FQ2 Flashcards
(36 cards)
What cyber attack in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed in an unauthorized fashion?
Data Breach
With the assistance of GCash, agents of the NBI CCD were able to put behind bars individuals suspected of defrauding GCash customers. GCash has worked closely with law enforcement agencies, including the NBI-CCD and the PNP-ACG, to deliver an above-and-beyond customer experience and identify fraudsters abusing its platform. What type of fraud was committed here?
cybercrime
Which of the following is an example of a Personal Information Data?
email account name
What results a malicious insider that partners with an outsider to provide unauthorized access to physical and digital systems?
Collusion
Which principle should be applied in this scenario: A marketing agent must be able to submit his marketing pieces to his supervisor tonight e-mail system isn’t responding to requests at that time?
availability
What attacker accesses a computer illegally but has the intent of destroying data, stealing information, or other malicious actions.
cracker
What is a collective term that describes the resources employed to protect online identity, data, and other other assets.
Digital security
What network attack uses submitting of malicious codes to compromise the network to access sensitive information such as user passwords?
SQL injections
Which specific group of people have an excellent computer and networking skills and are hired to break into a specific computer and steal its proprietary data and information.
corporate spies
Which of the following is NOT a digital security risk.
system login
This happens when someone uses another person’s financial or personal data, usually for monetary gains. The fraudster takes sensitive information like names, birthdates, social security numbers, driver’s license details, addresses, bank numbers or credit card numbers. Choose the best answer
Information theft
They often gain access by exploiting human vulnerabilities, convincing other people to hand over credentials or sensitive data.
Social Engineering
Which type of network attack uses a bombardment and overwhelming of enterprise servers with fraudulent traffic?
DDOS
What access to an information system or network that violates the owner or operator’s stated security policy?
Unauthorized Access
What are mistakes/error found in software; also they annoying but harmless unless they pose as significant weaknesses to exploit to gain unauthorized access to applications, networks, operating systems, or hardware?
Bug
Which principle means that data and systems should only be used by persons who are authorized to use them and not allow outsiders the possibility to change or destroy data or any access to them at all?
confidentiality
Which of the following is not a human factor in information security problems.
fires and other catastrophes
Which event or action could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing capability?
Data Security Risk
What type of an unauthorized access tactic that uses social engineering, phishing, or researching a person to come up with information to gain entry to a system?
Exploiting vulnerabilities
Which any method of verifying a user without requiring the user to provide a password. Proving the user’s identity can instead be done using an alternative factor like a proof of possession factor?
passwordless authentication
What happens if the software are outdated and can cause to create a hole that allows an attacker to sneak malware onto a computer and steal data?
Malware attacks
What tactic used to gain physical access by following an authorized person into a secure building, area, or room disguising as delivery or repair person
Tailgaiting
According to Cybint, 2020, what percentage of cybersecurity breaches are caused by human error?
95%
What is a type of cybercriminal that uses the Internet or network to destroy o damage computers for political reasons?
cyberterrorists