0% found this document useful (0 votes)
142 views25 pages

It100 Finals Accumulated Quiz Questions

This document provides definitions and examples related to information security concepts. It tests the reader's understanding through multiple choice questions. Key points covered include: - Examples of security threats like hacking, malware, social engineering, and data breaches. - Definitions of security terms like digital security, risk mitigation, unauthorized access, denial of service attacks, and social engineering. - Scenarios involving principles of security like availability, integrity, and confidentiality. - Types of attackers like hackers, hacktivists, and insiders who obtain unauthorized access. The document serves to educate about common information security risks and verify comprehension of related technical terms and best practices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
142 views25 pages

It100 Finals Accumulated Quiz Questions

This document provides definitions and examples related to information security concepts. It tests the reader's understanding through multiple choice questions. Key points covered include: - Examples of security threats like hacking, malware, social engineering, and data breaches. - Definitions of security terms like digital security, risk mitigation, unauthorized access, denial of service attacks, and social engineering. - Scenarios involving principles of security like availability, integrity, and confidentiality. - Types of attackers like hackers, hacktivists, and insiders who obtain unauthorized access. The document serves to educate about common information security risks and verify comprehension of related technical terms and best practices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 25

LIVING IN THE IT ERA ~ o Insider Leak

o Hacking or malware
FQ1
Which of the following is an example of a
A tactic used to gain physical access by Personal Information Data?
following an authorized person into a secure o routing codes
building, area, or room disguising as delivery o email account name
or repair person. o availability to access systems
o Robbery o assets
o Piggybanking  
o Tailgaiting This describes the resources employed to
o Ransacking protect online identity, data, and other assets.
  o system failure mitigation
It is an act of stealing a person's possessions or o digital security
personal information from a computer o security
o Information Theft o risk mitigation
o Hardware Theft  
o Credit Card Number Theft It is a cyber-attack in which sensitive,
o Software Theft confidential or otherwise protected data has
  been accessed and/or disclosed in an
This is an access to an information system or unauthorized fashion.
network that violates the owner or operator's o Unauthorized Access
stated security policy. o Data Breach
o Access Policy o Malware attacks
o Denial of Access o Drive-by Downloads
o Unauthorized Access  
o Authentication Override This network attack uses a bombardment and
  overwhelming of enterprise servers with
It is any method of verifying a user without fraudulent traffic.
requiring the user to provide a password. o DDOS
Proving the user’s identity can instead be done o MDM
using an alternative factor like a proof of o MITM
possession factor. o DOS
o mobile authenticator  
o biometrics They often gain access by exploiting human
o PIN vulnerabilities, convincing other people to hand
o passwordless authentication over credentials or sensitive data.
  o Eye-to-eye contact
It is a program that enables users to install o Psychological Manipulation
administrative remoted access on devices o Mental Telepathy
including laptops, phones, to monitor activities o Social Engineering
and perform remote access.  
o Access Programs This occurs when malicious parties intercept
o M2M traffic conveyed between networks and external
o MDM data sources or within a network.
o Authentication Management o DOS
  o DDOS
Select ALL that apply. Example of data breach. o SQL injections
o Hardware failure o MITM
o Stolen Data  
It is a more of an ideology than mere hacker This occurs when software are outdated and can
group that has many similarities to the cause to create a hole that allows an attacker to
infamous hacking collective 'Anonymous'. sneak malware onto a computer and steal data.
o FilTech Philippines o Malware attacks
o LulzSec o Weak passwords
o Gr3ySh4DoW o System Vulnerabilities
o DarkNet Philippines o Drive-by Downloads
   
A malicious insider partners with an outsider to which of the following is not a human factor in
provide unauthorized access to physical and information security problems.
digital systems. o “No one ever broke into my computer, so
o Door Propping why should I protect it?”
o Collusion o fires and other catastrophe
o Fraudulent Access Cards o ” Well, I can’t be bothered to lock my
o Collision workstation at the computer station while I go
  to the bathroom”
This type of data encompasses information on a o stores his password on a piece of paper e.g.,
patient's health including medical history, under his keyboard.
prescription drugs, health insurance, doctors  
and hospital visits. This occurs when attackers use spam and
o Information phishing email tactics to trick the user into
o PHI revealing user credentials, downloading
o Data malware attachments, or directing users to
o SCI vulnerables websites.
  o System vulnerabilities
It is someone who uses the Internet or network o Cyberterrorism
to destroy o damage computers for political o Hacking
reasons. o Malware attacks
o Cyberspies  
o cyberwarfare It is any event or action that could cause a loss
o Cyberextortionist of or damage to computer or mobile device
o cyberterrorists hardware, software, data, information or
  processing capability.
Determine which principle should be applied in o Digital Risk
this scenario: A marketing agent must be able o Data Security
to submit his marketing pieces to his supervisor o Data Security Risk
tonight, apparently, e-mail system isn't o Information Theft
responding to requests at that time  
o availability This group of people have an excellent
o authentication computer and networking skills and are hired to
o confidentiality break into a specific computer and steal its
o integrity proprietary data and information.
  o unethical employees
It is a mean of protecting all information, o corporate spies
systems, services, and data communications o crackers
appropriately. o script kiddie
o Information Security  
o Data security
o insecurity
o information overload
This network attack uses submitting of
malicious codes to compromise the network to Describes an attack whose goal ranges from
access sensitive information such as user disabling a government’s computer network to
passwords. crippling a country.
o DOS o cyberwarfare
o DDOS o cyberextortionists
o MITM o cyberterrorists
o SQL injections o espionage
   
This principle means that data and systems Which of the following is NOT a digital
should only be used by persons who are security risk.
authorized to use them and not allowing o system login
outsiders the possibility to change or destroy o system failure
data or any access to them at all. o unauthorized access
o integrity o hardware theft
o confidentiality   
o availability A type of an unauthorized access tactic that
o responsibility uses social engineering, phishing, or
  researching a person to come up with
A person who gains unauthorized access to a information to gain entry to a system.
computer files or networks in order to further o Guessing Passwords
social or political ends. o Exploiting vulnerabilities
o Enthusiasts o Social Engineering
o Hacktivists o Stealing passwords
o Activists  
o infotech Which principle supports this situation: data
  and systems are reliable, up-to-date, and they
This is someone who accesses a computer will not change or be changed due to hardware
illegally but has the intent of destroying data, or software defects, natural phenomena or
stealing information, or other malicious actions. human interventions.
o hacker o authenticity
o script kiddie o integrity
o cracker o availability
o corporate spies o authentication
   
These are network attacks where malicious It involves a deliberate act that is against the
parties gain unauthorized access to monitor, law to breach the security of a digital
and steal private data without making any environment.
alterations. o cybercrime
o Passive network attacks o computing crime
o Malware attacks o digital crime
o Active network attacks o crime
o Black hat hackers  
  TRUE OR FALSE: You could make a case for
A _____ is someone who demands payment to calling digital security a sub-type of cyber
stop an attack on an organization’s technology security. Many industry professionals use the
infrastructure. two terms interchangeably, but in reality,
o cyberextortionist digital security protects information, and cyber
o script kiddie security protects the infrastructure, all systems,
o cracker networks, and information.
o cyberterrorist o FALSE
o TRUE o Certificates
LIVING IN THE IT ERA ~  
A security measure that defines who can access
FQ2 a computer, device, or network, when they can
access it, and what actions they can take while
These are digital security tools that bridge the accessing it.
gap between users and the Internet, using o Access Controls
filtering rules in line with an organization's IT o Information Theft
policies. o Email Spoofing
o Antivirus o Vandalism
o Proxies
o Remote Monitoring This is used to detect and protects computer
o Vulnerability scanner and its data from unauthorized intrusions by
  monitoring all transmissions to and from the
It involves defacing or destroying digital computer.
equipment. o Antivirus
o Hardware Vandalism o Proxy server
o Hardware o Personal Firewall
o Hardware Fail o Vulnerability scanner
o Hardware Theft  
  This restricts access to a computer or mobile
It is also called user ID, login name or sign in device until a user performs a specific action.
name. For example, some require a user to swipe
o Identification o Hand Geometry System
o Confidential data o Fingerprint Reader
o Username o Lock Screen
o Access name o Face Recognition
   
A private combination of words, often A group of compromised computers or mobile
containing mixed capitalization and devices connected to a network, such as the
punctuation, associated with a username that Internet, used to attack other networks, usually
allows access to specific computer resources. for nefarious purposes.
o pin o netbots
o credentials o bot
o passphrase o Botnets
o password o Back Doors
 
This device measure's hand to verify user's This system recognizes the shape of
identities. handwritten and measures there pressure
o Hand Geometry System exerted, and the motion used to write.
o Fingerprint Reader o Lock Screen
o Lock Screen o Signature Verification System
o Face Recognition o Iris Recognition System
  o Face Recognition System
It is the process of converting data that is
readable by humans into encoded characters to A set of characters that the originator of the
prevent unauthorized access. data uses to encrypt the plaintext and the
o Backup recipient of the data uses to decrypt the
o Encryption ciphertext.
o Digital Signature o Encryption program
o Encryption Key
o Password o Trojan Horse
o PIN o Spyware
   
It a kind of backup which requires an Internet This tool detects, evaluates, and manages any
connection, otherwise files are marked for weak spots in your organization's system.
backup when the computer goes back online. o Antivirus
o Continuous Data Protection o Network Scanner
o Incremental Backup o Vulnerability Scanner
o Cloud Backup o Remote Monitoring
o Selective Backup  
  This occurs when an intruder computer fools a
It is a program that performs a repetitive task network into believing its IP address is
on a network which is used to send spam via associated with a trusted source.
email, spread viruses and other malware. o Clickjacking
o Back Doors o Email Spoofing
o DoS Attacks o Spoofing
o bot o IP Spoofing
o netbots  
  This outlines the activities for which the
The fraudulent practice of sending text computer and network may and may not be
messages purporting to be from reputable used.
companies in order to induce individuals to o Law
reveal personal information, such as passwords o Access Controls
or credit card numbers. o Procedures
o Spoofing o Acceptable Use Policy
o Phishing  
o Smishing This device authenticates a person's identity by
o Clickjacking translating a person's characteristic into a
  digital code that is compared with a digital code
A computer or mobile device uses two separate stored in a computer or mobile device.
methods, one after the next, to verify the o CCTV Camera
identity of a user. o Sensors
o Authentication o Biometric Device
o Spoofing o Audio recognition system
o Encryption  
o Two-factor verification A program that copies itself repeatedly, for
  example, in memory or on a network, uses up
It is an assault whose purpose is to disrupt resources and possibly shuts down the
computer access to an Internet service service computer, device, or network.
such as the web or email. o Worm
o DDoS Attack o Trojan Horse
o Cyber Attack o Virus
o DoS Attack o Spyware
o API Attack  
  It is a scam in which a perpetrator sends an
Zeus is a malware which uses keystroke official looking email message that attempts to
logging to compromise victim credentials when obtain personal and/or financial information.
the user visits a banking website. What type of o Spyware
malware is Zeus o Clickjacking
o Worm o Malware
o Virus o Phishing
  This occur when someone steals personal or
  confidential information to make fraudulent
is an encrypted code that a person, website, or purchases or gain unauthorized access to a
organization attaches to an electronic message computer.
to verify the message sender's identity. o Access Controls
o password o Information Theft
o pin o Vandalism
o digital signature o Email Spoofing
o digital certificate  
  A set of instructions in a program that allows
It is also called symmetric key encryption, both users to bypass security controls when
the originator and the recipient use the same accessing a program, computer, or network
secret key to encrypt and decrypt the data. o Spoofing
o Digital Signature o Back Doors
o Private Key Encryption o Front Door
o Public Key Encryption o Clickjacking
o Encryption  
  This is also called as cyberforensics which
Identify the image shown below. involves the examination of media, programs,
data and log files on computers, mobile
devices, servers, and networks.
o Forensics
o Cyber investigations
o Digital Pathology
o Digital Forensic
 
This group by Bashar al-Assad targeted
opposition groups akin to a political protest by
o Pin deploying or executing a DDOS attacks.
o CAPTCHA o Syrian Hacktivists
o Possessed Objects o Syrian Electronic Army
o Passphrase o Syrian Black Hat Hackers
  o Syrian Liberation Army
This kind of backup is challenging to manage
individual file backups. Least manageable of all Identify the image shown below.
the backup methods
o Selective Backup
o Cloud Backup
o Continuous Data Protection
o Incremental Backup

It is program that displays an online


advertisement in a banner, pop-up window on
webpages, email messages, or other Internet
services.
o Adware
o Trojan Horse o Passphrase
o Rootkit o Possessed Objects
o Ransomware o CAPTCHA
  o Pin
A technique intruders use to make their
network or Internet transmission appear
legitimate to a victim computer or network. "…everyone shall have the right to freedom of
o DDoS Attack expression; this right shall include freedom to
o Virus Attacking seek, receive and impart information and ideas
o Spoofing of all kinds, regardless of frontiers, either
o Back Doors orally, in writing or print, in the form of art, or
through any other media of his choice.”
o Article 19 of ICCPR
LIVING IN THE IT ERA ~ o Article 3 Section 4 Philippine constitution
o Article 3 Section 4 of the Bill of Rights
FQ3 o UDHR Section 19

It encompasses the personal, organizational, It is the process of restricting access to specific


and corporate standards of behavior expected of materials or limiting employees' web access.
an individual working in an acknowledged o Web filtering software
profession exercising specialists' knowledge o Content Restrictions
and skills. o Content Filtering
o Profession Ethics o Restrict access to minors
o Professional Skills
o Professional Requirements The mechanism by which professionals ensure
o Professional Morality that their members use their knowledge and
skills to benefit society.
Which of the following is NOT a use for o Certification
cookies in websites? o Standards
o To limit amount of information shared to o Code of Ethics
a websites. o Implementing Rules & Regulations
o To track user preferences when filling up
online form This relates to the correctness and completeness
o To track malicious codes embedded in of the output information.
websites o Data Integrity
o To store user names and/or passwords not to o Data Reliability
enter this information every time they sign in. o Data Quality
o Information Accuracy
A vocation that requires a high level of
education and practical experience in the field Which of the following should be included in
and have special obligations to ensure their an IT Code. Select all that apply.
actions are for the good of those who depend o Employee may use others' intellectual
on them. property as their own
o Profession o Employees many not copy or use software
o Employee illegally.
o Worker o Technology may be used to bear false
o Labor witness
o Technology may not be used to harm other
It is the environmentally responsible and eco- people.
friendly use of computers and their resources.
o Green computing The following are excluded in the exercise of
o Environmental Waste freedom of expression EXCEPT:
o Energy Star Program o Libel or slander
o Environmental Impact o copyright violation
o Fair use
o Disclosure of NDA
Which of the following are benefits in joining
Refers to unique and original works, such as professional organizations?
ideas, inventions, arts, writings, processes, o Job Opportunities
company and product names and logos. o Staying updated to latest industry trends
o Intellectual Property and news
o Information Property o Fees, time, and expenses
o Collective Property o Network Opportunities
o Intellectual Ownership
Which of the following is TRUE about Ethics?
These are the moral guidelines that governs the o It’s a set of rules that are drafted by trade
use of computers, mobile devices, information groups to ensure members stay out of trouble
systems, and related technologies. and act in a way that brings credit to the
o Morality Clauses profession.
o Technology Ethics o Ethics aren’t always moral … and vice versa
o Implementing Rules and Regulations o Leans towards decisions based upon
o Regulations individual character, and the more subjective
understanding of right and wrong by
This refers to phrases, words, or symbols that individuals
distinguish the source of a product or services o Emphasizes the widely shared communal
of one party from another. or societal norms about right and wrong.
o Trademarks
o Copyrights A written guideline helps determine whether a
o Patents specification is ethical/unethical or allowed/not
o Trade Secret allowed.
o Implementing Rules & Regulations
A self-regulating business model that helps a o Standards
company be socially accountable to itself, its o Code of Conduct
stakeholders, and the public by being conscious o License
in all aspect of society.
o Corporate Social Responsibility It is a scam in which a perpetrator sends an
o Information Theft official looking email message that attempts to
o Transparency obtain personal and/or financial information.
o Core Values o Clickjacking
o Madware
Which of the following is TRUE about o Spyware
reducing electrical waste in enterprise data o Phishing
centers and computer facilities?
o Phishing This is the actual state of a matter. Conformity
o Use sleep modes and other power with fact or reality; verity.
management features for computers and o Reality
devices. o Thruth
o Review Power Usage Effectiveness o Integrity
o Use outside air to cool the data center or o Honesty
computer facility.
A privacy issue entails the sharing of
Which of the following is/are vice/s? personally identifiable information (PII)
o loyalty published through websites.
o fairness o Information Padding
o vanity o GPS
o generosity o Data Privacy
o Internet Privacy
The use of a copyrighted work for criticism,
It is a habit that inclines people to do what is comment, news reporting, teaching, including
acceptable. multiple copies for classroom use, scholarship,
o Value research, and similar purposes.
o Virtue o Fair Practice
o Character o Citation
o Vice o Fair Use
o Copying
Which among the following is NOT TRUE
about Integrity? This may include personal details, such as age,
o They are people who demands respect and address, phone number, marital status, number
gratitude and ages of dependents, interests, and spending
o Integrity: Either you have it, or you don't habits.
o Integrity is the foundation of character o List of clients
o To be honest with others, one should be o Electronic Profiles
honest with self. o Shared Marketing Preferences
o Customer Index
The power to exercise choice and make
decisions without constraints from within and A security technique in which a dataset is
without; autonomy; self-determination. copied with sensitive data obfuscated.
o Honor o Data Masking
o Honesty o Internet Privacy
o Responsibility o Data Privacy
o Freedom o Information Padding

The right of individual or organization to It is an organization of people organized under


exchange information without fear or a system of rules designed to advance the good
repercussion or censorship. of its members over time.
o Freedom to Life, liberty, and pursuit of o College
happiness o Association
o Freedom of Speech o Group
o Freedom of Expression o Society
o Human Rights
It is a process by which candidates are
Which of the following is NOT a common evaluated to determine their readiness to
Morals most people agree on. practice their field of expertise.
o Always tell the truth o Certification
o Be Loyal o Skills Development
o Be judgemental o Accreditation
o Do not destroy property o Licensing

This is a specific, private information that is This causes the inability to assess performance,
important to a business because it gives the sales accurately, and convert customers. An
business a competitive advantage in its excellent way to think about it is garbage in,
marketplace. garbage out; poor data input leads to poor
o Trade Secret decision-making and directly impacts
o Trademarks performance.
o Copyrights o Data Integrity
o Patents o Data Processing
o Data Reliability
o Data Quality o Penal System
o Republic Act
It is a small text file that a web server stores on o House Bill
the computer.
o Patch
o Cookies Information given by a client to his lawyer is an
o User Tracker example of:
o User Information o Sensitive personal information
o Sensitive Information
o Personal Information
LIVING IN THE IT ERA ~ o Privileged Information

FQ4 This office was created by virtue of RA No.


8293.
An unlawful or prohibited acts defined in o IPOPHIL
Article 355 of the Revised Penal Code, as o DICT
amended committed through a computer system o OOC
or any other similar means which may be o NPC
devised in the future.
o Libel An individual or legal entity recognized under
o System Interference law as having legal rights and obligations.
o Cybersex o Corporate Entity
o Child Pornography o Juridical Person
o Registrant
This organization is mandated to be the primary o Citizen
policy, planning, coordinating, implementing,
and administrative entity of the Executive It is a word, phrase, symbol, and/or design that
Branch of the government that will plan, identifies and distinguishes the source of a
develop, and promote the national ICT service rather than goods.
development agenda. o Industrial Designs
o NPC o Geographical Indications
o DOJ o Layout-Designs
o DICT o Service Mark
o OOC
Republic Act No. 10844 was signed into law on
The Philippine government recognizes the _________.
recent advances in technology and the o June 14, 2000
widespread use of access devices in the o February 18, 2014
commercial transaction. o September 9, 2016
o RA 8790 o May 23, 2016
o RA 8293
o RA 9239 This virus was said to caused damaged at
o RA 8484 around 2 to 5 billion US Dollars in the year
2000.
It contains the general penal laws of the o Simile Virus
Philippines. It remains in effect today, despite o MyDoom Worm
several amendments and does not comprise a o Sapphire Worm
comprehensive compendium of all Philippine o I Love You Virus
penal laws.
o Revised Penal Code Republic Act No. 10175 was signed into law on
_________.
o June 14, 2000 electronic document was generated in light
o February 18, 2014 of all circumstances including any relevant
o May 23, 2016 agreement;
o September 12, 2012

It is an independent body created under Which right under RA 10173 can be exercised
Republic Act No. 10173, mandated to upon discovery and substantial proof of
administer and implement the provisions of the personal data is incomplete, outdated, false, or
Act, and to monitor and ensure compliance of unlawfully obtained?
the country with international standards set for o The right to erasure or blocking
data protection. o The right to damages
o Department of Information and o The right to access
Communications Technology o The right to object
o Office of the Cybercrime
o Information Officer A sign used on products with a specific
o National Privacy Commission geographical origin and possess qualities or a
reputation due to that origin. A sign must
Refers to a person or organization who controls identify a product as originating in a given
the collection, holding, processing or use place
personal information o Geographical Indication
o Personal information handler o Layout-Designs
o Personal information comptroller o Service Mark
o Personal information holder o Industrial Designs
o Personal information controller
The creator of the I Love You virus is a certain
Which right under RA 10173 can be exercised ____________.
if the contents of the personal data that were o Onel Dela Cruz
processed, names and addresses of the recipient o One DeGuzman
of the data or manner by which they were o Onel Guzman
processed. o Onel De Guzman
o The right to access
o The right to object Issue and promulgate guidelines, advisories,
o The right to erasure or blocking and procedures in all matters related to
o The right to damages cybercrime investigation, forensic evidence
recovery, and forensic data analysis consistent
Which of the following is TRUE regarding with industry-standard practices is a power of
electronic signatures under the E-Commerce what government office?
Act. o IPOPHIL
o The other party is authorized and enabled o DICT
to verify the electronic signature and to o NBI
make the decision to proceed with the o OOC?
transaction authenticated by the electronic
signature. The acquisition of domain name over the
o There must be a prescribed method of Internet in bad faith to profit, mislead, destroy
signing alterable by the parties interested in the reputation, and deprive others of registering the
electronic document; same.
o Philippine government has an official PKI o computer-related fraud
system, the Philippine National Public Key o computer-related identity theft
Infrastructure system. o Cyber-squatting
o The method for signing is reliable and o computer-related Forgery
appropriate for the purpose for which the
Minimum penalty for hacking, cracking, and o Cybercrime Prevention Act of 2012
piracy as prescribed in RA 8792. o Safe Spaces Act
o 200,000.00
o 100,000.00
o 50,000.00
o 150,000.00 A type of cybercrime where unauthorized
acquisition, use, misuse, transfer, possession,
This allows to obtain and electronically move, alteration or deletion of identifying information
copy or transfer data in a secure manner, for belonging to another, whether natural or
further use. juridical.
o Data Processing o Libel
o Access Control o Computer-related Identity Theft
o Data Security o Computer-related Fraud
o Data Portability o Cyber-squatting

It is a strategy that intends to connect all Which right should be exercised to control and
government offices to the Internet and provide prevent the erosion of the principle of
universal access tot he general public. territoriality of copyright?
o National Broadband o Right of Reproduction
o National Computer Center o Right to authorize rental
o DICT o Right to importation
o RPWeb o Right to authorize distribution

This right allow right owners to derive financial Which right under 10173 should be exercised
reward from the use of their works by others. when organizations or personal controllers are
Right owners can authorize or prohibit. processing data without the consent for the
o Civil Rights purpose of direct marketing purposes.
o Moral Rights o The right to be informed
o Economic Rights o The right to rectify
o Copyright o The right to file a complaint
o The right to object
An enterprise security leadership role for
overseeing company's data protection strategy A word, phrase, symbol, and/or design that
and its implementation to ensure compliance. identifies and distinguishes the source of the
o Network Administrator goods of one party from those of others.
o Security Officer o Geographical Indications
o Information Officer o Industrial Designs
o Data Privacy Officer o Trademark
o Layout-Designs
This law was patterned after the “UNCITRAL
Model Law on Electronic Commerce” adopted This law prohibits anyone from overhearing,
by the United Nations Commission on intercepting, or recording any private
International Trade Law (UNCITRAL) in 1996. communication by tapping wire or using the
o Republic Act 10175 electronic device without authorization by all
o Republic 11313 parties
o Republic Act 8792 o RA 8293
o Republic Act 10173 o RA 4200
o Ra 11449
This is also known as Republic Act 10173 o RA 8484
o Intellectual Property Code of the Philippines
o Data Privacy Act of 2012
LIVING IN THE IT ERA ~
FQ5
There is a need to criminalize porn actors This involves measuring performance and, if
playing a role as minors. Having porn actors necessary, taking corrective actions.
play as minors provokes the intention to have o Organizing
children partake in sexual activity and insults o Leading
children's rights and, therefore, should be o Planning
banned. o Controlling
o RA 9239
o RA 9775 This level of management are often industry
o RA 9995 experts, having a close association with the
o RA 8790 long-term trajectory of the businesses they
operate in.
The unauthorized copying, reproduction, o Operation Management
dissemination, distribution, importation, use, o Non managerial Employees
removal. alteration, substitution, modification, o Executive Management
storage, uploading, downloading, o Middle level management
communication, making available to the public,
or broadcasting of protected material, electronic Which of the Supervisory or Operational
signature or copyrighted works including Management function is being describe in the
legally protected sound recordings or following statement. "Pass on the instructions
phonograms or information material on of the middle management to the workers and
protected works, through the use of the worker's suggestions, complaints, etc., to
telecommunication networks the middle management."
o Cracking o Act as guide to Workforce
o Piracy o Training
o Hacking o Act as Supervisor
o Information Theft o Link between Middle Management and
Workforce
Unauthorized hindering with the functioning of
a computer or computer networking by This sets the expectations between the service
inputting, transmitting, damaging, deleting, provider and the customer and describes the
deteriorating, altering, or suppressing computer products or services delivered, the single point
data or program, electronic document, or of contact for end-user problems, and the
electronic data messages, and including the metrics by which the effectiveness of the
introduction or transmission of viruses. This process is monitored and approved.
provision can also cover authorized action if o Partnership Agreement
the person’s activity went beyond the agreed o Non-disclosure Agreement
scope resulting in damages stated in this o Express Agreement
provision. o Service-Level Agreement
o Data Interference
o Misuse of Devices The people who develop and accumulate large
o System Interference amounts of knowledge on customers, suppliers,
o Illegal Interception and workers.
o Capitalists
o Scientists
o Entrepreneurs
o Analysts
o Technological Computing
These are the general managers, branch o IT Computing
managers, and department managers and they o Small-to-Medium Sized Computing
devote more time to organizational and
directional functions. This includes a set of activities that enterprises
o Bottom / Operational Management perform to optimize their business processes,
o Executive Management such as accounting and finance, hiring
o Non managerial employees, and purchasing goods and services.
o Middle Level Management o Business Process Management
o Business Management
o Business Intelligence
A key point difference between Managerial and o Business Process Automation
non-managerial employees in areas of Provides an easy exchange of information
determining objectives, framing policies, among business applications, reduces the need
overseeing functioning in line with policies, for human intervention in processes, and uses
coordinating and supervising employees are software to automate processes wherever
some of their essential responsibilities. o Business Process Automation
o Responsibilities o Business Intelligence
o Meaning o Business Control
o Decision-Making rights o Business Process Management
o Overseeing function
A system with multiple components located on
This type of enterprise seeks to purchase and different machines that communicate and
sell large quantities of goods to other coordinate actions in order to appear as a single
organizations, usually at a lower cost than coherent system to the end-user.
retail. o Cloud Computing
o Retail Enterprise o Enterprise Computing
o Manufacturing Enterprise o Grid computing
o Service Enterprise o Personal Computing
o Wholesales Enterprise
The following are functions of middle level
This level of management are often referred to management EXCEPT:
as first-line managers who oversee the o Strategic Planning
workforce's efforts. o Reporting performance statistics up the chain
o Middle Level Management of command and, when applicable,
o Executive Management recommending strategic changes
o Non-Managerial Employees o Designing and implementing effective group
o Operational Management work and information systems
o Diagnosing and resolving problems within
They industry experts, having a close and among workgroups
association with the long-term trajectory of
their businesses. Which of the following are changes that may
o Top management teams occur when middle management is reduced due
o Intermediate management to reorganization?
o operative management o outsourcing
o executive functions o hiring
o downsizing
It involves using computers in networks that o delayering
encompass a variety of different operating o reduce cost
systems, protocols, and network architectures.
o Enterprise Computing This institution defined cloud computing.
o ISO o personal computer
o DICT
o NPC Includes several applications and technologies
o NIST for acquiring, storing, analyzing, and providing
access to information to help users make more
Includes identifying and combining resources, sound business decisions.
such as money and people, to achieve its goals o Business Intelligence
and objectives. o Business Control
o Leading o Business Process Automation
o Controlling o Business Process Management
o Organizing
o Planning Which of the following is performs strategic
decisions in the organization? Select ALL that
The following are functions of an Operational applies.
Manager EXCEPT: o officer manager
o Discipline o president
o Training o chief financial officer
o Maintenance of Quality o chief executive officer
o Supporting Cooperative Behavior o human resource manager

This type of enterprise owns many stores in a This denotes any business and ventures of any
wide geographical area and use their size to size.
obtain discounts and goods they purchase. o Enterprise
o Manufacturing Enterprise o Lending Institutions
o Wholesales Enterprise o Finance
o Service Enterprise o Government
o Retail Enterprise
Typically do not create or sell goods for
This type of enterprise include airlines, regional consumers or other organizations. Examples
transportation authorities, freight and passenger include companies in the insurance, restaurant,
railroads, and trucking firms. and financial industries.
o Manufacturing o Retail enterprises
o Educational o Service enterprises
o Transportation o Wholesale enterprises
o Service o Government enterprises

Which of the following is/are middle manager's These are enterprises that are not present across
roles? Select All that applies. international boundaries, runs on a smaller
o Supporting cooperative behavior business operating scale that may use the same
o To look at the organization as a whole and technology and techniques.
derive comprehensive strategic plans. o Enterprise Computing
o Arrange workplace training o Small-to-Medium Sized Business
o Defining and monitoring group-level o Microenterprise
performance indicators high-risk, high o Large enterprises
return decision-making initiatives
This member of an organization is charged with
It is the use of technology by an individual for strategic decisions and long-term planning
business or personal activities. o Chief Technology Officer
o personal computing o Chief Operating Officer
o IOT o Chief Finance Officer
o cloud computing o Chief Executive Officer
This top management officer is in-charge of
LIVING IN THE IT ERA ~
providing supporting roles in the organization. FQ6
o CFO
o COO It is a system that stores customer data,
o CEO interactions and previous purchases and
o CIO interests.
o customer relationship management
o point of sale
o transaction processing system
Which of the following are non-managerial o customer service management
employees? Select all that applies.
o accountants Which characteristic is being identified in the
o foreman statement: While checking in for flights,
o engineers security agents may seek your photo
o inspectors identification to check your identity.
o secretarial staff o Accurate
o Verifiable
This is the information gathered in the ongoing o Accessible
operations of an enterprise-sized organization. o Timely
o Enterprise Information
o Planning A computer-based application that administers
o Organizing one or more human resource functions.
o Business Management o ERM
o PIM
These are the accountants, engineers, secretary, o HRIS
order entry clerk and are entrusted with specific o HRM
functions depending on the department within
which they are employed. This system are used by multiple departments
o Executive Management and facilitate collaboration within the
o Non managerial enterprise.
o Middle Level Management o General-purpose information system
o Operational Management o Information systems
o Functional Units
Which of the following are true about 2020 o Integrated Information System
IOT and Innovation?
o 25+Billion Embedded and Intelligent An information system that captures and stores
Systems the knowledge of human experts and then
o 10 Billion GBs of Data imitates human reasoning and decision-making.
o 1 Trillion USD in Revenues o Expert Systems
o 4 Billion Connected People o Executive Information System
o 25+ Million Applications o Management information System
o Transaction Processing System
Managerial employees have a more critical
role, thus drawing higher pay packages than An information system that captures and
non-managerial employees. processes data from day-to-day business
o Decision-making rights activities.
o Educational Requirement o Decision Support System
o Payscale o Management Information System
o Overseeing function o Transaction Processing System
o Expert Systems This system enables an organization to
maintain or enhance the product or service's
A particular type of DSS that supports the quality.
strategic information needs of executive o Quality Assurance System
management. o Computer-Aided Manufacturing
o Geodata Information System o Quality Control System
o Robotics o Marketing Information System
o Executive Information System
o Expert Systems

It is a technique in which the computer An executive management software, that assists


accumulates data and executes all bulk users with the process of analysis and decision-
transactions. making.
o real-time processing o Decision Support Systems
o onsite processing o Online Analytical Processing Programs
o batch processing o Executive Information System
o online processing o Expert Systems

What information are presented in an Executive An example of an expert system that senses a
Information System? Select all that applies. person's actions and, based on logical
o customer support assumptions and prior experience, takes the
o customer data interactions appropriate action to complete the task.
o trends o Artificial Intelligence
o ratios o Virtual Reality
o charts o Artificial Reality
o Enterprise Intelligence
A set of hardware, software, data, people, and
procedures that work together to produce This system in a Hospital Information System
information. features Comprehensive IP Management that
o Information System handles corporate and insurance patients,
o Enterprise Systems reduces pilferage, and eliminates paperwork.
o Business Systems o HMS-PHARMA
o Knowledge Systems o HMS-LAB
o HMS-IP
An information system that enables employees o HMS-OP
to perform tasks using computers and other
electronic devices instead of manually. This system in a Hospital Information System
o Office Information Systems features visual electronic medical records,
o Expert Systems comprehensive appointments, integrated
o Transaction Processing System outpatient billing, flexible queue management,
o Decision Support System and e-prescription.
o HMS-IP
The practice of working from home, making o HMS-PHARMA
use of the internet, email, and the telephone. o HMS-LAB
o Work From Home o HMS-OP
o Telecommuting
o Virtual Commuting Provides the administration and coordination of
o Videoconferencing an enterprise's continuous activities, such as
manufacturing and distribution, accounting and
finance, sales, product planning, and human This functional unit of an enterprise is
resources. responsible for researching the clusters of
o Enterprise Resource Planning consumers in which the enterprise operates to
o Enterprise Resource determine the products and features that the
o System Resource Planning business should develop.
o Systems Planning o Marketing
o Engineering
o Customer Service
o Distribution

An information system used for decision- A discrete commercial operation.


making, and for the coordination, control, o reservation
analysis, and visualization of information in an o transaction
organization. o order
o Management Information System o deposit
o Executive Management System
o Decision Support System Combines databases, software, and processes to
o Transaction Processing System organize and provide access to files.
o Media-based Systems
They are responsible for developing ideas into o Content Management System
a product that can be used by customers. o Management information System
o Manufacturing o Transaction Processing System
o Distribution
o Engineering or Product Development Which of the following are features of HMS-
o Assembly line Pharmacy? Select all that applies.
o SMS Notification
Which characteristic of information is being o Surgery Notes
referred in this statement? "An alumni o Stock Management
association meeting is not helpful to students o Prescription Integration
who haven't graduated yet." o Comprehensive Pharmacy Management
o Timely
o Useful This software enables business to balance their
o Engineering purchases and consumer payments.
o Accessible o Billing software
o Accounting software
A process that uses computers to validate o Financial software
product designs (e.g., validate a car or bridge o Purchases software
design) before it is built.
o CAM Sometimes used to refer to programs that
o CAE analyze data, such as those found in a decision
o COM support system.
o CAD o data management
o business analytics
The following are capabilities of Artificial o OLAP
Intelligence EXCEPT o MRP
o speech recognition
o creative responses Samples of Content Management Systems?
o logical reasoning Select all that applies.
o emotional responses o Web sites
o customer support
o News services o Integrated Information System
o RSS feeds current
o customer data interactions

This identify the data that deviates from the


norm like out of the ordinary circumstances.
o incident reports
o summary reports
o exception reports
o detailed reports

Responsible for designing, purchasing,


implementing, testing, securing, and
maintaining information systems for the rest of
the organization.
o Engineering
o Customer Service
o Distribution
o Information Technology

This type of report provides a summarized data,


typically via totals, tables, or graphs, so that
managers can quick evaluate.
o incident report
o detailed report
o exception report
o summary report

It manages information in a manufacturing


setting that relies on software to monitor and
regulate production operations. Also, it focuses
on maintaining an inventory of parts and
projecting future demand to ensure that
manufacturing supplies are available when
needed.
o MRP
o CAM
o CAD
o CAE

This software provides technological tools that


enable traveling salespeople to be more
productive. Also, this software allows
employees to manage client contacts, plan
meetings with customers, track customer
interactions, manage product information, and
accept client purchases.
o Materials Requirements Planning
o Customer Relations Management
o Sales force automation
 Security System Project Manager

The practice of working from home,


making use of the internet, email, and the
telephone.

 Virtual Commuting
 Videoconferencing
 Telecommuting
 Work From Home
Living in the IT Era ~ FQ7 Develops and directs an organization's
mobile strategy, including marketing and
Answers hardware, software, and
app development
networking questions in person, over the
phone, or electronically via email or a chat  Mobile Strategist
room.  Mobile Technology Expert
 Games Designer
 Call Center Agent  Mobile Programmer
 Help Desk Specialists
 Computer Technicians Identify the following step that satisfies this
 Computer Programmers statement, "Remember to look for positions
where you can add the most value to
Collects and measures Internet data, such as
employers."
website traffic patterns and advertising, and
develops reports that recommend strategies  Practice for your interview
to maximize an organization's web  Do your research
 Clearly define your skills and
presence.
interests
 Web Architect  Strategize your job search
 Web Analytics Expert A written list of short-term and long-term
 Web Designer
goals. It involves the employees' planned
 Web Developer
formal and informal experiences and any
Writes and develops web content and required training to attain the goal.
website layouts so that they will appear at
the beginning of search results when users  Career Assessment
 Personal website
search for content.
 Career Development Plan
 Computer Security Specialists  Resume
 CRM Specialists Identify the following step that satisfies this
 SEO Expert
statement, "What am I really good at? What
are the things that I am most passionate  Systems Analysts
 Program and App Developer
about?"

 Clearly define your skills and


interests
 Practice for your interview
 Do your research
 Strategize your job search
Reflects and emphasizes one's skills,
experiences, and relevant information
Select which career is shown in the image relevant to the position being applied for.
below.
 Certifications
 Application Letter
 Resume
 Self-Assessment

Uses analytics and other Big Data tools to


compile statistics on data that an
 Network Administrator Engineer organization can use to plan product
 Technical Project Manager development or creative strategies for
 Technology Salesperson marketing
 Computer repair technician
 Database Administrator
Plans design software and app that consider
 Data Scientists
a user's reaction to a program and its  Database Analysts
interface, including its efficiency, its  Web Analytics Expert
effectiveness, and its ease of use.
This certification focuses on discovering,
 Social Media Marketing Specialists collecting, and analyzing the evidence on
 Customer Relationship computers and networks.
Management Specialists
 User Experience Designer  Hardware Analysis
 Search Engine Optimization Expert  Quality Computers and Network
Analysis
Specifies, designs, implements, tests, and  Data Analysis and Database
documents programs and apps in a variety  Computers and Network Analysis
of fields, including robotics, operating
Design games and translates designs into a
systems, animation, and application
program or app using an appropriate
 Web Developer application development language
 Cloud Architect
 Games Designer / Programmer
 Desktop or Mobile Application  Systems Analysts
Programmer / Developer  Technical Project Manager
 Mobile Strategies  Computer Technicians
 Mobile Technology Expert  Network Administrator Engineer

Sponsors of application software


Configures routers and firewalls; specifies certifications have a partner training
web protocols and enterprise technologies program and encourage computer-training
centers to be authorized, training
 Mobile Security Specialist
representatives.
 Network Security Administrator
 Security Analysts
 Security Certifications
 Security System Project Manager
 Hardware Certifications
 Application Software Certifications
 Network Certifications

This is an IT task that develops and


enforces policies designed to safeguard an Identifies requirements, strategies, and
organization's data and information from solutions for cloud storage and services.
unauthorized users.
 Systems Analysts
 Technical support services  Program and App Developer
 Training and support  Web Developer
 Information Security Services  Cloud Architect
 Research and Development
Consists of manufacturers and distributors
Analyzes, develops, and supports the of computers, mobile devices, and other
functionality of the a website, including hardware, such as magnetic and optical
applications that interact with databases or drives, monitors, printers, and
other online resources. communications and networking devices.

 Web Architect  Technology Equipment


 Web Designer  Technology Fabrication
 Web Developer  Computers
 Web Analytics Expert  Manufacturing Equipment

Works closely with users to analyze their This percentage of workers according to
requirements, designs and develops new studies dream of leaving the confines of an
information systems, and incorporate new office to work from the comfort of home, at
technologies least part of the time.
 70%
 75%
 80%
 85%
A section of the IT department that
Implements security procedures and evaluates and integrates new technologies,
methods, looks for flaws in security of a administers the organization's data
company's devices and networks, works resources, and supports the centralized
with and trains employees at all levels, and computer operating system and servers.
assigns permissions and network settings.
 Management
 Computer Security Specialists  Information Security Services
 Security Analysts  Operations
 Digital Forensics Analysts  Technical Support Services
 Security System Project Manager
A job under web marketing and social
Inspects electronic data to recover media that integrates apps, and data related
documents and files from data storage to customer inquiries, purchases, support
devices that may have been damaged or requests, and behaviors in order to provide
deleted, to use them as evidence in a complete application that manages a
criminal investigation. company's relationships with its customers.

 Computer Security Specialists  SEO Expert


 Security Analysts  Social Media Specialists
 Digital Forensics Analysts  User Experience Designer
 Security System Project Manager  CRM specialists
This measure a candidate's ability to
identify and control security risks
associated with any event or action that
could cause a loss of or damage to
computer hardware, software, data,
information, or processing capability.

 Hardware certifications
 Security Certifications
 Hardware Assessment
 Security Assessment
 JobStreet

Select the highest IT paying jobs in the


Select which career is shown in the image Philippines last 2021 according
below. to fullscale.io

 Senior Project Manager IT


 Senior UX Developer
 Senior Network Engineer
 Technical Architect

This professional is typically hired based


on their IT expertise, technology services to
its clients.

 Network Administrator
 Technical Project Manager
 Technical Project Manager  IT Consultant
 Network Administrator Engineer  Help Desk Specialist
 Technology Salesperson
 Computer repair technician

This task analyzes, designs, develops, and


implements new information technology This IT industry serves consumers by
and maintains and improves existing providing preventative maintenance,
systems. component installation, and repair services 

 Information Security Services  Technology Equipment


 Technical support services  Technology Education, Training ,
 Training and support and Support
 Research and Development  System Development
 Technology Service and Repair
A social networking site designed
Extends a private network across a public
specifically for the business community.
network(Internet) and enables users to send
The goal of the site is to allow registered
and receive data across shared or public
members to establish and document
networks as if their computing devices were
networks of people they know and trust
directly connected to the private network
professionally.
and commonly used in WFH arrangements.
 Facebook
 Twitter  Metropolitan Area Network
 LinkedIn  Virtual Private Networks
 Wide Area Network
 Local Area Network

You might also like