MDTI
The Enemy
Deployment
100

Notebook computers include a finger reader mounted near the keyboard or the Touchpad.

What is Fingerprint scanning?

100

Malicious Software

What is MALWARE?

100

Email designed to trick people into opening an attachment

What is Phishing Email?

200

According to Thytoctic, 80% of all cyber security attacks involve a weak or stolen password. Changing your password quarterly reduces your risk of exposure and avoids a number of IT Security dangers.

What is 90 day password expiry?

200

Attaches itself to legitimate programs or files and spreads by infecting other files or programs.

What is a virus?

200

Universal Serial Bus

What is a USB?

300

Our process of informing IT team of all suspicious message correspondence.

What is Malicous email reporting?

300

Encrypts files or locks the system, demanding a payment

What is a Ransomware?

300

Allows users and admins to remotely connect to Window's PC.

What is Remote Desktop Protocol?

400

The administrator of this network has restricted access to sites categorized as Online Shopping.

What is Website blocking?

400

Designed to secretly monitor and collect information about a user's activities without their consent

What is a Spyware?

400

Onel de Guzman, a then-24-year-old computer science student at AMA Computer College and resident of Manila, Philippines, created the malware.

What is love bug virus?

500

no corporate email on Facebook, Lazada, Shopee and the likes.

What policy of registering corporate email?

500

Disguised as legitimate software or files.

What is a Trojan horse?

500

It consumes system resources, slows down networks, and can deliver additional payloads like backdoors or ransomware.

What is a Worm?

M
e
n
u