1.
What category of ICT do online or web security cameras fall under?
Hint
2.
Here, the computer is used to store data and instructions.
3.
The feature of information security where sensitive data or information can be accessed only by an authorized person and should be reserved away from all those who are not authorized to access it.
4.
What (ICT) term refers to the theft of sensitive information by nation-states or other organizations for strategic or competitive advantage.
5.
It is an office created under RA 10175 established for policy coordination among concerned agencies and for the formulation and enforcement of the national cyber security plan.
6.
There is no universally accepted definition of cybercrime.
7.
Which computer organization is referred to when major operations are performed using addition, subtraction, multiplication, division, logic, and comparison?
8.
It refers to those persons or individuals who use tools and techniques to gain unauthorized access to a computer system or network, with the intention of causing harm, stealing information, or committing other criminal offenses.
9.
In accordance with the Declaration of Policy of RA 10175 under section 2, the government acknowledges the significant role that industries related to information and communication, such as content creation, telecommunications, broadcasting, e-commerce, and data processing, play in the overall growth and development of the country.
10.
Programs, apps, and online services often have vulnerabilities, providing avenues for attackers. Detecting these vulnerabilities can be challenging, especially for large and frequently changing software projects.
11.
It decides when to start receiving data, when to stop it, where to store data, etc. It takes care of step-by-step processing of all operations inside the computer.
12.
Among its powers is to monitor cybercrime cases being handled by participating law enforcement and prosecution agencies. What government agency has such power?
13.
The declaration of policy is like the opening statement of a speech, explaining the purpose and intention behind the law. It helps to guide the interpretation and application of the law by providing a framework for understanding its objectives and scope. What does the Declaration of Policy under Sec. 2 of Republic Act 10175, known as Cybercrime Prevention Act of 2012 seek to protect?
14.
When ICT is the target of the offense, this cybercrime negatively affects the confidentiality, integrity and/or availability of computer data or systems.
15.
It ensures that sensitive information is kept private and only accessed by authorized individuals or entities. This protects against unauthorized disclosure of sensitive data, which can result in financial loss, reputational damage, or legal liability.
16.
It refers to the devices externally connected to the computer.
17.
Which of the following statements best describes a challenge faced in addressing cybercrime?
18.
It refers to an act that violates the law, which is perpetrated using information and communication technology (ICT) to either target networks, systems, data, websites and technology or facilitate a crime.
19.
Without the intention of illegally accessing the confidential information of the local government's website, Mr. W was able to access such documents not available to the public by using Google search indexing. Which principle of cryptography is compromised?
20.
In the context of computer security, what is the goal to actively minimize threats and potential damage as to risk management approach in designing secure systems?
21.
Scribd.com, Academia.com, Slideshare.net, Coursehero.com, Studocu.com, and other file-sharing sites for educational materials are accessible on the internet. To prevent further fraud and illegal downloading, administrators use software or systems to block users by region for suspected illegal acts, through Internet Protocol (IP) bans or geolocking. What process is involved here?
22.
Mr. W was able to access the school's WiFi when one of the professors shared the password. Mr. W is engaging in the act of hacking.
23.
It refers to a crime that 'knows no physical or geographic boundaries' and can be conducted with less effort, greater ease, and at greater speed.
24.
It refers to professionals who are authorized by the owners of the system to test the system’s security and report back on any vulnerabilities found rather than causing harm or stealing information..
25.
What term refers to the introduction of viruses, worms, Trojan horses, and other malicious software for the purpose of hacking or destroying ICT systems?
26.
To be safe, information must be protected against illegal access (confidentiality), protected from unlawful change (integrity), and accessible only to authorized parties when needed (availability). This refers to what principle?
27.
It refers to the process of entering data and programs into the computer system.
28.
When accessing a secure online platform, for example Facebook, users expect their personal information to remain unchanged and intact throughout the registration process. If any unauthorized modifications occur, which principle of Cryptography is compromised?
29.
The data sent by the sender must reach the receiver accurately, completely, and reliably, without any alterations. If alterations occur, which principle of Cryptography is violated?
30.
One of the processes of assessing and mitigating risks involves setting boundaries and limitations to find the right balance in scope. This refers to?
31.
What is defined as any type of software designed to cause harm to a computer system or network?
32.
Which law enforcement agency or authorities are responsible for the efficient and effective enforcement of the provisions of RA 10175?
33.
Scribd.com, Academia.com, Slideshare.net, Coursehero.com, Studocu.com, and other file-sharing sites for educational materials are accessible on the internet. When evaluating these sites for potential fraud limiting it from multiple countries or user access, what process of assessing and mitigating risks is involved?
34.
One of the processes of assessing and mitigating risks involves interpreting the results in the context of either explicit risk acceptance or implementing countermeasures to mitigate the risk. This refers to?
35.
What is a type of malware that encrypts an organization’s data and demands payment for the decryption key?
36.
As per Europol's definition of cybercrime, it encompasses any offense that can solely be perpetrated through the use of computers, computer networks, or other forms of information and communication technology.
37.
Malicious attacks, such as Distributed Denial of Service (DoS) attacks, involve overwhelming a server with unnecessary requests, disrupting service for legitimate users. As a result, users may be unable to access a site due to the voluminous traffic. Which principle of cryptography is violated?
38.
The last paragraph of Sec. 2 of RA 10175 states: 'In this light, the State shall adopt sufficient powers to effectively prevent and combat such offenses by facilitating their detection, investigation, and prosecution at both the domestic and international levels and by providing arrangements for fast and reliable international cooperation.' This is referred to as:
39.
It ensures that the information created and stored by an organization is accessible to authorized parties.
40.
Hacking is not always a malicious activity.
41.
Challenges arise in international cooperation, particularly in extradition processes, which facilitate the enforcement of cybercrime at the international level. Which government agency handles this challenge?
42.
In the context of computer security, what is defined as the probability of an adverse event occurring, considering both the likelihood of the event and its potential impact?
43.
It refers to the right to be free from unwarranted exploitation of one’s person or from intrusion into one’s private activities in such a way as to cause humiliation to a person’s ordinary sensibilities.
44.
Data collection on social media platforms poses a concern for _________________ .
45.
What term refers to targeted attacks that are carried out over a long period of time by skilled attackers who seek to gain unauthorized access to sensitive data or systems?
46.
RA 10175, also known as the Cybercrime Prevention Act of 2012, follows which principle or definition of cybercrime?
47.
These threats come from within an organization, such as employees or contractors who misuse their access to sensitive information or systems, either intentionally or unintentionally.
48.
It refers to the discrepancies in internet access across the globe.
49.
What process involves utilizing a matrix-based system, commonly used across various industries, that correlates the severity of a threat with the probability of its occurrence?
50.
It refers to the accuracy, trustworthiness, and original form of data, and it must be regularly updated by authorized individuals using permitted procedures.