Professional Documents
Culture Documents
Third Examination
General Instructions:
• You are only allowed to commit two (2) erasures for the entire part of the exam.
• Tampering or altering your answers is considered as an erasure.
• Not following instructions would result to score divided by 2 for the specific part of exam
not followed.
• Cheating is strictly not allowed. Anyone caught will be dealt with accordingly.
• Approach your teacher if you have questions.
I. MULTIPLE CHOICE. SHADE THE LETTER of the correct answer. If you think the answer is
not found the choices, WRITE THE CORRECT ANSWER.
4. Which of the following is a common goal 8. What is the primary purpose of smishing
of phishing attacks? attack?
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135
19. What is a common precautionary 23. What does the term "bug" refer to in
measure to avoid falling victim to software development?
ransomware attacks? A. A feature requested by the customer
A. Opening email attachments from B. An error or flaw in the code
unknown sources C. A document outlining project
B. Regularly updating antivirus requirements
software D. A software design pattern
C. Disabling firewall protection
D. Sharing encryption keys with 24. Which of the following is a common
colleagues practice to prevent phishing attacks in an
organizational setting?
20. What should users do if they suspect A. Share sensitive information freely
they have fallen victim to a phishing attack? within the organization
A. Keep it to themselves to avoid B. Disable all security features to
embarrassment streamline communication
B. Share the incident on social media C. Use generic, easily guessable
for awareness passwords for all accounts
C. Change passwords and monitor D. Conduct regular security awareness
accounts for suspicious activity training for employees
D. Respond to further phishing
attempts to gather evidence 25. What should users be cautious about
when receiving unexpected emails urging
21. What is the significance of regularly immediate action, such as verifying account
updating software and operating systems in information or resetting passwords?
preventing phishing attacks? A. Take immediate action without
A. It slows down computer question
performance B. Verify the email's legitimacy by
B. It increases vulnerability to attacks clicking on provided links
C. It patches security vulnerabilities C. Contact the company directly using
and enhances protection official contact information input
D. It has no impact on cybersecurity D. Share the email on social media for
community
22. How can users identify a secure website
and reduce the risk of falling victim to 26. Why is it crucial for organizations to
phishing on fake websites? implement a strong incident response plan
A. Look for a padlock icon in the to combat phishing attacks?
address bar and use "https" in the A. To ignore phishing attempts and
URL discourage attackers
B. Trust websites with flashy B. To alert employees about the latest
animations and pop-ups phishing techniques.
C. Share personal information without C. To efficiently respond and mitigate
checking the site's security features the impact of a successful attack
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135
27. How can users strengthen their 31. What is angler phishing?
password security to prevent falling victim A. A type of fishing for aquatic animals
to phishing attacks? B. A phishing attack targeting anglers
A. Use the same password for multiple and fishermen
accounts C. A deceptive technique that uses fake
B. Use easily guessable passwords like customer support handles on social
"password123" media
C. Enable multi-factor authentication D. A phishing attack that leverages
(MFA) comments on social media to
D. Share passwords with trusted distribute malicious content
friends
32. How do attackers often disguise their
28. In smishing attacks, what is a common malicious links in angler phishing attacks?
characteristic of malicious text messages? A. By using shortened URLs
A. Grammatically perfect sentences B. By using long and descriptive URLS
B. Urgent requests for information C. By embedding the links in images
C. Clear sender identification D. By avoiding the use of links
D. Neutral and non-emotional language altogether
29. What precautionary measure can help 33. How can users recognize potential
individuals avoid falling victim to smishing angler phishing attacks on social media?
attacks? A. By ignoring all comments on social
A. Open all text messages and click on media
links without verification B. By clicking on all shared links for
B. Share personal information freely verification
through text messages C. By checking the authenticity of
C. Verify the legitimacy of text profiles and scrutinizing links in
messages and avoid clicking on comments
suspicious links D. By responding to all comments to
D. Respond to urgent requests for establish communication
information immediately
34. In angler phishing, what is the danger of
30. What precautionary measure can help clicking on malicious links in comments or
individuals avoid falling victim to vishing replies?
attacks? A. A. It improves online security
A. Avoid answering phone calls from B. It can lead to the installation of
unknown numbers malware or the theft of sensitive
B. Share personal information over the information
phone freely C. It enhances social media
C. Trust all incoming calls without engagement
verification D. It supports legitimate businesses
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135