ログイン

(Midterms) Information Assurance and Security Mocktest BSIT 604

(Midterms) Information Assurance and Security Mocktest BSIT 604
84問 • 4日前
  • Xai Alexandrei Delos Reyes
  • 通報

    問題一覧

  • 1

    It is the potential occurrence of an undesirable event that can eventually damage and disrupt the operational and functional activities of an organization.

    Threat

  • 2

    Attackers use this to infiltrate and steal data such as personal information, financial information, and login credentials.

    Cyber Threats

  • 3

    Attackers can also use this to perform malicious activities and launch further attacks

    Compromised System

  • 4

    "Natural factors such as fires, floods, power failures, lightning, meteors, and earthquakes are potential threats to the assets of an organization. For example, these may cause severe physical damage to computer systems." Which threat source is being described?

    Natural Threats

  • 5

    "Threats that exist due to the potential for unintentional errors occurring within the organization. Examples include insider-originating security breaches, negligence, operator errors, unskilled administrators, lazy or untrained employees, and accidents." Which threat source is being described?

    Unintentional Threats

  • 6

    "These threats are performed by insiders within the organization, such as disgruntled or negligent employees, and harm the organization intentionally or unintentionally. Most of these attacks are performed by privileged users of the network." Which threat source is being described?

    Internal Threats

  • 7

    "These attacks are performed by exploiting vulnerabilities that already exist in a network, without the assistance of insider employees. For example, attacks can be performed with the objective of supporting a cause, by competitor companies for corporate espionage, and by countries for surveillance." Which threat source is being described?

    External Threats

  • 8

    "These attacks are Implemented by technically skilled attackers, using various tools to gain access to a network to disrupt services. The motivation behind such attacks includes criminal bribes, racism, politics, terrorism, etc. Examples include distributed ICMP floods, spoofing, and simultaneously executing attacks from multiple sources." Which threat source is being described?

    Structured External Threats

  • 9

    "Implemented by unskilled attackers, typically script kiddies who may be aspiring hackers, to access networks. Most of these attacks are performed primarily out of curiosity, rather than with criminal intentions. For example, untrained attackers use freely available online tools for attempting a network attack or for crashing a website or other public domains on the Internet." Which threat source is being described?

    Unstructured External Threats

  • 10

    It is a piece of malicious software that is designed to perform activities as intended by the attacker, without user consent. This may be in the form of executable code, active content, scripts, or other kinds of software.

    Malware

  • 11

    "A program in which malicious or harmful code is contained inside a harmless program or data, which can later gain control and cause damage, such as ruining the file allocation table on a hard disk." What type of Malware is being described?

    Trojan

  • 12

    Which is NOT a type of Trojan?

    Defacement Trojans, Remote Access Trojans, Backdoor Trojans, Rootkit Trojans, Botnet Trojans

  • 13

    Which statement BEST DESCRIBES how to prevent Trojans

    Users should avoid untrusted files, block unused ports, apply system patches, and limit software installations through permission controls. Regular scanning, integrity checks, and the use of antivirus, firewalls, and intrusion detection systems enhance overall protection.

  • 14

    "A self-replicating program that produces its code by attaching copies of itself to other executable code and operates without the knowledge or consent of the user." What type of Malware is being described?

    Virus

  • 15

    Select ALL Types of viruses

    System or Boot Sector Virus, File Virus, Multipartite Virus, Macro Virus, Cluster Virus, Stealth Virus

  • 16

    "A Standalone malicious programs that replicate, execute, and spread across network connections independently without human intervention." What type of Malware is being described?

    Computer Worms

  • 17

    Which statement BEST DESCRIBES how to counter Computer Worms?

    Users should install and regularly update antivirus software, avoid suspicious files and email attachments, perform data backups, and scan drives frequently. Additional measures include using pop-up blockers and firewalls, checking media for infections, running weekly cleanups, and being cautious with file types and instant messages.

  • 18

    "A type of malware that restricts access to the infected computer system or critical files and documents stored on it, and then demands an online ransom payment to the malware creator(s) to remove user restrictions." What type of Malware is being described?

    Ransomware

  • 19

    Select ALL Examples of Ransomware

    Dharma, SamSam, GandCrab, Ryuk, WannaCry

  • 20

    "Software programs designed to gain access to a computer without being detected. They are malware that help attackers gain unauthorized access to a remote system and perform malicious activities. The goal of a rootkit is to gain root privileges on a system." What type of Malware is being described?

    Rootkit

  • 21

    Which statement BEST DESCRIBES how to counter Defend against rootkits?

    Users should back up data, reinstall software from trusted sources, patch systems regularly, and use up-to-date antivirus software with rootkit protection. Additional safeguards include enforcing the least privilege principle, disabling unused services, using firewalls and two-step authentication, scanning systems periodically, and avoiding risky online behavior during active sessions.

  • 22

    "A stealthy computer monitoring software that allows secret recording of all user activities on a target computer. It automatically delivers logs to the remote attacker using the Internet (via email, FTP, command and control through encrypted traffic, HTTP, DNS, etc.)" What type of Malware is being described?

    Spyware

  • 23

    "Known as grayware/junkware, these are potentially harmful applications that may pose severe risks to the security and privacy of data stored in the system where they are installed" What type of Malware is being described?

    PUAs or Grayware: Potentially unwanted applications or programs

  • 24

    Select all the Types of PUAs

    Adware, Torrent, Marketing, Cryptomining, Dialer

  • 25

    Which statement BEST DESCRIBES how to counter Defend against PUAs?

    Users should download only from trusted sources, enable detection features in the OS or antivirus software, choose custom installation, and avoid express setup options. Regular updates, firewalls, cautious browsing habits, reading license agreements, and using reliable security tools help block unauthorized installations and prevent phishing-based downloads.

  • 26

    "A software programs or hardware device that record the keys struck on the computer keyboard (also called keystroke logging) of an individual computer user or a network of computers." What type of Malware is being described?

    Keylogger

  • 27

    "A collection of compromised computers connected to the Internet to perform a distributed task." What type of Malware is being described?

    Botnets

  • 28

    It refers to a program or an infected system that performs repetitive work or acts as an agent or as a user interface to control other programs

    Bot

  • 29

    Cyber-criminals who control bots are called

    Botmaster

  • 30

    "Also called non-malware, It infects legitimate software, applications, and other protocols existing in the system to perform various malicious activities. This type of malware leverages existing vulnerabilities to infect the system. It generally resides in the system’s RAM. It injects malicious code into running processes." What type of Malware is being described?

    Fileless Malware

  • 31

    Which statement BEST DESCRIBES how to counter Defend against Fileless Malware?

    Users should turn off unused tools like PowerShell, macros, and scripting in browsers, implement whitelisting and two-factor authentication, and monitor systems with User Behavior Analytics (UBA) and endpoint security. Regular system updates, antivirus scans, restricted privileges, behavioral baselining, and the use of AI-powered security tools or managed detection services further strengthen protection against memory-resident and script-based threats.

  • 32

    It refers to a weakness in the design or implementation of a system that can be exploited to compromise the security of the system. It is frequently a security loophole that enables an attacker to enter the system by bypassing user authentication.

    Vulnerability

  • 33

    This is the most common vulnerability and is mainly caused by human error, which allows attackers to gain unauthorized access to the system. It may happen intentionally or unintentionally and affect web servers, application platforms, databases, and networks.

    Misconfiguration

  • 34

    These are usually user-friendly, especially when the device is being used for the first time, when the primary concern is the usability of the device rather than the device’s security.

    Default Installations

  • 35

    These are common software vulnerabilities that happen due to coding errors that allow attackers to gain access to the target system.

    Buffer Overflows

  • 36

    An essential component of the infrastructure of any organization. There are several cases where organizations run unpatched and misconfigured servers that compromise the security and integrity of the data in their systems.

    Unpatched Servers

  • 37

    Vulnerabilities due to design flaws are universal to all operating devices and systems. Design vulnerabilities, such as incorrect encryption or poor validation of data, are logical flaws in the functionality of the system that attackers exploit to bypass the detection mechanism and acquire access to a secure system

    Design Flaws

  • 38

    Due to vulnerabilities in the operating systems, applications such as trojans, worms, and viruses pose threats. These attacks use malicious code, script, or unwanted software, which results in the loss of sensitive information and control of computer operations.

    Application Flaws

  • 39

    Open ports and services may lead to the loss of data or DoS attacks and allow attackers to perform further attacks on other connected devices. Administrators must continuously check for unnecessary or insecure ports and services to reduce the risk to the network.

    Open Services

  • 40

    Unknown vulnerabilities in software/hardware that are exposed but not yet patched. The attackers exploit these before being acknowledged and patched by the software developers or security analysts.

    Default Passwords

  • 41

    These are exposed from old or familiar code. However, they could cause costly data breaches for organizations. Using these outdated codes, attackers can easily discover zero-day vulnerabilities in the system or software that are not yet patched.

    Legacy Platform Vulnerabilities

  • 42

    This plays a major role in providing security to any organization’s resources and infrastructure from various internal and external threats.

    Vulnerability Assessment

  • 43

    Which statement is NOT TRUE about Vulnerability Assessment

    The attacker interacts directly with the target network to find vulnerabilities. This helps in simulating an attack on the target network to uncover vulnerabilities that the attacker can exploit.

  • 44

    "The attacker interacts directly with the target network to find vulnerabilities. Active scanning helps in simulating an attack on the target network to uncover vulnerabilities that the attacker can exploit." Which Vulnerability Assessment Approach is being described?

    Active Scanning

  • 45

    "The attacker tries to find vulnerabilities without directly interacting with the target network. The attacker identifies vulnerabilities via information exposed by systems during normal communication" Which Vulnerability Assessment Approach is being described?

    Passive Scanning

  • 46

    "A type of vulnerability assessment that uses network scanners to identify the hosts, services, and vulnerabilities present in a network. Active network scanners can reduce the intrusiveness of the checks they perform." Which Type of Vulnerability Assessment is being described?

    Active Assessment

  • 47

    "Passive assessments sniff the traffic present on the network to identify the active systems, network services, applications, and vulnerabilities. Passive assessments also provide a list of the users who are currently accessing the network." Which Type of Vulnerability Assessment is being described?

    Passive Assessment

  • 48

    "External assessment examines the network from a hacker’s point of view to identify exploits and vulnerabilities accessible to the outside world." Which Type of Vulnerability Assessment is being described?

    External Assessment

  • 49

    "This involves scrutinizing the internal network to find exploits and vulnerabilities." Which Type of Vulnerability Assessment is being described?

    Internal Assessment

  • 50

    "A type of security check that involves conducting a configuration-level check to identify system configurations, user directories, file systems, registry settings, and other parameters to evaluate the possibility of compromise." Which Type of Vulnerability Assessment is being described?

    Host-based Assessment

  • 51

    "This determines the possible network security attacks that may occur on an organization’s system. These assessments discover network resources and map the ports and services running to various areas of the network." Which Type of Vulnerability Assessment is being described?

    Network-based Assessment

  • 52

    "Focuses on transactional web applications, traditional client-server applications, and hybrid systems. It analyzes all elements of an application infrastructure, including deployment and communication with the client and server." Which Type of Vulnerability Assessment is being described?

    Application Assessment

  • 53

    "This is any assessment focused on testing the databases for the presence of any misconfiguration or known vulnerabilities. These assessments mainly concentrate on testing various database technologies like MYSQL, MSSQL, ORACLE, and POSTGRESQL to identify data exposure or injection-type vulnerabilities." Which Type of Vulnerability Assessment is being described?

    Database Assessment

  • 54

    "Determines the vulnerabilities in an organization’s wireless networks" Which Type of Vulnerability Assessment is being described?

    Wireless Network Assessment

  • 55

    "This type of assessment, employed by organizations that possess assets like servers and clients at different locations, involves simultaneously assessing the distributed organization assets, such as client and server applications, using appropriate synchronization techniques." Which Type of Vulnerability Assessment is being described?

    Distributed Assessment

  • 56

    "also known as authenticated assessment, wherein the security professional possesses the credentials of all machines present in the assessed network." Which Type of Vulnerability Assessment is being described?

    Credentialed Assessment

  • 57

    "also known as authenticated assessment, wherein the security professional possesses the credentials of all machines present in the assessed network." Which Type of Vulnerability Assessment is being described?

    Non-credentialed Assessment

  • 58

    "After performing footprinting and network scanning and obtaining crucial information, if the security professional performs manual research for exploring the vulnerabilities or weaknesses, they manually rank the vulnerabilities and score them by referring to vulnerability scoring standards like CVSS (Common Vulnerability Scoring System) and vulnerability databases like CVE (Common Vulnerabilities and Exposures) and CWE (Common Weakness Enumeration)." Which Type of Vulnerability Assessment is being described?

    Manual Assessment

  • 59

    "An assessment where a security professional uses vulnerability assessment tools such as Nessus, Qualys, or GFI LanGuard to perform a vulnerability assessment of the target is called an automated assessment." Which Type of Vulnerability Assessment is being described?

    Automated Assessment

  • 60

    It is an important process that helps identify and remediate security weaknesses before they can be exploited. The implementation of a vulnerability management lifecycle helps gain a strategic perspective regarding possible cybersecurity threats and renders insecure computing environments more resilient to attacks.

    Vulnerability-Management Cycle

  • 61

    "This phase identifies critical assets and prioritizes them to define the risk based on the criticality and value of each system." Which phase in vulnerability management is being described?

    Identify Assets and Create a Baseline

  • 62

    "This phase is very crucial in vulnerability management. In this step, the security analyst performs a vulnerability scan on the network to identify the known vulnerabilities in the organization’s infrastructure." Which phase in vulnerability management is being described?

    Vulnerability Scan

  • 63

    "The process of applying fixes to vulnerable systems in order to reduce the impact and severity of vulnerabilities. This phase is initiated after the successful implementation of the baseline and assessment steps" Which phase in vulnerability management is being described?

    Risk Assessment

  • 64

    "The process of applying fixes to vulnerable systems in order to reduce the impact and severity of vulnerabilities. This phase is initiated after the successful implementation of the baseline and assessment steps" Which phase in vulnerability management is being described?

    Remediation

  • 65

    "In this phase, the security team performs a re-scan of systems to assess if the required remediation is complete and whether the individual fixes have been applied to the impacted assets." Which phase in vulnerability management is being described?

    Verification

  • 66

    "Organizations need to perform regular monitoring to maintain system security. They use tools such as IDS/IPS and firewalls. Continuous monitoring identifies potential threats and any new vulnerabilities that have evolved. As per security best practices, all phases of vulnerability management must be performed regularly." Which phase in vulnerability management is being described?

    Monitor

  • 67

    It is the process of recovering passwords from the data transmitted by a computer system or from the data stored in it.

    Password Cracking

  • 68

    It plays a key role in improving security against attacks. It is the most important element that users should ensure while creating a password. The password should not be simple, as such passwords are prone to attacks.

    Password Complexity

  • 69

    "This is, for most cases, the attacker’s first attempt at gaining target system passwords." Which type of Password Attack is being described?

    Non-Electronic Attacks

  • 70

    "This is one of the easiest ways to gain unauthorized administrator-level system access." Which type of Password Attack is being described?

    Active Online Attacks

  • 71

    "It is a type of system attack that does not lead to any changes in the system. In this attack, the attacker does not have to communicate with the system, but passively monitors or records the data passing over the communication channel, to and from the system. The data are then used to break into the system." Which type of Password Attack is being described?

    Passive Online Attack

  • 72

    "They refer to password attacks in which an attacker tries to recover cleartext passwords from a password hash dump." Which type of Password Attack is being described?

    Offline Attacks

  • 73

    "In this type of attack, a dictionary file is loaded into a cracking application that runs against user accounts. This dictionary is a text file that contains several dictionary words commonly used as passwords." Which type of Password Attack is being described?

    Dictionary

  • 74

    "Attackers try every combination of characters until the password is broken" Which type of Password Attack is being described?

    Brute Force

  • 75

    "It is a brute-force attack on encryption that employs a search of the keyspace. In other words, testing all possible keys is one of the attempts to recover the plaintext used to produce a particular ciphertext." Which type of Password Attack is being described?

    Cryptanalysis

  • 76

    "Attackers use this type of attack when they obtain some information about the password. This is a more powerful attack than dictionary and brute-force attacks because the cracker knows the password type" Which type of Password Attack is being described?

    Rule-based Attack

  • 77

    "This type of attack depends on the dictionary attack. Often, people change their passwords merely by adding some numbers to their old passwords." Which type of Password Attack is being described?

    Hybrid Attack

  • 78

    "Hackers use this cracking technique when passwords are not known words. Attackers use the dictionary and other methods to crack them, as well as all possible combinations of them." Which type of Password Attack is being described?

    Syllable Attack

  • 79

    "Packet sniffing is a form of wire sniffing or wiretapping in which hackers sniff credentials during transit by capturing Internet packets. Attackers rarely use sniffers to perform this type of attack." Which type of Password Attack is being described?

    Wire Sniffing

  • 80

    "It is a password-cracking technique that involves attempting to log on to the target system with different passwords manually" Which type of Password Attack is being described?

    Password Guessing

  • 81

    "It is a tool designed to audit passwords and recover applications. It recovers lost Microsoft Windows passwords with the help of a dictionary, hybrid, rainbow table, and brute-force attacks, and it also checks the strength of the password" Which Password cracking tool is being described?

    L0phtCrack

  • 82

    "It is a Windows password-cracking tool that uses rainbow tables for cracking passwords. It comes with a graphical user interface (GUI) and runs on different OSs such as Windows, Linux/UNIX, etc." Which Password cracking tool is being described?

    ophcrack

  • 83

    "It cracks hashes with rainbow tables, using a time–memory trade-off algorithm. A traditional brute-force cracker cracks a hash in a manner that is different from that followed by a time-memory-tradeoff hash cracker." Which Password cracking tool is being described?

    RainbowCrack

  • 84

    Which is NOT considered a Password Cracking tool?

    PassCrack

  • The Contemporary World Mock test (Prelims)

    The Contemporary World Mock test (Prelims)

    Xai Alexandrei Delos Reyes · 58問 · 2年前

    The Contemporary World Mock test (Prelims)

    The Contemporary World Mock test (Prelims)

    58問 • 2年前
    Xai Alexandrei Delos Reyes

    Computing Mock test (Prelims)

    Computing Mock test (Prelims)

    Xai Alexandrei Delos Reyes · 67問 · 2年前

    Computing Mock test (Prelims)

    Computing Mock test (Prelims)

    67問 • 2年前
    Xai Alexandrei Delos Reyes

    Programming Mock Test (Prelims)

    Programming Mock Test (Prelims)

    Xai Alexandrei Delos Reyes · 64問 · 2年前

    Programming Mock Test (Prelims)

    Programming Mock Test (Prelims)

    64問 • 2年前
    Xai Alexandrei Delos Reyes

    Entrepreneurship Mock Test (Prelims)

    Entrepreneurship Mock Test (Prelims)

    Xai Alexandrei Delos Reyes · 23問 · 2年前

    Entrepreneurship Mock Test (Prelims)

    Entrepreneurship Mock Test (Prelims)

    23問 • 2年前
    Xai Alexandrei Delos Reyes

    Computing Mock Test (Midterms) BSIT 107

    Computing Mock Test (Midterms) BSIT 107

    Xai Alexandrei Delos Reyes · 76問 · 2年前

    Computing Mock Test (Midterms) BSIT 107

    Computing Mock Test (Midterms) BSIT 107

    76問 • 2年前
    Xai Alexandrei Delos Reyes

    Math Mock Test (Prelims)

    Math Mock Test (Prelims)

    Xai Alexandrei Delos Reyes · 48問 · 2年前

    Math Mock Test (Prelims)

    Math Mock Test (Prelims)

    48問 • 2年前
    Xai Alexandrei Delos Reyes

    Programming Mock Test (Midterms) BSIT 107

    Programming Mock Test (Midterms) BSIT 107

    Xai Alexandrei Delos Reyes · 52問 · 2年前

    Programming Mock Test (Midterms) BSIT 107

    Programming Mock Test (Midterms) BSIT 107

    52問 • 2年前
    Xai Alexandrei Delos Reyes

    UTS Mock Test (Midterms) BSIT107

    UTS Mock Test (Midterms) BSIT107

    Xai Alexandrei Delos Reyes · 40問 · 2年前

    UTS Mock Test (Midterms) BSIT107

    UTS Mock Test (Midterms) BSIT107

    40問 • 2年前
    Xai Alexandrei Delos Reyes

    Entrepreneurship Mock Test (Midterms) BSIT 107

    Entrepreneurship Mock Test (Midterms) BSIT 107

    Xai Alexandrei Delos Reyes · 38問 · 2年前

    Entrepreneurship Mock Test (Midterms) BSIT 107

    Entrepreneurship Mock Test (Midterms) BSIT 107

    38問 • 2年前
    Xai Alexandrei Delos Reyes

    Contemporary World Mock Test (Midterms) BSIT 107

    Contemporary World Mock Test (Midterms) BSIT 107

    Xai Alexandrei Delos Reyes · 28問 · 2年前

    Contemporary World Mock Test (Midterms) BSIT 107

    Contemporary World Mock Test (Midterms) BSIT 107

    28問 • 2年前
    Xai Alexandrei Delos Reyes

    Math Mocktest (Midterms) BSIT 107

    Math Mocktest (Midterms) BSIT 107

    Xai Alexandrei Delos Reyes · 24問 · 2年前

    Math Mocktest (Midterms) BSIT 107

    Math Mocktest (Midterms) BSIT 107

    24問 • 2年前
    Xai Alexandrei Delos Reyes

    Computer Programming Mocktest (Pre-finals)

    Computer Programming Mocktest (Pre-finals)

    Xai Alexandrei Delos Reyes · 26問 · 2年前

    Computer Programming Mocktest (Pre-finals)

    Computer Programming Mocktest (Pre-finals)

    26問 • 2年前
    Xai Alexandrei Delos Reyes

    Math Mocktest (Pre-Finals)

    Math Mocktest (Pre-Finals)

    Xai Alexandrei Delos Reyes · 19問 · 2年前

    Math Mocktest (Pre-Finals)

    Math Mocktest (Pre-Finals)

    19問 • 2年前
    Xai Alexandrei Delos Reyes

    Computing Mock Test (Pre-finals)

    Computing Mock Test (Pre-finals)

    Xai Alexandrei Delos Reyes · 36問 · 2年前

    Computing Mock Test (Pre-finals)

    Computing Mock Test (Pre-finals)

    36問 • 2年前
    Xai Alexandrei Delos Reyes

    Computing Mock Test Finals

    Computing Mock Test Finals

    Xai Alexandrei Delos Reyes · 26問 · 2年前

    Computing Mock Test Finals

    Computing Mock Test Finals

    26問 • 2年前
    Xai Alexandrei Delos Reyes

    Comprog 2nd sem (prelims) BSIT 205

    Comprog 2nd sem (prelims) BSIT 205

    Xai Alexandrei Delos Reyes · 63問 · 2年前

    Comprog 2nd sem (prelims) BSIT 205

    Comprog 2nd sem (prelims) BSIT 205

    63問 • 2年前
    Xai Alexandrei Delos Reyes

    Discrete Math 2nd sem (prelims) BSIT 205

    Discrete Math 2nd sem (prelims) BSIT 205

    Xai Alexandrei Delos Reyes · 36問 · 2年前

    Discrete Math 2nd sem (prelims) BSIT 205

    Discrete Math 2nd sem (prelims) BSIT 205

    36問 • 2年前
    Xai Alexandrei Delos Reyes

    Art Appreciation (Prelim) BSIT 205

    Art Appreciation (Prelim) BSIT 205

    Xai Alexandrei Delos Reyes · 56問 · 2年前

    Art Appreciation (Prelim) BSIT 205

    Art Appreciation (Prelim) BSIT 205

    56問 • 2年前
    Xai Alexandrei Delos Reyes

    Ethics 2nd sem (Prelims) BSIT 205

    Ethics 2nd sem (Prelims) BSIT 205

    Xai Alexandrei Delos Reyes · 45問 · 2年前

    Ethics 2nd sem (Prelims) BSIT 205

    Ethics 2nd sem (Prelims) BSIT 205

    45問 • 2年前
    Xai Alexandrei Delos Reyes

    STS 2nd Sem (Prelim) BSIT 205

    STS 2nd Sem (Prelim) BSIT 205

    Xai Alexandrei Delos Reyes · 40問 · 2年前

    STS 2nd Sem (Prelim) BSIT 205

    STS 2nd Sem (Prelim) BSIT 205

    40問 • 2年前
    Xai Alexandrei Delos Reyes

    Systems Administration 2nd sem (Prelims) BSIT 205

    Systems Administration 2nd sem (Prelims) BSIT 205

    Xai Alexandrei Delos Reyes · 72問 · 2年前

    Systems Administration 2nd sem (Prelims) BSIT 205

    Systems Administration 2nd sem (Prelims) BSIT 205

    72問 • 2年前
    Xai Alexandrei Delos Reyes

    Discrete Mathematics (Midterms) BSIT 205

    Discrete Mathematics (Midterms) BSIT 205

    Xai Alexandrei Delos Reyes · 52問 · 1年前

    Discrete Mathematics (Midterms) BSIT 205

    Discrete Mathematics (Midterms) BSIT 205

    52問 • 1年前
    Xai Alexandrei Delos Reyes

    Art Appreciation (Midterm) BSIT 205

    Art Appreciation (Midterm) BSIT 205

    Xai Alexandrei Delos Reyes · 56問 · 1年前

    Art Appreciation (Midterm) BSIT 205

    Art Appreciation (Midterm) BSIT 205

    56問 • 1年前
    Xai Alexandrei Delos Reyes

    Ethics Mocktest (Midterms) BSIT205

    Ethics Mocktest (Midterms) BSIT205

    Xai Alexandrei Delos Reyes · 29問 · 1年前

    Ethics Mocktest (Midterms) BSIT205

    Ethics Mocktest (Midterms) BSIT205

    29問 • 1年前
    Xai Alexandrei Delos Reyes

    Comprog Mocktest (Midterm) BSIT 205

    Comprog Mocktest (Midterm) BSIT 205

    Xai Alexandrei Delos Reyes · 61問 · 1年前

    Comprog Mocktest (Midterm) BSIT 205

    Comprog Mocktest (Midterm) BSIT 205

    61問 • 1年前
    Xai Alexandrei Delos Reyes

    System Administration Mocktest (Midterms) BSIT 205

    System Administration Mocktest (Midterms) BSIT 205

    Xai Alexandrei Delos Reyes · 65問 · 1年前

    System Administration Mocktest (Midterms) BSIT 205

    System Administration Mocktest (Midterms) BSIT 205

    65問 • 1年前
    Xai Alexandrei Delos Reyes

    Math Mocktest (Pre-finals) BSIT 205

    Math Mocktest (Pre-finals) BSIT 205

    Xai Alexandrei Delos Reyes · 49問 · 1年前

    Math Mocktest (Pre-finals) BSIT 205

    Math Mocktest (Pre-finals) BSIT 205

    49問 • 1年前
    Xai Alexandrei Delos Reyes

    Art Appreciation Mocktest (Pre-finals) BSIT 205

    Art Appreciation Mocktest (Pre-finals) BSIT 205

    Xai Alexandrei Delos Reyes · 66問 · 1年前

    Art Appreciation Mocktest (Pre-finals) BSIT 205

    Art Appreciation Mocktest (Pre-finals) BSIT 205

    66問 • 1年前
    Xai Alexandrei Delos Reyes

    Ethics Mocktest (Pre-finals) BSIT 205

    Ethics Mocktest (Pre-finals) BSIT 205

    Xai Alexandrei Delos Reyes · 50問 · 1年前

    Ethics Mocktest (Pre-finals) BSIT 205

    Ethics Mocktest (Pre-finals) BSIT 205

    50問 • 1年前
    Xai Alexandrei Delos Reyes

    Computer Programming Mocktest (Pre-finals) BSIT 205

    Computer Programming Mocktest (Pre-finals) BSIT 205

    Xai Alexandrei Delos Reyes · 33問 · 1年前

    Computer Programming Mocktest (Pre-finals) BSIT 205

    Computer Programming Mocktest (Pre-finals) BSIT 205

    33問 • 1年前
    Xai Alexandrei Delos Reyes

    System Administration (Pre-finals) BSIT 205

    System Administration (Pre-finals) BSIT 205

    Xai Alexandrei Delos Reyes · 52問 · 1年前

    System Administration (Pre-finals) BSIT 205

    System Administration (Pre-finals) BSIT 205

    52問 • 1年前
    Xai Alexandrei Delos Reyes

    Art Appreciation Finals BSIT 205

    Art Appreciation Finals BSIT 205

    Xai Alexandrei Delos Reyes · 35問 · 1年前

    Art Appreciation Finals BSIT 205

    Art Appreciation Finals BSIT 205

    35問 • 1年前
    Xai Alexandrei Delos Reyes

    Data Structures and Algorithms (Mocktest) BSIT 307

    Data Structures and Algorithms (Mocktest) BSIT 307

    Xai Alexandrei Delos Reyes · 52問 · 1年前

    Data Structures and Algorithms (Mocktest) BSIT 307

    Data Structures and Algorithms (Mocktest) BSIT 307

    52問 • 1年前
    Xai Alexandrei Delos Reyes

    Object Oriented Programming Mock Test (Mocktest) BSIT 307

    Object Oriented Programming Mock Test (Mocktest) BSIT 307

    Xai Alexandrei Delos Reyes · 23問 · 1年前

    Object Oriented Programming Mock Test (Mocktest) BSIT 307

    Object Oriented Programming Mock Test (Mocktest) BSIT 307

    23問 • 1年前
    Xai Alexandrei Delos Reyes

    Human Computer Interactions Mocktest (Prelims) BSIT 307

    Human Computer Interactions Mocktest (Prelims) BSIT 307

    Xai Alexandrei Delos Reyes · 58問 · 1年前

    Human Computer Interactions Mocktest (Prelims) BSIT 307

    Human Computer Interactions Mocktest (Prelims) BSIT 307

    58問 • 1年前
    Xai Alexandrei Delos Reyes

    Principles of Communication Mocktest (Prelims) BSIT 307

    Principles of Communication Mocktest (Prelims) BSIT 307

    Xai Alexandrei Delos Reyes · 37問 · 1年前

    Principles of Communication Mocktest (Prelims) BSIT 307

    Principles of Communication Mocktest (Prelims) BSIT 307

    37問 • 1年前
    Xai Alexandrei Delos Reyes

    Principles of Communication Mocktest (Midterms) BSIT 307

    Principles of Communication Mocktest (Midterms) BSIT 307

    Xai Alexandrei Delos Reyes · 29問 · 1年前

    Principles of Communication Mocktest (Midterms) BSIT 307

    Principles of Communication Mocktest (Midterms) BSIT 307

    29問 • 1年前
    Xai Alexandrei Delos Reyes

    Data Structures and Algorithms Mocktest (Midterm) BSIT 307

    Data Structures and Algorithms Mocktest (Midterm) BSIT 307

    Xai Alexandrei Delos Reyes · 50問 · 1年前

    Data Structures and Algorithms Mocktest (Midterm) BSIT 307

    Data Structures and Algorithms Mocktest (Midterm) BSIT 307

    50問 • 1年前
    Xai Alexandrei Delos Reyes

    Object Oriented Programming Mock Test (Midterm) BSIT 307

    Object Oriented Programming Mock Test (Midterm) BSIT 307

    Xai Alexandrei Delos Reyes · 13問 · 1年前

    Object Oriented Programming Mock Test (Midterm) BSIT 307

    Object Oriented Programming Mock Test (Midterm) BSIT 307

    13問 • 1年前
    Xai Alexandrei Delos Reyes

    Human Computer Interactions Mocktest (Midterms) BSIT 307

    Human Computer Interactions Mocktest (Midterms) BSIT 307

    Xai Alexandrei Delos Reyes · 35問 · 1年前

    Human Computer Interactions Mocktest (Midterms) BSIT 307

    Human Computer Interactions Mocktest (Midterms) BSIT 307

    35問 • 1年前
    Xai Alexandrei Delos Reyes

    Readings In Philippine History (Midterms) Mocktest

    Readings In Philippine History (Midterms) Mocktest

    Xai Alexandrei Delos Reyes · 16問 · 1年前

    Readings In Philippine History (Midterms) Mocktest

    Readings In Philippine History (Midterms) Mocktest

    16問 • 1年前
    Xai Alexandrei Delos Reyes

    Discrete Structures and Algorithms (Midterms) Mocktest

    Discrete Structures and Algorithms (Midterms) Mocktest

    Xai Alexandrei Delos Reyes · 10問 · 1年前

    Discrete Structures and Algorithms (Midterms) Mocktest

    Discrete Structures and Algorithms (Midterms) Mocktest

    10問 • 1年前
    Xai Alexandrei Delos Reyes

    Principles of Communication (Midterm) Mocktest

    Principles of Communication (Midterm) Mocktest

    Xai Alexandrei Delos Reyes · 29問 · 1年前

    Principles of Communication (Midterm) Mocktest

    Principles of Communication (Midterm) Mocktest

    29問 • 1年前
    Xai Alexandrei Delos Reyes

    TECHNOPRENEURSHIP PRELIMS BSIT 402

    TECHNOPRENEURSHIP PRELIMS BSIT 402

    Xai Alexandrei Delos Reyes · 74問 · 1年前

    TECHNOPRENEURSHIP PRELIMS BSIT 402

    TECHNOPRENEURSHIP PRELIMS BSIT 402

    74問 • 1年前
    Xai Alexandrei Delos Reyes

    (Prelim) PH Popular Culture Mocktest BSIT 402

    (Prelim) PH Popular Culture Mocktest BSIT 402

    Xai Alexandrei Delos Reyes · 19問 · 1年前

    (Prelim) PH Popular Culture Mocktest BSIT 402

    (Prelim) PH Popular Culture Mocktest BSIT 402

    19問 • 1年前
    Xai Alexandrei Delos Reyes

    (Prelim) Integrative Programming BSIT 402

    (Prelim) Integrative Programming BSIT 402

    Xai Alexandrei Delos Reyes · 46問 · 1年前

    (Prelim) Integrative Programming BSIT 402

    (Prelim) Integrative Programming BSIT 402

    46問 • 1年前
    Xai Alexandrei Delos Reyes

    (Prelim) Quantitive Methods Mocktest BSIT 402

    (Prelim) Quantitive Methods Mocktest BSIT 402

    Xai Alexandrei Delos Reyes · 39問 · 1年前

    (Prelim) Quantitive Methods Mocktest BSIT 402

    (Prelim) Quantitive Methods Mocktest BSIT 402

    39問 • 1年前
    Xai Alexandrei Delos Reyes

    (Prelim) System Integration and Architecture BSIT 402

    (Prelim) System Integration and Architecture BSIT 402

    Xai Alexandrei Delos Reyes · 29問 · 1年前

    (Prelim) System Integration and Architecture BSIT 402

    (Prelim) System Integration and Architecture BSIT 402

    29問 • 1年前
    Xai Alexandrei Delos Reyes

    (Prelim) Network Technology Mocktest BSIT 402

    (Prelim) Network Technology Mocktest BSIT 402

    Xai Alexandrei Delos Reyes · 68問 · 1年前

    (Prelim) Network Technology Mocktest BSIT 402

    (Prelim) Network Technology Mocktest BSIT 402

    68問 • 1年前
    Xai Alexandrei Delos Reyes

    (Prelim) Information Management Mocktest BSIT 402

    (Prelim) Information Management Mocktest BSIT 402

    Xai Alexandrei Delos Reyes · 45問 · 1年前

    (Prelim) Information Management Mocktest BSIT 402

    (Prelim) Information Management Mocktest BSIT 402

    45問 • 1年前
    Xai Alexandrei Delos Reyes

    (Pre-Finals) Quantitative Research Mocktest BSIT 402

    (Pre-Finals) Quantitative Research Mocktest BSIT 402

    Xai Alexandrei Delos Reyes · 28問 · 10ヶ月前

    (Pre-Finals) Quantitative Research Mocktest BSIT 402

    (Pre-Finals) Quantitative Research Mocktest BSIT 402

    28問 • 10ヶ月前
    Xai Alexandrei Delos Reyes

    (Finals) Information Management Mocktest

    (Finals) Information Management Mocktest

    Xai Alexandrei Delos Reyes · 64問 · 9ヶ月前

    (Finals) Information Management Mocktest

    (Finals) Information Management Mocktest

    64問 • 9ヶ月前
    Xai Alexandrei Delos Reyes

    (Finals) Philippine Popular Culture Mocktest

    (Finals) Philippine Popular Culture Mocktest

    Xai Alexandrei Delos Reyes · 46問 · 9ヶ月前

    (Finals) Philippine Popular Culture Mocktest

    (Finals) Philippine Popular Culture Mocktest

    46問 • 9ヶ月前
    Xai Alexandrei Delos Reyes

    (Finals) Integrative Programming Mocktest BSIT 402

    (Finals) Integrative Programming Mocktest BSIT 402

    Xai Alexandrei Delos Reyes · 24問 · 9ヶ月前

    (Finals) Integrative Programming Mocktest BSIT 402

    (Finals) Integrative Programming Mocktest BSIT 402

    24問 • 9ヶ月前
    Xai Alexandrei Delos Reyes

    (Finals) Network Technology Mocktest BSIT 402

    (Finals) Network Technology Mocktest BSIT 402

    Xai Alexandrei Delos Reyes · 37問 · 9ヶ月前

    (Finals) Network Technology Mocktest BSIT 402

    (Finals) Network Technology Mocktest BSIT 402

    37問 • 9ヶ月前
    Xai Alexandrei Delos Reyes

    (Finals) Quantitative Methods Mocktest BSIT 402

    (Finals) Quantitative Methods Mocktest BSIT 402

    Xai Alexandrei Delos Reyes · 18問 · 9ヶ月前

    (Finals) Quantitative Methods Mocktest BSIT 402

    (Finals) Quantitative Methods Mocktest BSIT 402

    18問 • 9ヶ月前
    Xai Alexandrei Delos Reyes

    Application Development Mocktest (Prelim) BSIT 505

    Application Development Mocktest (Prelim) BSIT 505

    Xai Alexandrei Delos Reyes · 72問 · 6ヶ月前

    Application Development Mocktest (Prelim) BSIT 505

    Application Development Mocktest (Prelim) BSIT 505

    72問 • 6ヶ月前
    Xai Alexandrei Delos Reyes

    Data and Digital Communication Mocktest (Prelim) BSIT 505

    Data and Digital Communication Mocktest (Prelim) BSIT 505

    Xai Alexandrei Delos Reyes · 60問 · 6ヶ月前

    Data and Digital Communication Mocktest (Prelim) BSIT 505

    Data and Digital Communication Mocktest (Prelim) BSIT 505

    60問 • 6ヶ月前
    Xai Alexandrei Delos Reyes

    (Handout 1 Only!) Advanced Systems Integration and Architecture Mocktest (Prelim) BSIT 505

    (Handout 1 Only!) Advanced Systems Integration and Architecture Mocktest (Prelim) BSIT 505

    Xai Alexandrei Delos Reyes · 38問 · 6ヶ月前

    (Handout 1 Only!) Advanced Systems Integration and Architecture Mocktest (Prelim) BSIT 505

    (Handout 1 Only!) Advanced Systems Integration and Architecture Mocktest (Prelim) BSIT 505

    38問 • 6ヶ月前
    Xai Alexandrei Delos Reyes

    Enterprise Architecture Mocktest (Prelims) BSIT 505

    Enterprise Architecture Mocktest (Prelims) BSIT 505

    Xai Alexandrei Delos Reyes · 42問 · 6ヶ月前

    Enterprise Architecture Mocktest (Prelims) BSIT 505

    Enterprise Architecture Mocktest (Prelims) BSIT 505

    42問 • 6ヶ月前
    Xai Alexandrei Delos Reyes

    Professional Issues in Information Technology Mocktest (Prelims) BSIT 505

    Professional Issues in Information Technology Mocktest (Prelims) BSIT 505

    Xai Alexandrei Delos Reyes · 44問 · 6ヶ月前

    Professional Issues in Information Technology Mocktest (Prelims) BSIT 505

    Professional Issues in Information Technology Mocktest (Prelims) BSIT 505

    44問 • 6ヶ月前
    Xai Alexandrei Delos Reyes

    Application Development Mocktest (Midterm) BSIT 505

    Application Development Mocktest (Midterm) BSIT 505

    Xai Alexandrei Delos Reyes · 42問 · 6ヶ月前

    Application Development Mocktest (Midterm) BSIT 505

    Application Development Mocktest (Midterm) BSIT 505

    42問 • 6ヶ月前
    Xai Alexandrei Delos Reyes

    Event-Driven Programming Mocktest (Midterm) BSIT - 505

    Event-Driven Programming Mocktest (Midterm) BSIT - 505

    Xai Alexandrei Delos Reyes · 61問 · 6ヶ月前

    Event-Driven Programming Mocktest (Midterm) BSIT - 505

    Event-Driven Programming Mocktest (Midterm) BSIT - 505

    61問 • 6ヶ月前
    Xai Alexandrei Delos Reyes

    Data and Digital Communication Mocktest (Midterm) BSIT - 505

    Data and Digital Communication Mocktest (Midterm) BSIT - 505

    Xai Alexandrei Delos Reyes · 80問 · 6ヶ月前

    Data and Digital Communication Mocktest (Midterm) BSIT - 505

    Data and Digital Communication Mocktest (Midterm) BSIT - 505

    80問 • 6ヶ月前
    Xai Alexandrei Delos Reyes

    (Midterm) Advanced Systems and Integration Architecture BSIT - 505

    (Midterm) Advanced Systems and Integration Architecture BSIT - 505

    Xai Alexandrei Delos Reyes · 68問 · 5ヶ月前

    (Midterm) Advanced Systems and Integration Architecture BSIT - 505

    (Midterm) Advanced Systems and Integration Architecture BSIT - 505

    68問 • 5ヶ月前
    Xai Alexandrei Delos Reyes

    (Midterm) Advanced Database Systems Mocktest BSIT - 505

    (Midterm) Advanced Database Systems Mocktest BSIT - 505

    Xai Alexandrei Delos Reyes · 82問 · 5ヶ月前

    (Midterm) Advanced Database Systems Mocktest BSIT - 505

    (Midterm) Advanced Database Systems Mocktest BSIT - 505

    82問 • 5ヶ月前
    Xai Alexandrei Delos Reyes

    (Midterms) Enterprise Architecture Mocktest BSIT 505

    (Midterms) Enterprise Architecture Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 69問 · 5ヶ月前

    (Midterms) Enterprise Architecture Mocktest BSIT 505

    (Midterms) Enterprise Architecture Mocktest BSIT 505

    69問 • 5ヶ月前
    Xai Alexandrei Delos Reyes

    (Midterm) Professional Issues in Information Technology BSIT 505

    (Midterm) Professional Issues in Information Technology BSIT 505

    Xai Alexandrei Delos Reyes · 38問 · 5ヶ月前

    (Midterm) Professional Issues in Information Technology BSIT 505

    (Midterm) Professional Issues in Information Technology BSIT 505

    38問 • 5ヶ月前
    Xai Alexandrei Delos Reyes

    (Pre-Finals)Event-Driven Programming Mocktest BSIT 505

    (Pre-Finals)Event-Driven Programming Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 59問 · 4ヶ月前

    (Pre-Finals)Event-Driven Programming Mocktest BSIT 505

    (Pre-Finals)Event-Driven Programming Mocktest BSIT 505

    59問 • 4ヶ月前
    Xai Alexandrei Delos Reyes

    (Pre-finals) Application Development Mocktest BSIT 505

    (Pre-finals) Application Development Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 41問 · 4ヶ月前

    (Pre-finals) Application Development Mocktest BSIT 505

    (Pre-finals) Application Development Mocktest BSIT 505

    41問 • 4ヶ月前
    Xai Alexandrei Delos Reyes

    (Pre-Finals) Data and Digital Communication Mocktest BSIT 505

    (Pre-Finals) Data and Digital Communication Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 57問 · 4ヶ月前

    (Pre-Finals) Data and Digital Communication Mocktest BSIT 505

    (Pre-Finals) Data and Digital Communication Mocktest BSIT 505

    57問 • 4ヶ月前
    Xai Alexandrei Delos Reyes

    (Pre-Finals) ASIA Mocktest BSIT 505

    (Pre-Finals) ASIA Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 44問 · 4ヶ月前

    (Pre-Finals) ASIA Mocktest BSIT 505

    (Pre-Finals) ASIA Mocktest BSIT 505

    44問 • 4ヶ月前
    Xai Alexandrei Delos Reyes

    (Pre-Finals) Advanced Database Systems Mocktest BSIT 505

    (Pre-Finals) Advanced Database Systems Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 72問 · 4ヶ月前

    (Pre-Finals) Advanced Database Systems Mocktest BSIT 505

    (Pre-Finals) Advanced Database Systems Mocktest BSIT 505

    72問 • 4ヶ月前
    Xai Alexandrei Delos Reyes

    (Pre-Finals) Enterprise Architecture Mocktest BSIT 505

    (Pre-Finals) Enterprise Architecture Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 42問 · 4ヶ月前

    (Pre-Finals) Enterprise Architecture Mocktest BSIT 505

    (Pre-Finals) Enterprise Architecture Mocktest BSIT 505

    42問 • 4ヶ月前
    Xai Alexandrei Delos Reyes

    (Pre-Finals) Professional Issues In Information Technolog Mocktest BSIT 505

    (Pre-Finals) Professional Issues In Information Technolog Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 62問 · 4ヶ月前

    (Pre-Finals) Professional Issues In Information Technolog Mocktest BSIT 505

    (Pre-Finals) Professional Issues In Information Technolog Mocktest BSIT 505

    62問 • 4ヶ月前
    Xai Alexandrei Delos Reyes

    (Finals) Application Development Mocktest BSIT 505

    (Finals) Application Development Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 62問 · 3ヶ月前

    (Finals) Application Development Mocktest BSIT 505

    (Finals) Application Development Mocktest BSIT 505

    62問 • 3ヶ月前
    Xai Alexandrei Delos Reyes

    (Finals) Data and Digital Communication Mocktest BSIT - 505

    (Finals) Data and Digital Communication Mocktest BSIT - 505

    Xai Alexandrei Delos Reyes · 61問 · 3ヶ月前

    (Finals) Data and Digital Communication Mocktest BSIT - 505

    (Finals) Data and Digital Communication Mocktest BSIT - 505

    61問 • 3ヶ月前
    Xai Alexandrei Delos Reyes

    (Finals) Advanced Database Systems Mocktest BSIT 505

    (Finals) Advanced Database Systems Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 62問 · 3ヶ月前

    (Finals) Advanced Database Systems Mocktest BSIT 505

    (Finals) Advanced Database Systems Mocktest BSIT 505

    62問 • 3ヶ月前
    Xai Alexandrei Delos Reyes

    (Finals) Enterprise Architecture Mocktest BSIT 505

    (Finals) Enterprise Architecture Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 60問 · 3ヶ月前

    (Finals) Enterprise Architecture Mocktest BSIT 505

    (Finals) Enterprise Architecture Mocktest BSIT 505

    60問 • 3ヶ月前
    Xai Alexandrei Delos Reyes

    (Finals) Professional issues in Information Technology Mocktest BSIT 505

    (Finals) Professional issues in Information Technology Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 27問 · 3ヶ月前

    (Finals) Professional issues in Information Technology Mocktest BSIT 505

    (Finals) Professional issues in Information Technology Mocktest BSIT 505

    27問 • 3ヶ月前
    Xai Alexandrei Delos Reyes

    (Finals) Event-Driven Programming Mocktest BSIT 505

    (Finals) Event-Driven Programming Mocktest BSIT 505

    Xai Alexandrei Delos Reyes · 65問 · 4ヶ月前

    (Finals) Event-Driven Programming Mocktest BSIT 505

    (Finals) Event-Driven Programming Mocktest BSIT 505

    65問 • 4ヶ月前
    Xai Alexandrei Delos Reyes

    (Prelims) Mobile Systems and Technologies Mocktest BSIT 604

    (Prelims) Mobile Systems and Technologies Mocktest BSIT 604

    Xai Alexandrei Delos Reyes · 41回閲覧 · 42問 · 1ヶ月前

    (Prelims) Mobile Systems and Technologies Mocktest BSIT 604

    (Prelims) Mobile Systems and Technologies Mocktest BSIT 604

    41回閲覧 • 42問 • 1ヶ月前
    Xai Alexandrei Delos Reyes

    (Prelims) Great Books Mocktest BSIT 604

    (Prelims) Great Books Mocktest BSIT 604

    Xai Alexandrei Delos Reyes · 46回閲覧 · 75問 · 1ヶ月前

    (Prelims) Great Books Mocktest BSIT 604

    (Prelims) Great Books Mocktest BSIT 604

    46回閲覧 • 75問 • 1ヶ月前
    Xai Alexandrei Delos Reyes

    (Prelims) Management Information Systems Mocktest BSIT - 604

    (Prelims) Management Information Systems Mocktest BSIT - 604

    Xai Alexandrei Delos Reyes · 70回閲覧 · 94問 · 1ヶ月前

    (Prelims) Management Information Systems Mocktest BSIT - 604

    (Prelims) Management Information Systems Mocktest BSIT - 604

    70回閲覧 • 94問 • 1ヶ月前
    Xai Alexandrei Delos Reyes

    (Prelims) Programming Languages Mocktest BSIT 604

    (Prelims) Programming Languages Mocktest BSIT 604

    Xai Alexandrei Delos Reyes · 26回閲覧 · 79問 · 1ヶ月前

    (Prelims) Programming Languages Mocktest BSIT 604

    (Prelims) Programming Languages Mocktest BSIT 604

    26回閲覧 • 79問 • 1ヶ月前
    Xai Alexandrei Delos Reyes

    (Prelims) Web Systems and Technologies Mocktest BSIT 604

    (Prelims) Web Systems and Technologies Mocktest BSIT 604

    Xai Alexandrei Delos Reyes · 33回閲覧 · 99問 · 29日前

    (Prelims) Web Systems and Technologies Mocktest BSIT 604

    (Prelims) Web Systems and Technologies Mocktest BSIT 604

    33回閲覧 • 99問 • 29日前
    Xai Alexandrei Delos Reyes

    (Prelims) Information Assurance and Security Mocktest BSIT 604

    (Prelims) Information Assurance and Security Mocktest BSIT 604

    Xai Alexandrei Delos Reyes · 33回閲覧 · 92問 · 27日前

    (Prelims) Information Assurance and Security Mocktest BSIT 604

    (Prelims) Information Assurance and Security Mocktest BSIT 604

    33回閲覧 • 92問 • 27日前
    Xai Alexandrei Delos Reyes

    (Midterms) Mobile Systems and Technologies Mocktest BSIT 604

    (Midterms) Mobile Systems and Technologies Mocktest BSIT 604

    Xai Alexandrei Delos Reyes · 54問 · 16日前

    (Midterms) Mobile Systems and Technologies Mocktest BSIT 604

    (Midterms) Mobile Systems and Technologies Mocktest BSIT 604

    54問 • 16日前
    Xai Alexandrei Delos Reyes

    (Midterm) Great Books Mocktest BSIT 604

    (Midterm) Great Books Mocktest BSIT 604

    Xai Alexandrei Delos Reyes · 74問 · 10日前

    (Midterm) Great Books Mocktest BSIT 604

    (Midterm) Great Books Mocktest BSIT 604

    74問 • 10日前
    Xai Alexandrei Delos Reyes

    (Midterms) 04 to 05_Handout Management Information Systems Mocktest BSIT 604

    (Midterms) 04 to 05_Handout Management Information Systems Mocktest BSIT 604

    Xai Alexandrei Delos Reyes · 75問 · 4日前

    (Midterms) 04 to 05_Handout Management Information Systems Mocktest BSIT 604

    (Midterms) 04 to 05_Handout Management Information Systems Mocktest BSIT 604

    75問 • 4日前
    Xai Alexandrei Delos Reyes

    (Midterms) 06_Handout Management Information Systems Mocktest BSIT 604

    (Midterms) 06_Handout Management Information Systems Mocktest BSIT 604

    Xai Alexandrei Delos Reyes · 36問 · 4日前

    (Midterms) 06_Handout Management Information Systems Mocktest BSIT 604

    (Midterms) 06_Handout Management Information Systems Mocktest BSIT 604

    36問 • 4日前
    Xai Alexandrei Delos Reyes

    (Midterms) Programming Languages Mocktest BSIT 604

    (Midterms) Programming Languages Mocktest BSIT 604

    Xai Alexandrei Delos Reyes · 81問 · 3日前

    (Midterms) Programming Languages Mocktest BSIT 604

    (Midterms) Programming Languages Mocktest BSIT 604

    81問 • 3日前
    Xai Alexandrei Delos Reyes

    (Midterms) Web Systems an Technologies Mocktest BSIT 604

    (Midterms) Web Systems an Technologies Mocktest BSIT 604

    Xai Alexandrei Delos Reyes · 87問 · 2日前

    (Midterms) Web Systems an Technologies Mocktest BSIT 604

    (Midterms) Web Systems an Technologies Mocktest BSIT 604

    87問 • 2日前
    Xai Alexandrei Delos Reyes

    問題一覧

  • 1

    It is the potential occurrence of an undesirable event that can eventually damage and disrupt the operational and functional activities of an organization.

    Threat

  • 2

    Attackers use this to infiltrate and steal data such as personal information, financial information, and login credentials.

    Cyber Threats

  • 3

    Attackers can also use this to perform malicious activities and launch further attacks

    Compromised System

  • 4

    "Natural factors such as fires, floods, power failures, lightning, meteors, and earthquakes are potential threats to the assets of an organization. For example, these may cause severe physical damage to computer systems." Which threat source is being described?

    Natural Threats

  • 5

    "Threats that exist due to the potential for unintentional errors occurring within the organization. Examples include insider-originating security breaches, negligence, operator errors, unskilled administrators, lazy or untrained employees, and accidents." Which threat source is being described?

    Unintentional Threats

  • 6

    "These threats are performed by insiders within the organization, such as disgruntled or negligent employees, and harm the organization intentionally or unintentionally. Most of these attacks are performed by privileged users of the network." Which threat source is being described?

    Internal Threats

  • 7

    "These attacks are performed by exploiting vulnerabilities that already exist in a network, without the assistance of insider employees. For example, attacks can be performed with the objective of supporting a cause, by competitor companies for corporate espionage, and by countries for surveillance." Which threat source is being described?

    External Threats

  • 8

    "These attacks are Implemented by technically skilled attackers, using various tools to gain access to a network to disrupt services. The motivation behind such attacks includes criminal bribes, racism, politics, terrorism, etc. Examples include distributed ICMP floods, spoofing, and simultaneously executing attacks from multiple sources." Which threat source is being described?

    Structured External Threats

  • 9

    "Implemented by unskilled attackers, typically script kiddies who may be aspiring hackers, to access networks. Most of these attacks are performed primarily out of curiosity, rather than with criminal intentions. For example, untrained attackers use freely available online tools for attempting a network attack or for crashing a website or other public domains on the Internet." Which threat source is being described?

    Unstructured External Threats

  • 10

    It is a piece of malicious software that is designed to perform activities as intended by the attacker, without user consent. This may be in the form of executable code, active content, scripts, or other kinds of software.

    Malware

  • 11

    "A program in which malicious or harmful code is contained inside a harmless program or data, which can later gain control and cause damage, such as ruining the file allocation table on a hard disk." What type of Malware is being described?

    Trojan

  • 12

    Which is NOT a type of Trojan?

    Defacement Trojans, Remote Access Trojans, Backdoor Trojans, Rootkit Trojans, Botnet Trojans

  • 13

    Which statement BEST DESCRIBES how to prevent Trojans

    Users should avoid untrusted files, block unused ports, apply system patches, and limit software installations through permission controls. Regular scanning, integrity checks, and the use of antivirus, firewalls, and intrusion detection systems enhance overall protection.

  • 14

    "A self-replicating program that produces its code by attaching copies of itself to other executable code and operates without the knowledge or consent of the user." What type of Malware is being described?

    Virus

  • 15

    Select ALL Types of viruses

    System or Boot Sector Virus, File Virus, Multipartite Virus, Macro Virus, Cluster Virus, Stealth Virus

  • 16

    "A Standalone malicious programs that replicate, execute, and spread across network connections independently without human intervention." What type of Malware is being described?

    Computer Worms

  • 17

    Which statement BEST DESCRIBES how to counter Computer Worms?

    Users should install and regularly update antivirus software, avoid suspicious files and email attachments, perform data backups, and scan drives frequently. Additional measures include using pop-up blockers and firewalls, checking media for infections, running weekly cleanups, and being cautious with file types and instant messages.

  • 18

    "A type of malware that restricts access to the infected computer system or critical files and documents stored on it, and then demands an online ransom payment to the malware creator(s) to remove user restrictions." What type of Malware is being described?

    Ransomware

  • 19

    Select ALL Examples of Ransomware

    Dharma, SamSam, GandCrab, Ryuk, WannaCry

  • 20

    "Software programs designed to gain access to a computer without being detected. They are malware that help attackers gain unauthorized access to a remote system and perform malicious activities. The goal of a rootkit is to gain root privileges on a system." What type of Malware is being described?

    Rootkit

  • 21

    Which statement BEST DESCRIBES how to counter Defend against rootkits?

    Users should back up data, reinstall software from trusted sources, patch systems regularly, and use up-to-date antivirus software with rootkit protection. Additional safeguards include enforcing the least privilege principle, disabling unused services, using firewalls and two-step authentication, scanning systems periodically, and avoiding risky online behavior during active sessions.

  • 22

    "A stealthy computer monitoring software that allows secret recording of all user activities on a target computer. It automatically delivers logs to the remote attacker using the Internet (via email, FTP, command and control through encrypted traffic, HTTP, DNS, etc.)" What type of Malware is being described?

    Spyware

  • 23

    "Known as grayware/junkware, these are potentially harmful applications that may pose severe risks to the security and privacy of data stored in the system where they are installed" What type of Malware is being described?

    PUAs or Grayware: Potentially unwanted applications or programs

  • 24

    Select all the Types of PUAs

    Adware, Torrent, Marketing, Cryptomining, Dialer

  • 25

    Which statement BEST DESCRIBES how to counter Defend against PUAs?

    Users should download only from trusted sources, enable detection features in the OS or antivirus software, choose custom installation, and avoid express setup options. Regular updates, firewalls, cautious browsing habits, reading license agreements, and using reliable security tools help block unauthorized installations and prevent phishing-based downloads.

  • 26

    "A software programs or hardware device that record the keys struck on the computer keyboard (also called keystroke logging) of an individual computer user or a network of computers." What type of Malware is being described?

    Keylogger

  • 27

    "A collection of compromised computers connected to the Internet to perform a distributed task." What type of Malware is being described?

    Botnets

  • 28

    It refers to a program or an infected system that performs repetitive work or acts as an agent or as a user interface to control other programs

    Bot

  • 29

    Cyber-criminals who control bots are called

    Botmaster

  • 30

    "Also called non-malware, It infects legitimate software, applications, and other protocols existing in the system to perform various malicious activities. This type of malware leverages existing vulnerabilities to infect the system. It generally resides in the system’s RAM. It injects malicious code into running processes." What type of Malware is being described?

    Fileless Malware

  • 31

    Which statement BEST DESCRIBES how to counter Defend against Fileless Malware?

    Users should turn off unused tools like PowerShell, macros, and scripting in browsers, implement whitelisting and two-factor authentication, and monitor systems with User Behavior Analytics (UBA) and endpoint security. Regular system updates, antivirus scans, restricted privileges, behavioral baselining, and the use of AI-powered security tools or managed detection services further strengthen protection against memory-resident and script-based threats.

  • 32

    It refers to a weakness in the design or implementation of a system that can be exploited to compromise the security of the system. It is frequently a security loophole that enables an attacker to enter the system by bypassing user authentication.

    Vulnerability

  • 33

    This is the most common vulnerability and is mainly caused by human error, which allows attackers to gain unauthorized access to the system. It may happen intentionally or unintentionally and affect web servers, application platforms, databases, and networks.

    Misconfiguration

  • 34

    These are usually user-friendly, especially when the device is being used for the first time, when the primary concern is the usability of the device rather than the device’s security.

    Default Installations

  • 35

    These are common software vulnerabilities that happen due to coding errors that allow attackers to gain access to the target system.

    Buffer Overflows

  • 36

    An essential component of the infrastructure of any organization. There are several cases where organizations run unpatched and misconfigured servers that compromise the security and integrity of the data in their systems.

    Unpatched Servers

  • 37

    Vulnerabilities due to design flaws are universal to all operating devices and systems. Design vulnerabilities, such as incorrect encryption or poor validation of data, are logical flaws in the functionality of the system that attackers exploit to bypass the detection mechanism and acquire access to a secure system

    Design Flaws

  • 38

    Due to vulnerabilities in the operating systems, applications such as trojans, worms, and viruses pose threats. These attacks use malicious code, script, or unwanted software, which results in the loss of sensitive information and control of computer operations.

    Application Flaws

  • 39

    Open ports and services may lead to the loss of data or DoS attacks and allow attackers to perform further attacks on other connected devices. Administrators must continuously check for unnecessary or insecure ports and services to reduce the risk to the network.

    Open Services

  • 40

    Unknown vulnerabilities in software/hardware that are exposed but not yet patched. The attackers exploit these before being acknowledged and patched by the software developers or security analysts.

    Default Passwords

  • 41

    These are exposed from old or familiar code. However, they could cause costly data breaches for organizations. Using these outdated codes, attackers can easily discover zero-day vulnerabilities in the system or software that are not yet patched.

    Legacy Platform Vulnerabilities

  • 42

    This plays a major role in providing security to any organization’s resources and infrastructure from various internal and external threats.

    Vulnerability Assessment

  • 43

    Which statement is NOT TRUE about Vulnerability Assessment

    The attacker interacts directly with the target network to find vulnerabilities. This helps in simulating an attack on the target network to uncover vulnerabilities that the attacker can exploit.

  • 44

    "The attacker interacts directly with the target network to find vulnerabilities. Active scanning helps in simulating an attack on the target network to uncover vulnerabilities that the attacker can exploit." Which Vulnerability Assessment Approach is being described?

    Active Scanning

  • 45

    "The attacker tries to find vulnerabilities without directly interacting with the target network. The attacker identifies vulnerabilities via information exposed by systems during normal communication" Which Vulnerability Assessment Approach is being described?

    Passive Scanning

  • 46

    "A type of vulnerability assessment that uses network scanners to identify the hosts, services, and vulnerabilities present in a network. Active network scanners can reduce the intrusiveness of the checks they perform." Which Type of Vulnerability Assessment is being described?

    Active Assessment

  • 47

    "Passive assessments sniff the traffic present on the network to identify the active systems, network services, applications, and vulnerabilities. Passive assessments also provide a list of the users who are currently accessing the network." Which Type of Vulnerability Assessment is being described?

    Passive Assessment

  • 48

    "External assessment examines the network from a hacker’s point of view to identify exploits and vulnerabilities accessible to the outside world." Which Type of Vulnerability Assessment is being described?

    External Assessment

  • 49

    "This involves scrutinizing the internal network to find exploits and vulnerabilities." Which Type of Vulnerability Assessment is being described?

    Internal Assessment

  • 50

    "A type of security check that involves conducting a configuration-level check to identify system configurations, user directories, file systems, registry settings, and other parameters to evaluate the possibility of compromise." Which Type of Vulnerability Assessment is being described?

    Host-based Assessment

  • 51

    "This determines the possible network security attacks that may occur on an organization’s system. These assessments discover network resources and map the ports and services running to various areas of the network." Which Type of Vulnerability Assessment is being described?

    Network-based Assessment

  • 52

    "Focuses on transactional web applications, traditional client-server applications, and hybrid systems. It analyzes all elements of an application infrastructure, including deployment and communication with the client and server." Which Type of Vulnerability Assessment is being described?

    Application Assessment

  • 53

    "This is any assessment focused on testing the databases for the presence of any misconfiguration or known vulnerabilities. These assessments mainly concentrate on testing various database technologies like MYSQL, MSSQL, ORACLE, and POSTGRESQL to identify data exposure or injection-type vulnerabilities." Which Type of Vulnerability Assessment is being described?

    Database Assessment

  • 54

    "Determines the vulnerabilities in an organization’s wireless networks" Which Type of Vulnerability Assessment is being described?

    Wireless Network Assessment

  • 55

    "This type of assessment, employed by organizations that possess assets like servers and clients at different locations, involves simultaneously assessing the distributed organization assets, such as client and server applications, using appropriate synchronization techniques." Which Type of Vulnerability Assessment is being described?

    Distributed Assessment

  • 56

    "also known as authenticated assessment, wherein the security professional possesses the credentials of all machines present in the assessed network." Which Type of Vulnerability Assessment is being described?

    Credentialed Assessment

  • 57

    "also known as authenticated assessment, wherein the security professional possesses the credentials of all machines present in the assessed network." Which Type of Vulnerability Assessment is being described?

    Non-credentialed Assessment

  • 58

    "After performing footprinting and network scanning and obtaining crucial information, if the security professional performs manual research for exploring the vulnerabilities or weaknesses, they manually rank the vulnerabilities and score them by referring to vulnerability scoring standards like CVSS (Common Vulnerability Scoring System) and vulnerability databases like CVE (Common Vulnerabilities and Exposures) and CWE (Common Weakness Enumeration)." Which Type of Vulnerability Assessment is being described?

    Manual Assessment

  • 59

    "An assessment where a security professional uses vulnerability assessment tools such as Nessus, Qualys, or GFI LanGuard to perform a vulnerability assessment of the target is called an automated assessment." Which Type of Vulnerability Assessment is being described?

    Automated Assessment

  • 60

    It is an important process that helps identify and remediate security weaknesses before they can be exploited. The implementation of a vulnerability management lifecycle helps gain a strategic perspective regarding possible cybersecurity threats and renders insecure computing environments more resilient to attacks.

    Vulnerability-Management Cycle

  • 61

    "This phase identifies critical assets and prioritizes them to define the risk based on the criticality and value of each system." Which phase in vulnerability management is being described?

    Identify Assets and Create a Baseline

  • 62

    "This phase is very crucial in vulnerability management. In this step, the security analyst performs a vulnerability scan on the network to identify the known vulnerabilities in the organization’s infrastructure." Which phase in vulnerability management is being described?

    Vulnerability Scan

  • 63

    "The process of applying fixes to vulnerable systems in order to reduce the impact and severity of vulnerabilities. This phase is initiated after the successful implementation of the baseline and assessment steps" Which phase in vulnerability management is being described?

    Risk Assessment

  • 64

    "The process of applying fixes to vulnerable systems in order to reduce the impact and severity of vulnerabilities. This phase is initiated after the successful implementation of the baseline and assessment steps" Which phase in vulnerability management is being described?

    Remediation

  • 65

    "In this phase, the security team performs a re-scan of systems to assess if the required remediation is complete and whether the individual fixes have been applied to the impacted assets." Which phase in vulnerability management is being described?

    Verification

  • 66

    "Organizations need to perform regular monitoring to maintain system security. They use tools such as IDS/IPS and firewalls. Continuous monitoring identifies potential threats and any new vulnerabilities that have evolved. As per security best practices, all phases of vulnerability management must be performed regularly." Which phase in vulnerability management is being described?

    Monitor

  • 67

    It is the process of recovering passwords from the data transmitted by a computer system or from the data stored in it.

    Password Cracking

  • 68

    It plays a key role in improving security against attacks. It is the most important element that users should ensure while creating a password. The password should not be simple, as such passwords are prone to attacks.

    Password Complexity

  • 69

    "This is, for most cases, the attacker’s first attempt at gaining target system passwords." Which type of Password Attack is being described?

    Non-Electronic Attacks

  • 70

    "This is one of the easiest ways to gain unauthorized administrator-level system access." Which type of Password Attack is being described?

    Active Online Attacks

  • 71

    "It is a type of system attack that does not lead to any changes in the system. In this attack, the attacker does not have to communicate with the system, but passively monitors or records the data passing over the communication channel, to and from the system. The data are then used to break into the system." Which type of Password Attack is being described?

    Passive Online Attack

  • 72

    "They refer to password attacks in which an attacker tries to recover cleartext passwords from a password hash dump." Which type of Password Attack is being described?

    Offline Attacks

  • 73

    "In this type of attack, a dictionary file is loaded into a cracking application that runs against user accounts. This dictionary is a text file that contains several dictionary words commonly used as passwords." Which type of Password Attack is being described?

    Dictionary

  • 74

    "Attackers try every combination of characters until the password is broken" Which type of Password Attack is being described?

    Brute Force

  • 75

    "It is a brute-force attack on encryption that employs a search of the keyspace. In other words, testing all possible keys is one of the attempts to recover the plaintext used to produce a particular ciphertext." Which type of Password Attack is being described?

    Cryptanalysis

  • 76

    "Attackers use this type of attack when they obtain some information about the password. This is a more powerful attack than dictionary and brute-force attacks because the cracker knows the password type" Which type of Password Attack is being described?

    Rule-based Attack

  • 77

    "This type of attack depends on the dictionary attack. Often, people change their passwords merely by adding some numbers to their old passwords." Which type of Password Attack is being described?

    Hybrid Attack

  • 78

    "Hackers use this cracking technique when passwords are not known words. Attackers use the dictionary and other methods to crack them, as well as all possible combinations of them." Which type of Password Attack is being described?

    Syllable Attack

  • 79

    "Packet sniffing is a form of wire sniffing or wiretapping in which hackers sniff credentials during transit by capturing Internet packets. Attackers rarely use sniffers to perform this type of attack." Which type of Password Attack is being described?

    Wire Sniffing

  • 80

    "It is a password-cracking technique that involves attempting to log on to the target system with different passwords manually" Which type of Password Attack is being described?

    Password Guessing

  • 81

    "It is a tool designed to audit passwords and recover applications. It recovers lost Microsoft Windows passwords with the help of a dictionary, hybrid, rainbow table, and brute-force attacks, and it also checks the strength of the password" Which Password cracking tool is being described?

    L0phtCrack

  • 82

    "It is a Windows password-cracking tool that uses rainbow tables for cracking passwords. It comes with a graphical user interface (GUI) and runs on different OSs such as Windows, Linux/UNIX, etc." Which Password cracking tool is being described?

    ophcrack

  • 83

    "It cracks hashes with rainbow tables, using a time–memory trade-off algorithm. A traditional brute-force cracker cracks a hash in a manner that is different from that followed by a time-memory-tradeoff hash cracker." Which Password cracking tool is being described?

    RainbowCrack

  • 84

    Which is NOT considered a Password Cracking tool?

    PassCrack