0% found this document useful (0 votes)
40 views28 pages

AIS General

Uploaded by

kinnethmercado01
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views28 pages

AIS General

Uploaded by

kinnethmercado01
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 28

Pause

Unmute

Remaining Time -10:27

1x

Playback Rate

Captions

Fullscreen

1.
1.
2.
3.

ecurity

security agency

malware

virus

information assurance

security email

Hackers often use this to present different content or URLs to human users
and search engines, thereby hiding them under legit looking web material.
 Zero Day threat
 Malware
 Cloaking
 Spoofing

The field of cybercrime is constantly changing, and there’s shortage of


cybercriminals working feverishly to crack the latest code.

 True
 False

It is one of the key weapons for a Social Engineer.

 Phishing
 Trojan horses
 Role playing

Reconnaissance is information Gathering and getting to know the target


systems is the first process in ethical hacking.

 True
 False

Defending against the fallout from state-sponsored cyberespionage and


cyberwarfare will continue to be a priority for cybersecurity professionals.

 True
 False

Handprinting is the technique of accumulating information regarding the


target(s) and the surrounding environment.

 True
 False

Encryption is the process of converting the information into a form where an


unauthorized party cannot read it.

 True
 False
A non-skilled person who gains access to computer systems using already
made tools.

 Phreaker
 Hacktivist
 Script kiddies

Medical Records is every time you go to the doctor’s office, more information
is added to your electronic health records (EHRs).

 True
 False

Usability it can be defined as the degree to which something is able or fit to be


used.

 True
 False

Availability refers to something that is useful or designed for use.

 True
 False

The term "Social Engineering" can be defined in various ways, relating to both
physical and cyber aspects of that activity.

 True
 False

A network security system, which continuously monitors incoming and


outgoing network traffic, and blocks out any untrusted sources to ensure safe
communications.

 Firewall
 Zero Day threat
 Malware
 Cloaking

This engine gives you enormous access to the URL information. It is the front-
end of the Internet Archive of open web pages.
 WAYBACK MACHINE

Encrypted data can only be read with the secret key or password.

 True
 False

Maintaning Access once a hacker has gained access, they want to keep that
access for future exploitation and attacks.

 True
 False

He/she breaks into computer systems without authority with a view to identify
weaknesses and reveal them to the system owner.

 Black hat
 Grey hat
 a.White hat

Dignity protects + promotes dignity of every human being.

 True
 False

A cybersecurity expert is more than just someone working in the company


basement dealing with computers and the myriad of cables that run
throughout the building.

 True
 False

It is a destructive self-contained program which can self-replicate.

 Malware
 Zero Day threat
 Firewall
 Worm

WPA stands for Wi-Fi Protected Access.

 True
 False
To protect an organization from every possible cyber attack is feasible, for a
few reasons.

 True
 False

Make sure you set a strong and unique password to secure your wireless
network.

 True
 False

It focuses on building and hosting secure applications in cloud environments


and securely consuming third-party cloud applications.

 Infrastructure security
 Cloud security
 Application Security
 Cryptography

It involves the use of computer technology to electronically shut down,


degrade, corrupt, or destroy an enemy’s information systems.

 Cyber warfare
 Economic Warfare
 Hacker Warfare
 Psychological warfare

It includes personnel information, intellectual properties, and financial data.

 Traditional Data
 Modern Data
 Big Data
 Data

The term " Social Engineering " can be defined in various ways, relating to
both physical and cyber aspects of that activity.

 Socialis

Ethics is the little voice in the background guiding a cybersecurity specialist as


to what he should or should not do, regardless of whether it is legal.
 True
 False

Damage

 deliberately doing harm, targeted or random

Any person who wilfully attempts to commit any of the offenses enumerated in
this act shall be held liable.

 Attempt in the commission of cybercrime


 Aiding or Abetting in the commission of cybercrime
 Corporate Liability

Peace develops “just cyber warfare”, promote just peace.

 True
 False

Back up Your Data Prevent the loss of replaceable data.

 True
 False

Personal Data is any information about you can be considered to be your


data. This personal information can uniquely identify you as an individual.

 True
 False

Freedom enable fair, just, equitable us of cyberspace.

 True
 False

Another Google search engine, but quite different from its prime engine.

 GOOGLE SCHOLAR

A Cracker is a person who finds and exploits the weakness in computer


systems and/or networks to gain access.

 True
 False

This method is widely used to crack passwords to admin accounts, which in


turn can be used to steal information and documents of paramount
importance.

 BRUTE FORCE ATTACK

A form of malware which can be operated by even an unskilled hacker.

 Phishing
 Malware
 Ransomware
 RAT

The goal of the attackers is financial gain, because they hold the company’s
data for ransom until they are paid. This is an example of

 RANSOMED COMPANIES

It is sensor based - unlike other IW, which directly corrupt technological


systems, intelligence-based warfare is regarded as the "steel to target" IW.

 Intelligence-based warfare
 Command and Control warfare
 Electronic warfare

Unlawful or prohibited acts of libel as defined in Article 355 of the Revised


Penal Code, as amended committed through a computer system or any other
similar means which may be devised in the future.

 Child Pornography
 Cybersex
 Libel

Turn off the wireless home network when you’re not at home.

 True
 False

A hacker who use hacking to send social, religious, and political, etc.
messages.
 Script kiddies
 Phreaker
 Hacktivist

These are Local Backup except for

 external hard drive


 Email account
 thumb drives
 CDs/DVDs

Every Social Engineer targets specific behavioral traits in the victim so as to


extract maximum information out of him.

 True
 False

Is a technique which tricks users into revealing sensitive information (like


usernames, passwords or credit card details) to seemingly benign sources.

 PHISHING

This record may also include contact information, health and immunization
records, and special education records including individualized education
programs (IEPs).

 Education Records
 Medical Records
 Employment and Financial Records

The more an organization is independent upon computers and networking, the


more that organization needs qualified security experts managing and
overseeing every aspect of their infrastructure.

 True
 False

Consumers, businesses and agencies are decreasingly getting hacked.

 True
 False
Turning off your network devices, it minimizes the chances of becoming a
target for hackers.

 Noise reduction
 Security reasons
 Surge protection

Published by the ShadowBroker hacker group, WannaCry tried to infect non-


patched PCs.

 True
 False

Once all the required sensitive information has been collected, the social
engineer may move on to the next target or move towards exploiting the
actual system under consideration.

 True
 False

Facebook, Google, Twitter, Amazon, eBay, and almost every other significant
online site or service did not exist just twenty years ago.

 True
 False

The Social Engineer has to make a clear exit in such a way so as to divert any
kind of unnecessary suspicion to himself.

 True
 False

It refers to something that is useful or designed for use.

 UTILITY

When Princess logged onto her bank’s website, the hacker hijacked her
session, and gained access to her bank accounts. This is an example of

 HIJACKED PEOPLE
A _____ is a valuable resource for security researchers.

 Google hacking

A cybersecurity expert needs to be involved in the actual production


installation of software in order to ensure the proper configuration and
integration with the existing infrastructure.

 True
 False

A hacker who identifies and exploits weaknesses in telephones instead of


computers.

 PHREAKER

It is a cargo of transmitted data over a network.

 PAYLOAD

Much of the hacking activity that consistently threatens our security is


motivated by financial gain.

 True
 False

Privacy protects private spheres and rights (big data).

 True
 False

Refers to activities that seek to compromise digital devices, such as


computers, smartphones, tablets, and even entire networks.

 HACKING

14 This record may also include contact information, health and immunization
records, and special education records including individualized education
programs (IEPs).

 Medical Records
 Education Records
 Employment and Financial Records
USB sticks are an excellent vehicle for infecting countless PCs and laptops.

 True
 False

Is the function that monitors for and investigates potentially malicious


behavior.

 INCIDENT RESPONSE

Cybersecurity is any aspect of any position in an organization that somehow


relates to computer technology and asset protection and how they intersect.

 True
 False

A hacker who identifies and exploits weaknesses in telephones instead of


computer

 Hacktivist
 Phreaker
 Script kiddies

The first thing you should do is to change the name of your Wi-Fi network.

 True
 False

The organization entrusts the cybersecurity specialist with the most sensitive
data and resources.

 SOCIALIS

The cybersecurity specialist needs to understand how the law and the
organization’s interests help to guide ethical decisions.

 True
 False

It uses radioelectronic and cryptographic to degrade communication, thus war


in the realm of communications.
 Command and Control warfare
 Intelligence-based warfare
 Electronic warfare

Focuses on building and hosting secure applications in cloud environments


and securely consuming third-party cloud applications.

 CLOUD SECURITY

Threat actors are individuals or a group of individuals who perform cyber


attacks against another individual or organization.

 True
 False

A Cracker is a person who finds and exploits the weakness in computer


systems and/or networks to gain access

 True
 False

Poverty

 access to info to overcome poverty

Personally identifiable information is any information that can be used to


negatively identify an individual.

 True
 False

Many people are apprehensive in the presence of someone they perceive as


an authority figure.

 True
 False

Power

 cyber-warfare, -intelligence, espionage


The attacker can use these items to get a huge amount of information about
the company organization and network structure.

 Phishing
 Dumpster Diving
 Trojan horses

Scanning this step will take the findings from footprinting and begin to drill-
down a bit further.

 True
 False

New and innovative solutions are needed, raising the appeal of new entrants
to the information security market.

 THE COMPETITIVE MARKET IS REWARDING INNOVATION

New NIST guidelines includes no knowledge-based authentication, such as


information from shared secret questions, marketing data, transaction history.

 True
 False

It is the function that monitors for and investigates potentially malicious


behavior.

 Infrastructure security
 Vulnerability management
 Incident response
 Cloud security

Authenticity or authentication refers to a process that ensures and confirms


the user’s identity.

 True
 False

Basicly looks for anything after the : in the site urls.

 INURL
A hacker who gains unauthorized access to computer systems for personal
gain.

 Grey hat
 White hat
 Black hat

Deleting Your Data permanently means destroying the storage device to


ensure that the data is unrecoverable.

 True
 False

Cybersecurity is about understanding how a system works, where its


weaknesses are, how someone may attempt to take advantage of those
weaknesses, then working to implement protections against any compromise.

 True
 False

A software which acts as a spyware to track a user’s browsing activities


covertly.

 MALWARE

You can use the _____ to find anything in the title of the website. Which also
could be usefull to find downloads or anything else.

 INTITLE

Confidentiality refers to a method of guaranteeing message transmission


between parties using digital signature and/or encryption.

 True
 False

This data has created a new area of interest in technology and business.

 Modern Data
 Data
 Traditional Data
 Big Data
It is a form of malware which locks a user out of his own system and cuts
access to his/her files.

 Ransomware
 Zero Day threat
 Spoofing
 Phishing

Threat actors include, but are not limited to, amateurs, hacktivists, organized
crime groups, state-sponsored and terrorist groups.

 True
 False

Cybersecurity personnel are needed from large start-ups and businesses that
are run out of a home to large corporations as well.

 True
 False

The shortage of cybersecurity professionals spans nearly every region and


every industry in the nation.

 BURNING GLASS REPORT

You can find literally everything using _____ you could even use the inurl
dorks whit this.

 INTEXT

The reach of cybercrime is growing by the minute, and is now at a point where
consumers and regulators are demanding action.

 INCREASING SIZE AND SCALE

This can be performed at a close range as well as at a long range using


binoculars or other vision enhancing devices.

 Shoulder Surfing
 Trojan horses
 Role playing
Make sure to protect your devices using limited security layers consisting of
specialized security software such as updated antivirus programs and traffic
filtering software.

 True
 False

Information

 education, formation

It is the act of creating and using Websites and e-mails designed to look like
those of well known legitimate businesses, financial institutions and
government agencies to deceive Internet users.

 Role playing
 Phishing
 Trojan horses

According to Burning Glass Technologies, demand for cybersecurity skills has


increased more than ten times faster than for any other IT jobs.

 FOUR

Although the modern home networks are much quieter these days, disabling
your wireless home network can add calmness to your home.

 Surge protection
 Noise reduction
 Security reasons

in fact a Metasearch Engine (it gets its outcomes by utilizing other web
indexes).

 Yippy

WPA2 stands for Wi-Fi Protection Activated 2.

 True
 False

Equity promotes Internet Governance with equal rights.


 True
 False

It is a broad topic that covers software vulnerabilities in web and mobile


applications and application programming interfaces (APIs).

 Application Security
 Cryptography
 Infrastructure security
 Cloud security

Companies do not train their people to be helpful, but they rarely train them to
be part of the security process.

 True
 False

Wealth

 profit making, economic competition/war

Security it can be defined as referring to all the measures that are taken to
protect a system, application or a device as well as ensuring that only people
with permission to access them are able to.

 True
 False

It encompasses the use of information against the human mind (rather than
against computer support).

 Cyber warfare
 Psychological warfare
 Economic Warfare
 Hacker Warfare

All of us have come across some or the other job that requires us to do many
specified set of activities and to linger around looking for better ways of doing
that activity.

 True
 False
Cybersecurity is a single concept.

 True
 False

Acquisition of domain name over the Internet in bad faith to profit, mislead,
destroy reputation, and deprive others from the registering the same.

 Computer-related Forgery
 Cyber-squatting
 Misuse of devices

14. Although the modern home networks are much quieter these days,
disabling your wireless home network can add calmness to your home.

 Noise reduction
 Surge protection
 Security reasons

Refers to the use of technology to launch attacks on nations, governments


and citizens, causing comparable harm to actual warfare using weaponry.

 CYBER WARFARE

Functionality it can be defined as the purpose that something is designed or


expected to fulfill.

 True
 False

Utility is referring to the ability to access information or resources in a


specified location and in the correct format.

 True
 False

Addiction

 addicted gaming, dependency

Is a software program designed by hackers to hijack computer systems or


steal sensitive information from a device.
 MALWARE

Twenty-five percent of organizations describe a shortage of employees with


in-demand skills, Symantec reports, and 83 percent of companies say they
lack the skills and resources to protect their IT interests.

 TRUE

Willful engagement, maintenance, control, or operation, directly or indirectly,


of any lascivious exhibition of sexual organs or sexual activity, with the aid of
a computer system, for favor or consideration.

 Child Pornography
 Libel
 Cybersex

It is a kind of malware attack which infected USB drives into the PLCs and
eventually damaged many of these centrifuges.

 STUXNET WORM

Nonrepudiation in terms of computer systems means allowing authorized


users to access sensitive and protected information.

 True
 False

Inclusiveness reduces the gap between digital winners and digitariat.

 True
 False

CEI was one of the first organizations to recognize the ethical and public
policy issues arising from the rapid growth of the information technology field.

 True
 False

A hacker who use hacking to send social, religious, and political, etmessages.

 Phreaker
 Hacktivist
 Script kiddies
Belonging

 networking, family, peer groups, identity

Security is the obligation to protect and the right to forget.

 True
 False

A process of encoding a message or information to make it unreadable and


secretive.

 ENCRYPTION

Consumers, businesses and agencies are increasingly getting hacked.

 NO ONE IS IMMUNE

Cyber security is the ongoing effort to protect these networked systems and
all of the data from authorized use.

 True
 False

Entertainment

 gaming, distraction, adrenalin kick

Hacking refers to activities that seek to compromise digital devices, such as


computers, smartphones, tablets, and even entire networks.

 True
 False

Is a person who finds and exploits the weakness in computer systems and/or
networks to gain access.

 HACKER

It is a technique which tricks users into revealing sensitive information (like


usernames, passwords or credit card details) to seemingly benign sources.

 Malware
 Spoofing
 Zero Day threat
 Phishing

A _____ is a valuable resource for security researchers.

 GOOGLE HACKING

A broad topic that covers software vulnerabilities in web and mobile


applications and application programming interfaces (APIs).

 Cryptography
 Application Security
 Cloud security

A hacker who gains access to systems with a view to fix the identified
weaknesses.

 Grey hat
 White hat
 Black hat

It refers to the use of technology to launch attacks on nations, governments


and citizens, causing comparable harm to actual warfare using weaponry.

 Hacker Warfare
 Cyber warfare
 Economic Warfare
 Psychological warfare

It refers to a threat which is undocumented and hence hidden from any


antivirus scanner installed on the system.

 Brute Force Attack


 Zero Day threat
 Botnets
 White hat

It is one of the scariest methods to perform a cyber intrusion mostly because it


goes undetected.

 Brute Force Attack


 Phishing
 Spam
 Rootkit

This hacking terminology is commonly associated with e-mails.

 Spam
 Brute Force Attack
 Phishing
 Spoofing

Cyber Security involves protecting key information and devices from cyber
threats.

 True
 False

This is one of the search engines that will help you dig deep and get the
results which may be missing on Google and Bing.

 PIPL

Dominant information security companies and antivirus programs alone are


match for growing cyber threats, according to Gartner analysts.

 True
 False

Examples of PII include:

 Social security Number


 Credit card numbers
 Name
 Birth date
 All of the above
 None of the above

Cybersecurity is a term often tossed around as if it means something specific.

 True
 False
You can find literally everything using _____ , you could even use the inurl
dorks whit this.

 Intext

The attacker makes the person more emotionally sure of himself/herself and
thus removing the logical awareness of the security breach that is occurring.

 True
 False

Encrypting data in transit and data at rest helps ensure data confidentiality
and integrity.

 Application Security
 Cryptography
 Infrastructure security
 Cloud security

This hacking terminology is highly common among hackers and is a major


concern for website owners and developers.

 DDOS

The personnel information includes application materials, payroll, offer letters,


employee agreements, and any information used in making employment
decisions.

 True
 False

The reach of cybercrime is growing by the hour, and is now at a point where
consumers and regulators are demanding action.

 True
 False

It is one of the most predominant methods currently used by hackers that


involve tricking the victims to download a malicious file to the system.

 Trojan horses
 Role playing
 Phishing

WEP stands for Wired Equivalent Policy.

 True
 False

The effectiveness of an information blockade presumes an era in which the


well-being of societies will be as affected by information flows as they are
today by flows of material supplies.

 Economic Warfare
 Hacker Warfare
 Cyber warfare
 Psychological warfare

Professions

 knowledge, increasing job professionalism

Revenge

 targeted damage, e.g. mobbing, bullying

Hacktivists are hackers who protest against a variety of political and social
ideas.

 True
 False

A subscription-based search engine. It has a bunch of features apart from


contemporary search habits.

 SURFWAX

WPA2 stands for Wi-Fi Protection Activated 2

 True
 False
Cybercriminals are getting better at circumventing firewalls and antivirus
programs.

 True
 False

Cyber attacks are intentional, malicious acts meant to positively impact


another individual or organization.

 True
 False

Published by the ShadowBroker hacker group, WannaCry tried to infect non-


patched PCs.

 True
 False

Gaining Access is the phase where the immature hacking takes place.

 True
 False

The router is best place in which part of the house?

 Bedroom
 Middle of the house
 Kitchen
 Living Room

Unlike Google, this search engine does not track your activities, which is the
first good thing about it.

 DUCKDUCKGO

Unlawful or prohibited acts defined and punishable by Republic Act No. 9775.

 Child Pornography
 Cybersex
 Libel

It deals with the protection of internal and extranet networks, labs, data
centers, servers, desktops, and mobile devices.
 Infrastructure security
 Application Security
 Cryptography
 Cloud security

Means by which hackers deliver a payload to systems and networks are


called operating system attack.

 True
 False

When you power off your network device, you also lower the possibility of
being damaged by electric power surges.

 Surge protection
 Noise reduction
 Security reasons

The Computer Ethics Institute is not a resource for identifying, assessing, and
responding to ethical issues throughout the information technology industry.

 True
 False

There is an acute shortage of professionals trained to protect vital computer


networks and electronic infrastructures from attacks.

 TRUE

Information Warfare is described as “a struggle over the information and


communications process”

 True
 False

A military strategy that applies information warfare on the battlefield in order to


separate the command structure of the opponents’ from the units they
command.

 Electronic warfare
 Command and Control warfare
 Intelligence-based warfare

A software robot that runs automated tasks (scripts) over the Internet.

 INTERNET BOT

A software program designed by hackers to hijack computer systems or steal


sensitive information from a device.

 Malware
 Ransomware
 Phishing
 Zero Day threat

Increase your Wi-Fi security by deactivating network encryption.

 True
 False

Integrity refers to methods of ensuring that the data is real, accurate and
guarded from unauthorized user modification.

 True
 False

Honesty enables participation of all in pricing and laws.

 True
 False

Cybersecurity professionals are needed to develop old models.

 FALSE - NEW

_____ in fact a Metasearch Engine (it gets its outcomes by utilizing other web
indexes).

 YIPPY

Justice use cyberspace with Responsibility, Accountability.

 True
 False
Integrity defends values with courage + resist temptations.

 True
 False

The trust that the social engineer is gaining will later be used to unveil
confidential pieces of information that could cause severe harm to the
business.

 True
 False

Cybersecurity is really a mindset of understanding the value of assets,


perceiving the vulnerabilities, comprehending the potential exploits and
attacks, and implementing the proper response to maximize compromise.

 True
 False

Some hackers plant virus-loaded ads on legitimate websites, enabling them to


remotely wipe a hard drive clean or cause it to overheat.

 NEW YORK TIMES, 2014

These are Local Backup except for;

 thumb drives
 Email account
 CDs/DVDs
 external hard drive

You might also like