PAFIACAT Module 1 To 4 As of 30 October 2023 1
PAFIACAT Module 1 To 4 As of 30 October 2023 1
REVIEWER
What defenses does host-based intrusion detection have against local network insider attacks?
Which of the following should you do when you access your information system from an unsecured
workstation, such as an internet cafe, or using a borrowed computer?
What is the most basic protection that can be done for desktops, laptops, tablets and smartphones?
a.) Selected personnel accessing the PAF Information Assurance using the PAF network.
b.) All PAF personnel using the PAF information system, network infrastructure, and digital
devices.
c.) Personnel using the PAF network only
Which strategy do retailers employ to make sure that their online customers can't afterwards dispute
making the purchase?
a.) Confidentiality
b.) Authenticity
c.) Non-repudiation
d.) Availability
If you are accessing websites that are http:// , what will happen to all the data that are passing through
the wires?
It involves assurance that all information systems are protected and not tampered with. This also
ensures that the data is an accurate and unchanged representation of the original secure information.
a.) Integrity
b.) Non repudiation
c.) Confidentiality
d.) Authenticity
It is the accessibility and readiness of a system or resource to carry out its intended functions at any
time.
a.) integrity
b.) clarity
c.) availability
d.) authenticity
Bitdefender, Kaspersky, McAfee, and Avast are just some third-party _____________ that can be used to
______________ our PAF information system.
It is defined as Information Operations that protect and defend the information and its systems by
ensuring their availability, integrity, authentication, confidentiality, and non-repudiation
Which part of the CIA triad has been compromised when an unauthorized person can access someone
else’ personal information?
Your officemate test results from his most recent exam have accidentally been sent to you. Which part of
the CIA triad has been compromised?
a.) Integrity
b.) Authenticity
c.) Confidentiality
d.) Availability
Which of the following can help to ensure the integrity of the data?
a.) Email
b.) Voice over internet protocol
c.) Microsoft word
d.) Web browser
MODULE 2 - CYBERSECURITY
Publishing malicious apps, repackaging legitimate apps, using fake security apps and smishing are
examples of ______________________.
It is the practice of sending an illegitimate email falsely claiming to be from a legitimate site in an
attempt to acquire a user's personal information.
a.) Mimic
b.) Phishing
c.) Vishing
These terms are used to describe those who seek to exploit weaknesses in software and computer
systems for their own gain, except for?
a.) intruder
b.) ethical hacker
c.) hacker
d.) attacker
It refers when an authorized individual unintentionally permits an unauthorized person or device to get
access to, pass through, or connect to a secure door or network.
a.) Vishing
b.) Tailgating
c.) Piggybacking
d.) Phishing
It is an impersonation technique in which the attacker trick individuals to reveal personal information
using voice technology
a.) Vishing
b.) Spoofing
c.) Mimic
d.) Phishing
A situation in which an unauthorized person can view another user's display or keyboard to learn their
password or other confidential information is referred to as:
Cyber Security is protecting networks, devices, & data from unauthorized access & the practice of
ensuring confidentiality, integrity, and ___________.
a.) mendacity
b.) availability
c.) publicity
d.) duplicity
PAF INSURANCE ASSURANCE AND CYBERSECURITY AWARENESS TRAINING
REVIEWER
While conducting web research that would help in making a better purchasing decision, a user visits a
series of Facebook pages and blogs containing fake reviews and testimonials in favor of a paid app
intentionally infected with malware. Which social engineering principle applies to this attack scenario?
a.) Authority
b.) Scarcity
c.) Consensus
d.) Intimidation
These are windows that suddenly pop-up, while surfing the internet and ask for the user's information to
login or sign in.
The most common human-based social engineering technique where the attacker pretends to be
someone legitimate or an authorized person.
a.) Vishing
b.) Phishing
c.) Impersonation
A type of social engineering which is carried out with the use of desktop and laptop
A type of social engineering which published malicious apps and repacking of legitimate apps.
Social engineering technique whereby attackers, under the disguise of a legitimate request, attempt to
gain access to confidential information is commonly referred to as:
a.) Phishing
b.) Backdoor access
c.) Privilege escalation
d.) Shoulder surfing
PAF INSURANCE ASSURANCE AND CYBERSECURITY AWARENESS TRAINING
REVIEWER
It refers to flaws in software, firmware, or hardware that can be exploited by an attacker to perform
unauthorized actions on a system.
a.) Variables
b.) Hardware
c.) Vulnerabilities
d.) Software
These terms are used to describe those who seek to exploit weaknesses in software and computer
systems for their own gain, except for?
a.) Hacker
b.) Attacker
c.) Ethical hacker
d.) Intruder
A hardware device or small software program that monitors and records each keystroke on the user's
computer keyboard
a.) keylogger
b.) trojan
c.) root kit
d.) virus
a.) backdoors
b.) software updates
c.) malwares
d.) windows
It is one of the Windows security features that lets you see any threats that currently exist on your
device and the device's scanned history.
Protects computers, information, and services from unauthorized access, change, or destruction.
Self-replicating virus that does not alter files but resides in the computer memory and replicates itself.
a.) rootkit
b.) keylogger
c.) worm
d.) backdoor
A set of programs or utilities that allows someone to maintain root-level access to the system.
a.) rootkit
b.) keylogger
c.) worm
d.) logic bomb
It ensures that system changes are made only with the administrator's approval.
The following are the main objectives of computer security, except for?
a.) Confidentiality
b.) Availability
c.) Integrity
d.) Authenticity
_____ keeps the user abreast of the latest online threats without the user having to visit the vendors
website to stay up to date
a.) keylogger
b.) rootkit
c.) trojan
d.) logic bomb
PAF INSURANCE ASSURANCE AND CYBERSECURITY AWARENESS TRAINING
REVIEWER
A program that replicates by copying itself to another program, system boot sector, or documents and
alters or damages the computer files and applications
a.) virus
b.) keylogger
c.) trojan
d.) backdoor
a.) backdoor
b.) malware
c.) patches
d.) worms
a.) keylogger
b.) works
c.) ransomware
d.) virus
Which antivirus approach enables the AV software to either delete or repair the file by removing or
isolating the virus if a piece of code in the file matches that of any virus in the dictionary?
Which threat to the system security refers to an unauthorized mean of accessing the system and
bypassing the security mechanisms?
a.) backdoor
b.) virus
c.) rootkit
d.) worm
a.) P@ssw0rd
b.) pass123
c.) KeepY0urPassw0rdSafe!
d.) keeppasswordsafe!
______ centralizes the management of users, computers and other objects within the Philippine Air
Force Network.
How would you create multiple levels of security that significantly reduce the risk of a data breach?
It is the process of naming, storing and retrieving the files in an organized and efficient way.
These are copies of files and folders that Windows automatically saves as part of a restore point.
a.) state
b.) filename
c.) path
a.) folder
b.) cabinet
c.) storage media
It is a file recovery tool that is used to recover deleted files from a medium
a.) folder
b.) properties
c.) computer file
Recuva shows all the files that it can find. Each file displayed has a color indication for the likelihood of a
successful recovery. Which color denotes excellent possibility for recovery?
a.) green
b.) yellow
c.) red
d.) orange
PAF INSURANCE ASSURANCE AND CYBERSECURITY AWARENESS TRAINING
REVIEWER
It is one of the best practices in file management in which you create multiple categories of folders, and
within those categories, there are more specific categories of folders.