What is the term for a deceptive email that tries to trick you into revealing personal information?
Phishing
What type of malware encrypts your files and demands a ransom for their release?
Ransomware
What does "VPN" stand for?
Virtual Private Network
What is "PII"?
Personally Identifiable Information
What is the first step in incident response?
Preparation
What is a common tactic used in social engineering where an attacker pretends to be someone you trust?
Impersonation
What is a "Trojan Horse"?
Malware disguised as a legitimate program.
What is a firewall?
A security system that controls network traffic.
What is data encryption?
Converting data into an unreadable format.
What is "forensics" in the context of cybersecurity?
The process of investigating a security incident.
What is "pretexting" in the context of social engineering?
Creating a believable scenario to manipulate someone.
What does "antivirus software" do?
Detects and removes malware.
What is the purpose of a strong password?
To protect against unauthorized access.
What is the importance of regularly backing up your data?
To protect against data loss.
What is a "vulnerability assessment"
Identifying weaknesses in a system.
What is a "watering hole" attack?
Compromising a website frequently visited by the target.
What is a "zero-day exploit"?
An attack that takes advantage of a previously unknown vulnerability.
What is a "DDoS" attack?
Distributed Denial of Service attack
What is "data breach"?
A security incident where sensitive data is accessed without authorization.
What is the importance of having an incident response plan?
To ensure a coordinated and effective response to security incidents.
What is the best way to verify the legitimacy of a link in an email
Hover over the link without clicking to see the actual URL, or contact the supposed sender directly through a known, trusted channel.
What is the difference between a virus and a worm?
A virus requires a host file to execute, while a worm can self-replicate and spread independently.
What is "two-factor authentication" (2FA)?
A security measure that requires two forms of verification.
What is the common data privacy Policy and regulation in the Philippines?
The Republic Act 10173, officially known as the Data Privacy Act of 2012 (DPA)
What is a "post-mortem" in incident response?
A review of the incident to identify lessons learned.