AIS General
AIS General
Unmute
1x
Playback Rate
Captions
Fullscreen
1.
1.
2.
3.
ecurity
security agency
malware
virus
information assurance
security email
Hackers often use this to present different content or URLs to human users
and search engines, thereby hiding them under legit looking web material.
Zero Day threat
Malware
Cloaking
Spoofing
True
False
Phishing
Trojan horses
Role playing
True
False
True
False
True
False
True
False
A non-skilled person who gains access to computer systems using already
made tools.
Phreaker
Hacktivist
Script kiddies
Medical Records is every time you go to the doctor’s office, more information
is added to your electronic health records (EHRs).
True
False
True
False
True
False
The term "Social Engineering" can be defined in various ways, relating to both
physical and cyber aspects of that activity.
True
False
Firewall
Zero Day threat
Malware
Cloaking
This engine gives you enormous access to the URL information. It is the front-
end of the Internet Archive of open web pages.
WAYBACK MACHINE
Encrypted data can only be read with the secret key or password.
True
False
Maintaning Access once a hacker has gained access, they want to keep that
access for future exploitation and attacks.
True
False
He/she breaks into computer systems without authority with a view to identify
weaknesses and reveal them to the system owner.
Black hat
Grey hat
a.White hat
True
False
True
False
Malware
Zero Day threat
Firewall
Worm
True
False
To protect an organization from every possible cyber attack is feasible, for a
few reasons.
True
False
Make sure you set a strong and unique password to secure your wireless
network.
True
False
Infrastructure security
Cloud security
Application Security
Cryptography
Cyber warfare
Economic Warfare
Hacker Warfare
Psychological warfare
Traditional Data
Modern Data
Big Data
Data
The term " Social Engineering " can be defined in various ways, relating to
both physical and cyber aspects of that activity.
Socialis
Damage
Any person who wilfully attempts to commit any of the offenses enumerated in
this act shall be held liable.
True
False
True
False
True
False
True
False
Another Google search engine, but quite different from its prime engine.
GOOGLE SCHOLAR
True
False
Phishing
Malware
Ransomware
RAT
The goal of the attackers is financial gain, because they hold the company’s
data for ransom until they are paid. This is an example of
RANSOMED COMPANIES
Intelligence-based warfare
Command and Control warfare
Electronic warfare
Child Pornography
Cybersex
Libel
Turn off the wireless home network when you’re not at home.
True
False
A hacker who use hacking to send social, religious, and political, etc.
messages.
Script kiddies
Phreaker
Hacktivist
True
False
PHISHING
This record may also include contact information, health and immunization
records, and special education records including individualized education
programs (IEPs).
Education Records
Medical Records
Employment and Financial Records
True
False
True
False
Turning off your network devices, it minimizes the chances of becoming a
target for hackers.
Noise reduction
Security reasons
Surge protection
True
False
Once all the required sensitive information has been collected, the social
engineer may move on to the next target or move towards exploiting the
actual system under consideration.
True
False
Facebook, Google, Twitter, Amazon, eBay, and almost every other significant
online site or service did not exist just twenty years ago.
True
False
The Social Engineer has to make a clear exit in such a way so as to divert any
kind of unnecessary suspicion to himself.
True
False
UTILITY
When Princess logged onto her bank’s website, the hacker hijacked her
session, and gained access to her bank accounts. This is an example of
HIJACKED PEOPLE
A _____ is a valuable resource for security researchers.
Google hacking
True
False
PHREAKER
PAYLOAD
True
False
True
False
HACKING
14 This record may also include contact information, health and immunization
records, and special education records including individualized education
programs (IEPs).
Medical Records
Education Records
Employment and Financial Records
USB sticks are an excellent vehicle for infecting countless PCs and laptops.
True
False
INCIDENT RESPONSE
True
False
Hacktivist
Phreaker
Script kiddies
The first thing you should do is to change the name of your Wi-Fi network.
True
False
The organization entrusts the cybersecurity specialist with the most sensitive
data and resources.
SOCIALIS
The cybersecurity specialist needs to understand how the law and the
organization’s interests help to guide ethical decisions.
True
False
CLOUD SECURITY
True
False
True
False
Poverty
True
False
True
False
Power
Phishing
Dumpster Diving
Trojan horses
Scanning this step will take the findings from footprinting and begin to drill-
down a bit further.
True
False
New and innovative solutions are needed, raising the appeal of new entrants
to the information security market.
True
False
Infrastructure security
Vulnerability management
Incident response
Cloud security
True
False
INURL
A hacker who gains unauthorized access to computer systems for personal
gain.
Grey hat
White hat
Black hat
True
False
True
False
MALWARE
You can use the _____ to find anything in the title of the website. Which also
could be usefull to find downloads or anything else.
INTITLE
True
False
This data has created a new area of interest in technology and business.
Modern Data
Data
Traditional Data
Big Data
It is a form of malware which locks a user out of his own system and cuts
access to his/her files.
Ransomware
Zero Day threat
Spoofing
Phishing
Threat actors include, but are not limited to, amateurs, hacktivists, organized
crime groups, state-sponsored and terrorist groups.
True
False
Cybersecurity personnel are needed from large start-ups and businesses that
are run out of a home to large corporations as well.
True
False
You can find literally everything using _____ you could even use the inurl
dorks whit this.
INTEXT
The reach of cybercrime is growing by the minute, and is now at a point where
consumers and regulators are demanding action.
Shoulder Surfing
Trojan horses
Role playing
Make sure to protect your devices using limited security layers consisting of
specialized security software such as updated antivirus programs and traffic
filtering software.
True
False
Information
education, formation
It is the act of creating and using Websites and e-mails designed to look like
those of well known legitimate businesses, financial institutions and
government agencies to deceive Internet users.
Role playing
Phishing
Trojan horses
FOUR
Although the modern home networks are much quieter these days, disabling
your wireless home network can add calmness to your home.
Surge protection
Noise reduction
Security reasons
in fact a Metasearch Engine (it gets its outcomes by utilizing other web
indexes).
Yippy
True
False
Application Security
Cryptography
Infrastructure security
Cloud security
Companies do not train their people to be helpful, but they rarely train them to
be part of the security process.
True
False
Wealth
Security it can be defined as referring to all the measures that are taken to
protect a system, application or a device as well as ensuring that only people
with permission to access them are able to.
True
False
It encompasses the use of information against the human mind (rather than
against computer support).
Cyber warfare
Psychological warfare
Economic Warfare
Hacker Warfare
All of us have come across some or the other job that requires us to do many
specified set of activities and to linger around looking for better ways of doing
that activity.
True
False
Cybersecurity is a single concept.
True
False
Acquisition of domain name over the Internet in bad faith to profit, mislead,
destroy reputation, and deprive others from the registering the same.
Computer-related Forgery
Cyber-squatting
Misuse of devices
14. Although the modern home networks are much quieter these days,
disabling your wireless home network can add calmness to your home.
Noise reduction
Surge protection
Security reasons
CYBER WARFARE
True
False
True
False
Addiction
TRUE
Child Pornography
Libel
Cybersex
It is a kind of malware attack which infected USB drives into the PLCs and
eventually damaged many of these centrifuges.
STUXNET WORM
True
False
True
False
CEI was one of the first organizations to recognize the ethical and public
policy issues arising from the rapid growth of the information technology field.
True
False
A hacker who use hacking to send social, religious, and political, etmessages.
Phreaker
Hacktivist
Script kiddies
Belonging
True
False
ENCRYPTION
NO ONE IS IMMUNE
Cyber security is the ongoing effort to protect these networked systems and
all of the data from authorized use.
True
False
Entertainment
True
False
Is a person who finds and exploits the weakness in computer systems and/or
networks to gain access.
HACKER
Malware
Spoofing
Zero Day threat
Phishing
GOOGLE HACKING
Cryptography
Application Security
Cloud security
A hacker who gains access to systems with a view to fix the identified
weaknesses.
Grey hat
White hat
Black hat
Hacker Warfare
Cyber warfare
Economic Warfare
Psychological warfare
Spam
Brute Force Attack
Phishing
Spoofing
Cyber Security involves protecting key information and devices from cyber
threats.
True
False
This is one of the search engines that will help you dig deep and get the
results which may be missing on Google and Bing.
PIPL
True
False
True
False
You can find literally everything using _____ , you could even use the inurl
dorks whit this.
Intext
The attacker makes the person more emotionally sure of himself/herself and
thus removing the logical awareness of the security breach that is occurring.
True
False
Encrypting data in transit and data at rest helps ensure data confidentiality
and integrity.
Application Security
Cryptography
Infrastructure security
Cloud security
DDOS
True
False
The reach of cybercrime is growing by the hour, and is now at a point where
consumers and regulators are demanding action.
True
False
Trojan horses
Role playing
Phishing
True
False
Economic Warfare
Hacker Warfare
Cyber warfare
Psychological warfare
Professions
Revenge
Hacktivists are hackers who protest against a variety of political and social
ideas.
True
False
SURFWAX
True
False
Cybercriminals are getting better at circumventing firewalls and antivirus
programs.
True
False
True
False
True
False
Gaining Access is the phase where the immature hacking takes place.
True
False
Bedroom
Middle of the house
Kitchen
Living Room
Unlike Google, this search engine does not track your activities, which is the
first good thing about it.
DUCKDUCKGO
Unlawful or prohibited acts defined and punishable by Republic Act No. 9775.
Child Pornography
Cybersex
Libel
It deals with the protection of internal and extranet networks, labs, data
centers, servers, desktops, and mobile devices.
Infrastructure security
Application Security
Cryptography
Cloud security
True
False
When you power off your network device, you also lower the possibility of
being damaged by electric power surges.
Surge protection
Noise reduction
Security reasons
The Computer Ethics Institute is not a resource for identifying, assessing, and
responding to ethical issues throughout the information technology industry.
True
False
TRUE
True
False
Electronic warfare
Command and Control warfare
Intelligence-based warfare
A software robot that runs automated tasks (scripts) over the Internet.
INTERNET BOT
Malware
Ransomware
Phishing
Zero Day threat
True
False
Integrity refers to methods of ensuring that the data is real, accurate and
guarded from unauthorized user modification.
True
False
True
False
FALSE - NEW
_____ in fact a Metasearch Engine (it gets its outcomes by utilizing other web
indexes).
YIPPY
True
False
Integrity defends values with courage + resist temptations.
True
False
The trust that the social engineer is gaining will later be used to unveil
confidential pieces of information that could cause severe harm to the
business.
True
False
True
False
thumb drives
Email account
CDs/DVDs
external hard drive