You are on page 1of 14

I

nfor
mat
ionAssur
anceandSecur
it
y1

Qui
z1:magpuyatkanal
angsabl
endedkesasamal
i
ngt
ao

Thr
eeFeat
uresofSecur
it
y

Thecor
rectansweri
s:Conf
ident
ial
i
ty,I
ntegr
it
yandAvai
l
abi
l
it
y

Si
xConceptofCyber
Cri
me

Thecorr
ectansweri
s:Di
git
alUndergr
ound,Under
groundEconomy,Phi
shi
ng,Hackt
ivi
sm,
Cyber
war :
Est
oniaCaseandStuxnet

Avai
l
abi
l
it
y:Assur
ancethatt
hesyst
emsresponsi
blef
ordel
i
ver
ing,st
ori
ngandpr
ocessi
ng
i
nfor
mati
onareaccessi
blewhenneeded,byt
hosewhoneedthem.

Thecor
rectansweri
s'Tr
ue'
.

I
sroughl
yequi
val
entt
opr
ivacy

Thecor
rectansweri
s:Conf
ident
ial
i
ty

I
ninfor
mat i
onsecuri
ty,dat
aint
egri
tymeansmai
ntai
ningandassur
ingt
heaccur
acyand
consi
stencyofdat
aoveri t
sent
irel
i
fe-cycl
e.

Thecor
rectansweri
s'Tr
ue'
.

Cyber securi
tyisthecol
l
ect
ionoft
ools,poli
cies,securi
tyconcepts,securi
tysafeguards
,
guidelines,r
iskmanagementapproaches,actions,t
rai
ning,bestpracti
ces,assuranceand
technol ogi
esthatcanbeusedtoprotectt
hecyberenvi ronmentandor ganizati
onanduser’s
assets.

Thecor
rectansweri
s'Tr
ue'
.

Cyber
spacei
s"t
heenvi
ronmenti
nwhi
chcommuni
cat
ionovercomput
ernet
wor
ksoccur
s.“
Thecor
rectansweri
s'Tr
ue'
.

I
sapr
ocess,notanendst
ate

Thecor
rectansweri
s:Secur
it
y

Cybersecuri
ty,al
sor ef
erredtoasi
nfor
mationt
echnologysecur
it
y,f
ocusesonprotecti
ng
computers,networks,progr
amsanddat af
rom uni
ntendedorunaut
hor
izedaccess,change
ordest
ructi
on.

Thecor
rectansweri
s'Tr
ue'
.

Assur
ancet
hatt
hei
nfor
mat
ioni
saut
hent
icandcompl
ete.

Thecor
rectansweri
s:Avai
l
abi
l
it
y

ConceptofCyber
cri
me

CyberCri
meComputercr
ime,orcyber
cri
me,i
sanycri
methati
nvol
vesacomputeranda
networ
k.Thecomput
ermayhavebeenusedinthecommi
ssionofacr
ime,ori
tmaybethe
tar
get.

Thecor
rectansweri
s'Tr
ue'
.

I
sthepr
ocessofmai
ntai
ninganaccept
abl
elevel
ofper
cei
vedr
isk

Thecor
rectansweri
s:Secur
it
y

Assur
ancet
hati
nfor
mat
ioni
sshar
edonl
yamongaut
hor
izedper
sonsoror
gani
zat
ions.

Thecor
rectansweri
s:Conf
ident
ial
i
ty

Avail
abi
l
it
y:Avai
labi
l
ityofi
nfor
mat
ionref
erst
oensur
ingt
hataut
hor
izedpar
ti
esar
eabl
eto
accesst
heinfor
mationwhenneeded

Thecor
rectansweri
s'Tr
ue'
.
Qui
z2:sabl
endednganagchi
cheatka,sakanyapakaya?

Pr
otect
ionagai
nstunaut
hor
izedmodi
fi
cat
ionordest
ruct
ionofi
nfor
mat
ion

Thecor
rectansweri
s:I
ntegr
it
y

I
nfor
mat
ionanddat
amani
pul
ati
onabi
l
it
iesi
ncyber
space;

Thecor
rectansweri
s:I
nfor
mat
ionI
nfr
ast
ruct
ure

Secur
it
ymeasur
est
oest
abl
i
sht
heval
i
dit
yofat
ransmi
ssi
on,message,oror
igi
nat
or.

Thecor
rectansweri
s:Aut
hent
icat
ion

I
sdat
aendowedwi
thr
elevanceandpur
pose.

Thecor
rectansweri
s:I
nfor
mat
ion

Rawf
act
swi
thanunknowncodi
ngsyst
em

Thecor
rectansweri
s:Noi
se

FourSecur
it
yDomai
n

Thecorr
ectansweri
s:Physi
cal
Secur
it
y,Per
sonnel
Secur
it
y,I
TSecur
it
yandOper
ati
onal
Secur
it
y

Assur
ancet
hati
nfor
mat
ioni
snotdi
scl
osedt
o unaut
hor
izedper
sons

Thecor
rectansweri
s:Conf
ident
ial
i
ty

Pr
ocesseddat
a

Thecor
rectansweri
s:I
nfor
mat
ion
Ti
mel
y,r
eli
abl
eaccesst
odat
aandi
nfor
mat
ion ser
vicesf
oraut
hor
izeduser
s;

Thecor
rectansweri
s:Avai
l
abi
l
it
y

I
tshoul
dbe:accur
ate,t
imel
y,compl
ete,ver
if
iabl
e,consi
stent
,avai
l
abl
e.

Thecor
rectansweri
s:Knowl
edge

Accept
edf
act
s,pr
inci
ples,orr
ulesoft
humbt
hatar
eusef
ulf
orspeci
fi
cdomai
ns.

Thecor
rectansweri
s:Knowl
edge

Act
ionst
akenthatprot
ectanddef
endi nf
ormationand inf
ormati
onsystemsbyensur
ing
t
hei
ravai
labi
l
it
y,integr
it
y,aut
hent
icat
ion,conf
identi
ali
tyandnon-repudi
ati
on

Thecor
rectansweri
s'Tr
ue'
.

I
nfor
mationAssurance(I
A)i
sthest
udyofhowt oprot
ectyouri
nfor
mat
ionasset
sfr
om
dest
ruct
ion,degr
adati
on,mani
pul
ati
onand expl
oit
ati
on.

Thecor
rectansweri
s'Tr
ue'
.

Dat
aanddat
apr
ocessi
ngact
ivi
ti
esi
nphysi
cal
space;

Thecor
rectansweri
s:Physi
cal

Conver
ti
ngdat
aint
oinf
ormat
iont
husr
equi
resknowl
edge

Thecor
rectansweri
s:I
nfor
mat
ion

Assur
ancet
hatthesenderi
sprovi
dedwit
hproofofadat adel
iver
yandr
ecipi
entisprovi
ded
wit
hproofoft
hesender’si
dent
it
y,sot
hatnei
thercanl
aterdenyhavi
ngprocessedthedata.

Thecor
rectansweri
s:Non-
repudi
ati
on
Rawf
act
swi
thaknowncodi
ngsyst
em

Thecor
rectansweri
s:Dat
a

Qui
z3:pagnagf
ail
ed,at
temptul
i
t

Ri
skManagementPr
ocedur
econsi
stsofsi
xst
eps.

Thecor
rectanswer
sar
e:

Assessasset
s

Assesst
hreat
s

Assessvul
ner
abi
l
it
ies

Assessr
isks

Pr
ior
it
izecount
ermeasur
eopt
ions

Maker
iskmanagementdeci
si
ons

Notper
for
minganact
ivi
tyt
hatwoul
dincurr
isk.

Thecor
rectansweri
s:Ri
skAvoi
dance

Shi
ftt
her
iskt
osomeoneel
se.

Thecor
rectansweri
s:Ri
skTr
ansf
er

Acceptance,avoi
dance,mi
ti
gat
ion,t
ransf
er—ar
ewi
thr
espectt
oaspeci
fi
cri
skf
oraspeci
fi
c
pary.

Thecor
rectansweri
s:Ther
iskt
reat
ment

SevenSt
agesofl
i
fecycl
emodel

Thecor
rectansweri
s:Requi
rement
s,Desi
gn,Codi
ng,Test
ing,Depl
oyment
,Pr
oduct
ion
andDecommi
ssi
on

Ar
ethesecur
it
yfeat
uresofasyst
em t
hatpr
ovi
deenf
orcementofasecur
it
ypol
i
cy.

Thecor
rectansweri
s:Tr
ustmechani
sm

I
sagenericter
mt hatimpl
i
esamechani
sm i
npl
acet
o pr
ovi
deabasi
sforconf
idencei
nthe
r
eli
abi
l
it
y/secur
ityofthesyst
em.

Thecor
rectansweri
s:Tr
ust

Takingact
ionstor
educet
hel
ossesduet
oar
isk;manyt
echni
cal
count
ermeasur
esf
all
int
o
thi
scategory.

Thecor
rectansweri
s:Ri
skmi
ti
gat
ion

Ri
sksnotavoi
dedort
ransf
err
edar
eret
ainedbyt
heor
gani
zat
ion.

Thecor
rectansweri
s:Ri
skAccept
ance

Qui
z4:Kungmal
isagotmo,bakadapatpangal
anni
yani
l
agaymo.

Aftertheweaponi sdel
i
veredtothevi
cti
m,foll
owst
het ar
get
ingofanappli
cati
onor
vulnerabi
l
ityoft
heoperati
ngsystem.Theinf
ectedf
il
ecanbeusedbyt heself
-execut
ion
facil
i
tytolaunchthemalwarecode,ori
tcanbeexecutedbytheuserhi
mself;

Thecor
rectansweri
s:Expl
oit
ati
on

Oncethisbi
dir
ect
ional
communicati
onhasbeenmade,anatt
ackerhasaccessi
nsi
det
he
t
argetenvi
ronmentandcanusual
l
ycontrol
theact
ivi
tybymanual
l
ylaunchi
ngcommands;

Thecor
rectansweri
s:CommandandCont
rol
Themainwaysoftr
ansportar
ee-
mails(
att
achmentofinf
ect
edf
il
es)
,webpl
atf
orms
(r
unni
ngmalwarescri
pts)
,orr
emovabl
eUSBmemor ies;

Thecor
rectansweri
s:Del
i
ver
y

Research,targeti
denti
fi
cat
ionandselecti
on:i
tmaybel ooki
ngfore-mail
addr
esses,soci
al
rel
ati
onships,ordataaboutapart
icul
artechnol
ogy,i
nformati
ondispl
ayedonvar
ious
websit
es;

Thecor
rectansweri
s:Reconnai
ssance

Whatar
ethest
epsi
nint
rusi
onmodel
?

Thecor
rectansweri
s:Recon,Weaponi
se,Del
i
ver
,Expl
oit
,Inst
all
,C2andAct
ion

Quest
ion6

Afterthefir
stsi
xphases,anat t
ackercanacttoachi evethegoals.Theseacti
onst ypical
ly
consistofcoll
ecti
nginformati
on,modi f
yingdatai
ntegri
ty,orat
tackingtheavail
abili
tyof
servi
cesanddevi ces,butthevict
im syst
em canalsobeusedasast ar
ti
ngpointforinfecti
ng
othersystemsorf orexpandi
ngaccesst othelocalnetwork.

Thecor
rectansweri
s:Act
iononObj
ect
ive

Makingamal war
eappl i
cati
on( f
orexample,acomputertr
ojan)that
,combi
nedwit
han
expl
oit
ablesecur
it
ybreach,allowsremoteaccess.Moreover,PDF(Port
abl
eDocument
Format)f
il
esorMicrosoftOff
icesuit
e-speci
fi
cfi
lescanber egar
dedasweaponsavai
labl
eto
theatt
acker
;

Thecor
rectansweri
s:Weaponi
zat
ion

Physi
calsecur
it
yconsi
sti
nthecl
osur
eofI
Tequi
pmenti
nadedi
cat
edspaceandt
he
provi
si
onofaccesscontr
ol.

Thecor
rectansweri
s:Pr
eventCyber
-At
tacks
Thei
nfect
edfi
lecanbeusedbythesel
f-execut
ionf
aci
l
it
ytol
auncht
hemal
war
ecode,ori
t
canbeexecut
edbytheuserhi
mself
;

Thecor
rectansweri
s:Expl
oit
ati
on

Usual
lyaninf
ect
edhostmustbeaccessibleoutsi
deofthelocalnet
worktoestabli
sha
commandandcont rol
channelbet
weenthevi ct
im andt
heat t
acker
.Oncethisbidi
rect
ional
communicati
onhasbeenmade,anattackerhasaccessinsidethetar
getenvi
ronmentand
canusual
lycont
rol
theacti
vi
tybymanuallylaunchi
ngcommands;

Thecor
rectansweri
s:CommandandCont
rol

Theseact
ionstypi
call
yconsi
stofcol
lect
ingi
nformati
on,modif
yingdat
aint
egri
ty,or
att
acki
ngtheavail
abil
it
yofser
vicesanddevi
ces,butthevi
cti
m syst
em canal
sobeusedas
astar
ti
ngpointfori
nfecti
ngot
hersystemsorforexpandi
ngaccesstothel
ocalnetwor
k.

Thecor
rectansweri
s:Act
iononobj
ect
ive

I
nfecti
ngavi
cti
m syst
em wi
thacomput ert
roj
an,backdoororothermal
war
eappl
i
cat
ionof
t
histypet
hatensur
estheat
tacker
’spr
esenceinthetar
getenvir
onment;

Thecor
rectansweri
s:I
nst
all
ati
on

Tr
ansmi
tt
ingt
heweapont
othet
argetenvi
ronment
.

Thecor
rectansweri
s:Del
i
ver
y

Logi
calsecuri
tyconsi
stsi
nsoftwaret
hatarenecessarytocont
roltheaccesstoinfor
mation
andservi
cesofasystem.Thelogical
level
isdi
videdintotwocategori
es:accesssecuri
ty
l
evelandservi
cesecurit
ylevel
.

Thecor
rectansweri
s:Pr
eventCyber
-At
tacks
Qui
z5:magsagotkamunangbl
endedbagomosagut
inyangkal
andi
anmo.

Thosest
akehol
der
swhowi
l
lbeaf
fect
edbysecur
it
ycapabi
l
it
iesandwhoar
eingr
oupsof
communiti
es

Thecor
rectansweri
s:I
dent
if
ycommuni
ti
esi
nvol
ved

Securi
tyarchi
tect
urecal
l
sfori
tsownuni
quesetofski
l
lsandcompet
enci
esoft
heent
erpr
ise
andITarchit
ects.

Thecor
rectansweri
s'Tr
ue'
.

Thedefi
nit
ionandenforcementofper
mit
tedcapabi
l
it
iesf
oraper
sonorent
it
ywhosei
dent
it
y
hasbeenestabl
ished.

Thecor
rectansweri
s:Aut
hent
icat
ion

Theabil
i
tyt
oprovi
deforensi
cdat
aat
test
ingt
hatt
hesyst
emshavebeenusedi
naccor
dance
wit
hstat
edsecur
it
ypoli
cies.

Thecor
rectansweri
s:Audi
t

Thosewhoar
emostaf
fect
edandachi
evemostval
uef
rom t
hesecur
it
ywor
k

Thecor
rectansweri
s:I
dent
if
ycor
eent
erpr
ise

Thoseunitsout
sidet
hescopedent
erpr
isewhowi
l
lneedt
oenhancet
hei
rsecur
it
y
archi
tect
urefori
nter
oper
abil
i
typur
poses

Thecor
rectansweri
s:I
dent
if
yext
endedent
erpr
ise

Theprot
ecti
onofi
nformat
ionasset
sfr
om l
ossoruni
ntendeddi
scl
osur
e,andr
esour
cesf
rom
unaut
hori
zedandunint
endeduse.

Thecor
rectansweri
s:AssetPr
otect
ion
Theabil
i
tyoftheenterpr
iset
ofunct
ionwi
thoutser
vicei
nter
rupt
ionordepl
eti
ondespi
te
abnor
mal ormali
ciousevent
s.

Thecor
rectansweri
s:Avai
l
abi
l
it
y

Secur
it
yar
chi
tect
urehasi
tsowndi
scr
etesecur
it
ymet
hodol
ogy.

Thecor
rectansweri
s'Tr
ue'
.

Securi
tyarchi
tect
ureaddr
essesnon-
nor
mat
ivef
lowst
hroughsyst
emsandamong
appl
icati
ons.

Thecor
rectansweri
s'Tr
ue'
.

Theor
gani
zat
ion'
sat
ti
tudeandt
oler
ancef
orr
isk.

Thecor
rectansweri
s:Ri
skManagement

Secur
it
yar
chi
tect
urecomposesi
tsowndi
scr
etevi
ewsandvi
ewpoi
nts.

Thecor
rectansweri
s'Tr
ue'
.

Theabi
l
it
ytoaddandchangesecurit
ypoli
cies,addorchangehowpoli
ciesar
eimpl
ement
ed
i
ntheenter
pri
se,andaddorchangethepersonsorenti
ti
esrel
atedt
othesyst
ems.

Thecor
rectansweri
s:Admi
nist
rat
ion

Thosewhowillseechanget
othei
rcapabi
l
it
yandwor
kwi
thcor
euni
tsbutar
eot
her
wisenot
di
rect
lyaf
fect
ed

Thecor
rectansweri
s:I
dent
if
ysof
tent
erpr
ise

Securi
tyarchi
tect
urei
ntr
oducesi
tsownnor
mat
ivef
lowst
hroughsyst
emsandamong
appl
icati
ons.
Thecor
rectansweri
s'Tr
ue'
.

Thesubst
ant
iat
ionoft
hei
dent
it
yofaper
sonorent
it
yrel
atedt
otheent
erpr
iseorsyst
em i
n
someway.

Thecor
rectansweri
s:Aut
hent
icat
ion

Secur
it
yar
chi
tect
urei
ntr
oducesuni
que,si
ngl
e-pur
posecomponent
sint
hedesi
gn.

Thecor
rectansweri
s'Tr
ue'
.

Theabil
it
ytotestandprovethatt
heenter
prisear
chi
tect
urehast
hesecur
it
yat
tr
ibut
es
requi
redtoupholdthest
atedsecuri
typol
i
cies.

Thecor
rectansweri
s:Assur
ance

Qui
z6:samevi
bes?Yungpar
ehokayongnagsasagotngbl
ended

Thefol
lowi
ngsecur
it
yspeci
fi
csappr
opri
atetothesecur
it
yarchi
tect
uremustbeaddr
essed
wit
hineachphasei
naddi
ti
ontothegener
icphaseacti
vi
ti
es.Whatphasei
sthat?

Thecor
rectansweri
s:PhaseA:Ar
chi
tect
ureVi
si
on

Changesinsecuri
tyrequi
rementsareoft
enmoredisr
upt
ivethanasi
mplif
icat
ionor
i
ncrementalchange.Changesinsecur
it
ypol
icycanbedrivenbyst
atut
e,regulat
ion,or
somethi
ngthathasgonewr ong.Whatphaseist
hat?

Thecor
rectansweri
s:PhaseH:Ar
chi
tect
ureChangeManagement

Revisi
tassumpti
onsregar di
ngint
erconnecti
ngsystemsbeyondproj
ectcontr
ol,I
denti
fyand
eval
uateappli
cablerecognizedguidel
inesandstandar
dsandIdenti
fymethodstoregulat
e
consumpt i
onofresources.Whatphasei st
hat?

Thecor
rectansweri
s:PhaseD:Technol
ogyAr
chi
tect
ure
Developmentoft
hebusi
nessscenar
iosandsubsequenthi
gh-
leveluse-casesoft
heproject
concernedwil
lbr
ingt
oatt
enti
onthepeopleact
orsandsyst
em actorsi
nvolved.Whatphase
i
sthat?

Thecor
rectansweri
s:PhaseB:Busi
nessAr
chi
tect
ure

Assessandbasel
i
necur
rentsecur
it
y-speci
fi
ctechnol
ogi
es.Whatphasei
sthat
?

Thecor
rectansweri
s:PhaseD:Technol
ogyAr
chi
tect
ure

Areappl
icabl
etoensur
ingt
hatsecur
it
yrequi
rement
sar
eaddr
essedi
nsubsequentphas
es
oftheADM.Whatphaseisthat
?

Thecor
rectansweri
s:PhaseA:Ar
chi
tect
ureVi
si
on

Aful
li
nvent
oryofar
chi
tect
ureelementst
hatimpl
ementsecur
it
yser
vicesmustbecompi
l
ed
i
nprepar
ati
onforagapanalysi
s.Whatphaseist
hat
?

Thecor
rectansweri
s:PhaseC:I
nfor
mat
ionSyst
em Ar
chi
tect
ure

Det
erminewhoarethel
egi
ti
mat
eact
orswhowi
l
lint
eractwi
tht
hepr
oduct
/ser
vice/
process.
Whatphasei
sthat
?

Thecor
rectansweri
s:PhaseB:Busi
nessAr
chi
tect
ure

Changesinsecuri
tyst
andardsareusual
l
ylessdi
srupt
ivesi
ncethetrade-of
ffort
heir
adopt
ionisbasedonthevalueofthechange.However,st
andardschangescanalsobe
mandated.Whatphaseisthat?

Thecor
rectansweri
s:PhaseH:Ar
chi
tect
ureChangeMana

Assessandbasel
i
necur
rentsecur
it
y-speci
fi
ctechnol
ogi
es.Whatphasei
sthat
?

Thecor
rectansweri
s:PhaseD:Technol
ogyAr
chi
tect
ure
Def
ini
ti
onofr
elevantst
akeholdersanddiscover
yoft
heirconcernsandobj
ect
iveswi
l
l
r
equir
edevel
opmentofahi gh-level
scenari
o.Whatphaseisthat?

Thecor
rectansweri
s:PhaseA:Ar
chi
tect
ureVi
si
on

I
dent
if
yexi
sti
ngsecur
it
yser
vicesavai
l
abl
eforr
e-use.Whatphasei
sthat
?

Thecor
rectansweri
s:PhaseE:Oppor
tuni
ti
es&Sol
uti
ons

Def
ini
ti
onofr
elevantst
akeholdersanddiscover
yoft
heirconcernsandobj
ect
iveswi
l
l
r
equir
edevel
opmentofahi gh-level
scenari
o.Whatphaseisthat?

Thecor
rectansweri
s:PhaseA:Ar
chi
tect
ureVi
si
on

Assessandbasel
i
necur
rentsecur
it
y-speci
fi
car
chi
tect
ureel
ement
s.Whatphasei
sthat
?

Thecor
rectansweri
s:PhaseC:I
nfor
mat
ionSyst
em Ar
chi
tect
ure

Everysystem wi
l
lrel
yuponr esour
cesthatmaybedepl
etedi
ncasest
hatmayormaynotbe
anti
cipat
edatthepointofsyst
em desi
gn.Whatphasei
sthat
?

Thecor
rectansweri
s:PhaseD:Technol
ogyAr
chi
tect
ure

Est
abl
i
shar chi
tect
urear
ti
fact,desi
gn,andcoderevi
ewsanddef i
neaccept
ancecr
it
eri
afor
t
hesuccessful
implementat
ionofthefi
ndings.Whatphasei
sthat?

Thecor
rectansweri
s:PhaseG:I
mpl
ement
ati
onGover
nance

Assessthei
mpactofnewsecuri
tymeasur
esuponot
hernewcomponent
sorexi
sti
ng
l
everagedsyst
ems.Whatphaseist
hat?

Thecor
rectansweri
s:PhaseF:Mi
grat
ionPl
anni
ng
From t
heBaselineSecurit
yAr chi
tectur
eandtheEnterpri
seCont
inuum,therewil
lbeexi
sti
ng
securi
tyi
nfr
astr
uctureandsecur i
tybuil
dingbl
ocksthatcanbeappli
edtotherequir
ements
deri
vedfrom t
hisarchi
tectur
edevel opmentengagement.Whatphaseisthat?

Thecor
rectansweri
s:PhaseE:Oppor
tuni
ti
es&Sol
uti
ons

I
naphasedi mplementat
iont
henewsecur i
tycomponentsareusuall
ypartofthe
i
nfr
ast
ruct
ureinwhi cht
henewsystem isi
mpl ement
ed.Thesecuri
tyinf
rast
ructur
eneedst
o
beinafi
rstorearl
yphasetoproper
lysupportthepr
oject
.Whatphaseisthat?

Thecor
rectansweri
s:PhaseF:Mi
grat
ionPl
anni
ng

Manysecur i
tyvul
nerabi
li
ti
esori
ginateasdesi
gnorcodeerr
orsandt
hesimpl
estandl
east
expensivemethodtolocateandfindsucherr
orsi
sgener
all
yanearl
yrevi
ewbyexper
ienced
peersinthecraf
t.Whatphaseisthat?

Thecor
rectansweri
s:PhaseG:I
mpl
ement
ati
onGover
nance

NAKUHAMOTONGLI BRE,WAGMONG
PAGKAKI
TAANHANGAL!!
!

Your
str
uly:At
emongpayatper
omat
abaangpuso

You might also like