportunities with well-known companies or abroad. Requesting passport details, bank account for employment verification.

    JOB OFFER SCAMS

  • 16

    (target users of popular social media platforms) - victims receive messages that appear from the official support team, claiming account security issues or unauthorized access.

    SOCIAL MEDIA ACCOUNT COMPROMISES

  • 17

    (emails or messages) - impersonating government agencies in the Philippines are sent to individuals claiming urgent notifications, tax, refunds or penalties

    GOVERNMENT AGENCY SCAMS

  • 18

    ____ refers to risks posed by individuals within an organization who have authorized access to sensitive data and misuse it intentionally or inadvertently. This can include employees, contractors, or partners with access to critical systems or information.

    INSIDER THREAT

  • 19

    intentionally exploit their access privileges to carry out harmful activities. Include theft, unauthorized disclosure of sensitive data, sabotage of system.

    MALICIOUS INSIDERS

  • 20

    unknowingly or carelessly compromise security through their actions or lack of adherence to policies and procedures.

    NEGLIGENT INSIDERS

  • 21

    access credentials have been compromised, either through external hacking or insider collusion.

    COMPROMISED INSIDERS

  • 22

    ___ intentionally steal confidential information such as customer records, intellectual property, with the intention of selling or using it for personal gain or to benefit a competitor

    DATA THEFT

  • 23

    misuse their privilege access rights to gain unauthorized access to systems, database or accounts, potentially for malicious purpose.

    UNAUTHORIZED SYSTEM ACCESS

  • 24

    This can be motivated by revenge, dissatisfaction by revenge, dissatisfaction or as an act of protest.

    SABOTAGE

  • 25

    intentionally or unintentionally shares sensitive or confidential information with unauthorized individuals or the public such as social media, personal email accounts or communication channels.

    UNAUTHORIZED DISCLOSURE

  • 26

    accidentally sending confidential information to the wrong recipients, leaving sensitive documents unattended.

    NEGLIGENT DATA HANDLING

  • 27

    leverages human psychology to manipulate individuals into divulging sensitive information or performing actions that compromise security. It often involves impersonation, manipulation, or exploiting trust to gain unauthorized access.

    SOCIAL ENGINEERING

  • 28

    attackers make phone calls pretending to be from a trusted organization or authority.

    PHONE SCAMS

  • 29

    create fraudulent websites that resemble legitimate ones.

    FAKE WEBSITES

  • 30

    attackers pose as technical support, contact individuals claiming that their device is infected or experiencing issues.

    KEYLOGGERS

  • 31

    impersonate someone else to gain trust and deceive individuals.

    IMPERSONATION ATTACKS

  • 32

    leave physical or digital in public spaces like flash drive, CD or download links.

    BAITING

  • 33

    exploit people’s goodwill by creating fake charity organization.

    CHARITY SCAMS