Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

CyerSec FINALS

LAST DANCE

QuestionAnswer
Which law requires impact assessments for high-risk processing activities? GDPR
The Data Privacy Act of 2012 was enacted in: Philippines
Which regulation is specific to the European Union? GDPR
Which U.S. Act of 2002 included provisions for critical infrastructure protection? Homeland Security Act
Cybercrime includes: Hacking, identity theft, malware distribution
A data breach occurs when: Confidential or protected data is accessed without authorization
A hospital restricts access to patient records only to attending physicians. This follows least privilege principle. TRUE
Which are safeguards for cross-border data transfers under GDPR? Adequacy decisions | Standard Contractual Clauses | Binding Corporate Rules
Which event led to stricter international privacy frameworks in the 2000s? Increasing frequency of cyberattacks
What does DPIA stand for? Data Protection Impact Assessment
A cyberattack aiming to make a system unavailable refers to: Denial of Service
A government requires telecoms to retain communication data only for legally defined periods. This complies with retention limits. TRUE
Which directive aims to achieve a high common level of network security in the EU? NIS Directive
A retail shop collects customer emails and uses them for unrelated political ads. This complies with data minimization. FALSE
Privacy laws primarily regulate: Collection, processing, and sharing of personal data
Which law governs EU member states’ network and information security? NIS Directive
Which international agency promotes cybersecurity in the EU? ENISA
What is the purpose of pseudonymization? Reducing re-identification risk by replacing identifiers
Which are key rights of data subjects under privacy laws? Right to rectification | Right to erasure (forgotten) | Right to access
Which is a historical driver for privacy law? Expansion of the internet and online threats
Which principle ensures that personal data is processed fairly and lawfully? Transparency and legitimate purpose
Which principle prevents organizations from collecting unlimited data? Proportionality
Which are examples of lawful bases for processing personal data under GDPR? Consent| Legal obligation |Contract performance
A company processes personal data of EU citizens without GDPR compliance. This is lawful. FALSE
Which regulation aims to harmonize cybersecurity across EU nations? NIS Directive
Which principle emphasizes giving individuals control over their data? Consent
Which country pioneered early data protection legislation? Germany
Which are critical elements of national cybersecurity strategies? Enforcing incident reporting | Public awareness campaigns | Protecting critical infrastructure
The accountability principle requires: Records of processing and demonstration of compliance
A company refuses to disclose how long it keeps customer data. This demonstrates accountability. FALSE
A company shares medical records with advertisers without consent. This complies with HIPAA. FALSE
Which EU law laid the foundation for modern data protection? Data Protection Directive of 1995
An airline keeps passenger passport data forever even after travel. This complies with retention limits. FALSE
Which are examples of incident response plan steps? Containment| Recovery| Identification of incident
Which U.S. law addresses protection of patient health information? HIPAA
Which is a key risk of weak jurisdictional enforcement in data privacy? Cross-border misuse of data
Which of the following is NOT part of the CIA Triad? Transparency
What does “jurisdiction” mean in data privacy? Legal authority over geographical area or data transfers
Which is NOT an example of a cybersecurity incident? System software update
Which cybersecurity law promotes consumer trust in digital services? GDPR
Which law enforces mandatory breach notifications within 72 hours? GDPR
Which of the following is an example of accountability in practice? Appointing a Data Protection Officer and keeping compliance records
Which concept involves notifying individuals and authorities after a breach? Breach notification requirement
Which principle requires data collection to be limited to what is necessary? Proportionality
Which are examples of encryption use in compliance? Protecting communications with SSL/TLS | Protecting stored medical records | Securing online payment transactions
Which is the most critical role of corporate accountability laws? Ensuring organizations safeguard data and face penalties if not compliant
A Data Protection Impact Assessment (DPIA) is required under GDPR when: Processing poses high risk to individuals’ rights
The GDPR came into effect in which decade? 2010s
A government agency requires explicit consent before collecting fingerprints. This complies with privacy law. TRUE
Which country passed the CFAA? United States
Which are elements of the CIA Triad? Integrity | Availability | Confidentiality
Which legal concept refers to replacing identifiers with pseudonyms? Pseudonymization
Which country’s law is considered a global benchmark for data protection? EU’s GDPR
Which is a challenge in cross-border data transfer? Different privacy jurisdictions
A government publishes citizens’ addresses online without consent. This violates privacy law. TRUE
What is the primary goal of encryption in privacy law compliance? To prevent unauthorized access to sensitive data
Which Philippine law established a comprehensive framework for data protection? Data Privacy Act of 2012
Which regulation requires strong security measures in healthcare institutions? HIPAA
Which of the following defines “cybercrime”? Illegal activities conducted via computers or the internet
An employee leaks client data via personal email. The company later updates policies. The leak still violates privacy law. TRUE
Which principle requires organizations to demonstrate compliance with data protection laws? Accountability
A cloud storage provider retains backups indefinitely without justification. This complies with retention policies. FALSE
What does encryption ensure? Confidentiality and integrity of data
Which standard secures credit card transactions? PCI DSS
Which U.S. law targets fraud using computers? CFAA
A company deletes customer data once no longer needed. This follows data minimization. TRUE
Which of the following is an example of personal data? Phone number
Which are examples of cybercrime? Hacking | Malware distribution | Identity theft
Which are global privacy frameworks? APEC Privacy Framework | GDPR
Which regulation addresses consumer privacy in financial services? GLBA
An IT firm conducts a DPIA before launching biometric data processing. This aligns with GDPR. TRUE
What does “consent” mean in privacy law? Individual permission before data collection or processing
A company transfers EU customer data to another country with no equivalent privacy law, without safeguards. This complies with GDPR. FALSE
A company publishes anonymized statistics without identifiers. This generally complies with privacy law. TRUE
Which are possible consequences of data breaches? Loss of consumer trust | Legal liability | Financial penalties
A school encrypts student grades and allows only teachers to access them. This aligns with confidentiality. TRUE
Which decade saw the first wave of cybersecurity legislation? 1980s–1990s
What is the focus of the Payment Card Industry Data Security Standard (PCI DSS)? Credit card transaction security
Which are benefits of international harmonization of cybersecurity laws? Consistent data protection standards | Easier compliance for global businesses | Facilitation of trade
Which are responsibilities of a Data Protection Officer (DPO)? Monitoring processing activities | Serving as contact point for authorities | Advising on compliance
A bank ignores a client’s request to erase outdated personal data. This complies with the right to be forgotten. FALSE
Which are key purposes of cybersecurity law? Safeguarding national security | Preventing cyberattacks | Protecting digital infrastructures
Which principle supports deleting personal data after consent is withdrawn? Right to be forgotten
Which are considered personal data? IP Address | Name | Biometric Data
Which framework by NIST improves cybersecurity for critical infrastructure? Cybersecurity Framework
Why are privacy laws crucial in the digital age? Because personal data is a valuable commodity and misuse is a risk
A retailer collects customer consent before sending marketing emails. This complies with lawful processing. TRUE
The principle of “data retention” requires: Storing data only as long as legally or operationally needed
Which country introduced the “Right to be Forgotten”? European Union
Which are recognized sensitive data categories? Medical information | Political opinions | Biometric identifiers
Which are principles of lawful processing? Proportionality | Transparency | Legitimate purpose
A social media platform asks explicit consent before using personal photos for ads. This follows lawful processing. TRUE
Which of the following best defines “cybersecurity”? Protecting systems, networks, and data from digital attacks
Which are examples of accountability practices? Conducting DPIAs | Maintaining records of processing | Appointing a DPO when required
What is the “right to be forgotten”? Requesting deletion of personal data no longer needed
A hospital encrypts patient data but lets all employees access it without logging. This complies with confidentiality. FALSE
Which type of law punishes online fraud and identity theft? Cybercrime law
Which right under GDPR lets individuals transfer data between providers? Right to Portability
Which is a key consumer right under GDPR? Right to data portability
A healthcare clinic locks filing cabinets with patient data. This is a HIPAA safeguard. TRUE
Which Philippine DPA violation occurs when ex-employees leak data in bad faith? Malicious Disclosure
Which Philippine DPA violation involves using collected data for politics without consent? Unauthorized Purpose
A company deletes inaccurate personal data upon user request. This aligns with GDPR. TRUE
Which examples count as PHI under HIPAA? Medical history | Patient names | Lab test results
Which GDPR principle requires businesses to demonstrate compliance? Accountability
Which of the following is a key feature of GDPR consent? Must be informed, specific, and unambiguous
Which rights under CCPA mirror GDPR? Right to access | Right to data portability | Right to delete
A Philippine university posts student data publicly without consent. This violates DPA 2012. TRUE
Under CCPA, companies can charge higher prices to consumers who opt out of data sales. FALSE
A company hides a cyber breach from customers to avoid reputational damage. This complies with GDPR. FALSE
What is the role of a Data Protection Officer (DPO)? Oversee compliance with data protection laws
Under HIPAA, hospitals may share patient records with advertisers without consent. FALSE
A Philippine telco collects location data for marketing without consent. This complies with DPA 2012. FALSE
Which of the following does NOT fall under GDPR scope? Local clubs with no personal data
Which are penalties under the Philippine DPA 2012? Suspension of business permits | Imprisonment | Fines
Which are key cross-border data transfer challenges? Enforcement complexity | Differing national laws | Data localization rules
Which are obligations under HIPAA? Protect PHI | Provide breach notification | Implement safeguards
Which measures align with Data Protection by Design? Role-based access control | Encryption by default | Minimal data collection
Which law requires businesses to disclose categories of data collected? CCPA
Under DPA 2012, unauthorized disclosure of personal data may result in imprisonment. TRUE
What is the California penalty for unintentional CCPA violations? $2,500
A U.S. hospital fails to provide patients with a copy of their medical records. This violates HIPAA. TRUE
An e-commerce firm fails to display a “Do Not Sell My Personal Information” link for California users. This violates CCPA. TRUE
Which of the following does HIPAA cover? Healthcare providers
Which principle limits keeping data longer than necessary? Storage Limitation
Which Philippine violation involves throwing printed patient records in a public trash bin? Improper Disposal
A Philippine government agency discloses citizen data to third parties without consent. This violates DPA 2012. TRUE
Which entities are covered by HIPAA? Healthcare clearinghouses | Health insurance plans | Healthcare providers
Which law sets penalties up to €20M or 4% turnover? GDPR
Which Philippine violation is committed when an employee sells patient data? Malicious Disclosure
Which U.S. law protects patient health data? HIPAA
Which HIPAA safeguard involves encrypting electronic health records? Technical safeguard
Which are rights under GDPR? Access | Erasure | Rectification
Which Philippine penalty applies for negligence in access? 1–6 years imprisonment and fines
A California-based business with $5 million annual revenue automatically falls under CCPA obligations. FALSE
Which law requires “Do Not Sell My Personal Information” link? CCPA
Under GDPR, a DPO is required for companies that monitor data on a large scale. TRUE
A hospital in the Philippines encrypts patient records but fails to notify NPC after a breach within 72 hours. The hospital is compliant with DPA 2012. FALSE
Which right is explicitly given to California residents under CCPA? Right to Know what personal data is collected
Which law imposes fines up to ₱4M and imprisonment for privacy violations? Philippine DPA 2012
Which organization enforces the Data Privacy Act of 2012 in the Philippines? National Privacy Commission (NPC)
Which are key differences between HIPAA and GDPR? HIPAA | focuses on PHI | GDPR covers all personal data | HIPAA is sector-specific
Which Philippine DPA violation is committed when an HR department loses an unsecured USB? Negligence in Access
Which principle emphasizes that personal data must be processed fairly, lawfully, and transparently? Lawfulness, Fairness, Transparency
Which of the following is a HIPAA enforcement mechanism? Office for Civil Rights (OCR)
Which Philippine DPA violation is committed when a teacher posts student grades publicly? Unauthorized Disclosure
Which law mandates breach reporting both to regulators and individuals? GDPR
Which law grants the right to file legal action after a data breach? DPA 2012
Under GDPR, breach notification must always be done within 24 hours. FALSE (72 hours)
Which principle requires companies to adopt security measures from the start of system design? Data Protection by Design and by Default
Which GDPR right allows individuals to object to processing for marketing? Right to Object
An EU company transfers data to a country with no adequacy decision and no SCCs. This complies with GDPR. FALSE
Which EU law came into effect on May 25, 2018? GDPR
GDPR fines can be up to: €20 million or 4% of global turnover
Which mechanism allows global businesses to transfer data within their subsidiaries? Binding Corporate Rules
A Russian company requiring all citizen data to remain in Russia demonstrates a localization requirement. TRUE
Which of the following is a penalty for intentional violation of CCPA? $7,500
Which Philippine DPA violation involves intentionally sharing data to a competitor? Malicious Disclosure
Which GDPR principle states only necessary data should be collected? Data Minimization
Which GDPR right allows individuals to request their data be deleted when no longer needed? Right to be Forgotten
Which Philippine DPA violation combines two or more offenses? Combination of Acts
Which HIPAA safeguard prevents unauthorized entry into data centers? Physical
Under GDPR, data breach notification to the supervisory authority must occur within: 72 hours
Which law grants the right to file legal action after a data breach? CCPA
Which of the following are GDPR data subject rights? Right to be informed | Right to restrict processing | Right to erasure
Which data subject rights exist under GDPR but not explicitly under CCPA? Right to be forgotten | Right to restriction of processing | Right to rectification
Which are penalties under CCPA? Imprisonment | $2,500 per unintentional violation | $7,500 per intentional violation
Under HIPAA, which type of data is specially protected? Protected Health Information (PHI)
Which of the following is NOT a key GDPR principle? Profit Maximization
A U.S. company selling to EU customers must comply with GDPR, even if not based in Europe. TRUE
Which CCPA right allows consumers to stop companies from selling their data? Right to Opt Out
Which are consumer rights recognized under GDPR and DPA 2012? Right to access | Right to rectification | Right to be informed
What is the maximum penalty for HIPAA violations per violation? $50,000
Which consumer right is unique to CCPA? Right to opt out of data sale
A website installs cookies without informing users. This complies with GDPR’s transparency principle. FALSE
Which GDPR right allows individuals to stop processing under certain conditions? Right to Restrict Processing
A company must disclose the purpose for which it collects data under CCPA. TRUE
Which of the following is NOT a penalty for violating the Philippine DPA? Community service only
Which cross-border tool is an internal company policy approved for multinational transfers? Binding Corporate Rules (BCRs)
Which GDPR principle is violated if a company keeps data forever? Storage Limitation
Under GDPR, consent must be freely given, specific, and informed. TRUE
Under DPA 2012, breach notification to the NPC must occur within: 72 hours
Which mechanisms protect EU citizens’ data transferred overseas? BCRs | Adequacy Decisions | SCCs
A firm implements SCCs to transfer EU data abroad. This aligns with GDPR. TRUE
Which cross-border mechanism applies in absence of adequacy decisions? Standard Contractual Clauses (SCCs)
Which GDPR principle ensures data is accurate and kept up to date? Accuracy
Which HIPAA requirement ensures breach notification to affected individuals? Breach Notification Rule
Which GDPR right is also mirrored in DPA 2012? Right to Access
A healthcare provider uses strong encryption and access control to protect patient records. This aligns with HIPAA safeguards. TRUE
Which is an adequacy mechanism under GDPR? Adequacy Decision by EU Commission
Which law has extraterritorial scope, applying to organizations outside its jurisdiction? GDPR
Which recovery activities are considered best practices? Reinstalling clean software, Restoring data from verified backups , Monitoring for re-infection
Which body oversees breach notifications under GDPR? Data Protection Authorities (DPAs)
Which IRP phase involves revising security controls after analyzing what went wrong? Lessons Learned
Incident response plans should be tested annually or biannually to remain effective. TRUE
A retail company in California experiences a breach affecting customer names and addresses. Which law applies primarily? CCPA
Which IRP step is critical for maintaining evidence integrity in potential legal investigations? Identification and containment
Which are common causes of data breaches? Phishing attacks, Unpatched vulnerabilities, Insider threats
A company delays breach notification because it fears reputational harm. This complies with GDPR. FALSE
What is the main role of a DPA in breach cases? Investigating and enforcing compliance
In the Equifax breach, stolen data included credit card details and Social Security numbers. TRUE
An organization’s systems are patched, but attackers return because stolen credentials weren’t revoked. Which IRP failure occurred? Eradication
An organization detects spam campaigns in its network but ignores them because no sensitive data was exposed. This is acceptable under GDPR. FALSE
A hospital ransomware attack encrypted patient files, but the hospital refused to notify regulators because backups restored data. This action is compliant with HIPAA. FALSE
Which of the following are mandatory elements of a GDPR breach notification? Nature of the breach , Categories of personal data affected , Contact details of the Data Protection Officer
Which IRP stage involves communicating with external stakeholders, including DPAs and customers? Notification/Communication
An organization creates policies, forms a Computer Security Incident Response Team (CSIRT), and trains employees. Which IRP phase does this represent? Preparation
The Marriott breach showed that vulnerabilities inherited during acquisitions may go unnoticed. TRUE
Which regulation specifically protects U.S. healthcare patient records during incidents? HIPAA
Which are examples of Eradication activities? Removing malware, Deleting unauthorized user accounts, Applying security patches
The Philippine Data Privacy Act allows organizations to completely skip reporting if only 10 people are affected, even if sensitive data was stolen. FALSE
Which breach showed failure to secure passport data during hotel bookings? Marriott
The National Privacy Commission (Philippines) requires breach notifications even for suspected incidents. FALSE
A ransomware attack encrypts a company’s HR system. Employees cannot work. What should the organization do first? Contain the affected HR system
A company that encrypts sensitive data but still gets breached is not legally required to notify authorities under any law. FALSE
Which breach involved attackers injecting malicious scripts into an airline’s website to capture card details? British Airways
A company creates an incident logbook documenting actions during a breach. This practice belongs to which IRP phase? Identification and Containment
A company tests its breach notification procedures by running a simulation. This falls under which IRP phase? Preparation
Which of the following were highlighted as ETSI Security Incident Indicators? Website Defacement
Which laws mandate breach notification obligations? GDPR, HIPAA, Philippine DPA 2012
Lessons Learned meetings should include both technical and non-technical staff. TRUE
Which case taught the importance of vendor and acquisition risk management? Marriott
Which breach revealed the risk of using third-party scripts for payments? British Airways
If an organization keeps a detailed incident response log, it can be used as legal evidence later. TRUE
Which IRP step ensures systems are monitored after recovery to detect recurrence? Post-Recovery Monitoring
During an incident, the security team isolates affected servers to prevent further spread. This represents which IRP phase? Containment
An effective IRP requires coordination between technical teams, legal counsel, and communication staff. TRUE
What is the main difference between HIPAA and GDPR breach notifications? HIPAA applies to PHI, GDPR covers all personal data
Which best practices apply during the Lessons Learned phase? Update security policies, Revise training programs, Analyze logs and response effectiveness
Which incidents specifically involved credit card theft? British Airways, Target (reference example)
GDPR requires that breach notifications include details about mitigation efforts. TRUE
Which industries are especially regulated regarding breach notifications? Healthcare (HIPAA), Finance (GDPR, DPA), E-commerce (PCI-related)
Which breach taught the industry about risks in credit-reporting infrastructures? Equifax
Which law emphasizes consumer rights to know, delete, and opt-out after a breach? CCPA
Which breach response step can be legally required across GDPR, HIPAA, and DPA 2012? Breach notification to regulators and affected individuals
An organization restores systems before identifying the cause of a breach. This increases the chance of recurrence. TRUE
Under the Philippine Data Privacy Act (DPA 2012), who must organizations notify during a major breach? National Privacy Commission and affected individuals
What activities should organizations perform during the Preparation phase of IRP? Draft incident response policies, Establish CSIRT teams, Conduct training and simulations
Failing to patch known vulnerabilities is an example of poor preparation in IRP. TRUE
Which organizations must comply with HIPAA breach notification rules? Hospitals, Health insurance companies, Healthcare clearinghouses
Under HIPAA, covered entities must notify affected individuals without unreasonable delay. TRUE
Which Philippine authority enforces data privacy regulations and breach notifications? National Privacy Commission
If hackers replace a company website with political propaganda, what ETSI indicator is this? Website Defacement
Which communication channels are acceptable for notifying individuals of a breach? Written letters, Email notifications , Public announcements (for large-scale incidents)
The British Airways breach involved stolen data from passengers’ travel itineraries and payment details. TRUE
Which factor worsened Yahoo’s response to its breach? Delay in disclosure to users
Which breach highlighted vulnerabilities in web applications through malicious JavaScript? British Airways
After responding to a phishing attack, the security team updates training programs and policies. This reflects which IRP phase? Lessons Learned
Which Philippine regulation obliges companies to submit a breach notification within 72 hours? DPA 2012
Which IRP phase includes determining whether the event is a true security incident or a false alarm? Identification
Which breach highlighted poor incident monitoring and communication with regulators? Yahoo
A company immediately notifies customers about a suspected breach even before confirming it. This may cause panic but fulfills notification duties. TRUE
Which law requires notification of a data breach to a supervisory authority within 72 hours? GDPR
An attacker modifies DNS records to redirect users to fake sites. Which ETSI indicator best applies? Website Forgery
Which are common consequences of poor breach notification? Regulatory fines, Loss of customer trust, Litigation costs
In HIPAA breach notifications, which of the following must be communicated to individuals? Description of the incident, Types of PHI involved. Steps individuals should take to protect themselves
Which ETSI indicator involves overwhelming a server with traffic to disrupt services? DoS Attack
A financial firm discovers hackers exploiting an unpatched vulnerability. What must be done after containment? Eradicate the root cause
Which steps ensure legal compliance in breach response? Timely notification to regulators, Providing mitigation advice to victims, Documenting all actions taken
Which incident response best practice reduces downtime for critical services? Maintain redundant systems for continuity
Under GDPR, who bears the burden of proving compliance with breach notification rules? Organizations (Data Controllers)
The Yahoo breach demonstrated that multi-year notification delays severely damage trust. TRUE
The ETSI indicator “Spam” would most likely be detected during which IRP phase? Identification
A phishing email campaign should be classified as an intrusion in ETSI categories. FALSE
Which law primarily enforces consumer rights in California regarding breach notifications? CCPA
Which factors determine whether a breach must be reported? Number of individuals affected, Sensitivity of data exposed, Likelihood of harm
A company uses “tabletop exercises” to test its IRP. This technique belongs to which stage? Preparation
Which phase ensures systems are fully functional and secure before going back online? Recovery
Which breach case showed that acquisition due diligence should include cybersecurity checks? Marriott
If a hacker uses fake “Bank Login” emails to steal credentials, what ETSI indicator is this? Phishing
Which breach case demonstrates the importance of encryption of sensitive fields like passport numbers? Marriott
Which breach revealed vulnerabilities inherited during an acquisition? Marriott
What is the main purpose of incident assessment? Determine scope, impact, and severity
A phishing campaign successfully tricks employees into clicking malicious links. Which immediate step is best? Containment
A university suffers ransomware but recovers from backup. Which ETSI indicator applies? Malware
What is the most important factor in successful breach notifications? Timeliness and accuracy of disclosure
A bank notifies customers within 24 hours of detecting unauthorized ATM withdrawals. This demonstrates strong compliance with incident response. TRUE
A Philippine hospital loses unencrypted laptops containing patient records. Which step must follow immediately after containment? Notify NPC and affected patients
Which actions are part of the Containment phase in IRP? Isolating affected systems, Blocking malicious IP addresses
Which breaches were notable for delayed notifications? Yahoo, Equifax
Which IRP phase ensures continuity of critical operations while incidents are addressed? Containment
In breach notifications under the Philippine DPA 2012, which information must be provided? Measures taken by the organization
Which IRP step involves removing unauthorized accounts created during a breach? Eradication
In the “Lessons Learned” phase, which action is most effective? Reviewing logs and updating IRP policies
Which breach taught organizations about the cost of failing to patch known vulnerabilities? Equifax
A delay of several years in notifying users about stolen account credentials characterizes which case? Yahoo
An ISP monitors and blocks child pornography websites. This aligns with RA 9775. TRUE
Which is an example of malicious disclosure under RA 10173? An employee leaking a patient’s HIV status online out of spite
Who ensures organizational compliance with RA 10173? Data Protection Officer (DPO)
Which law protects intellectual property rights, including software and databases? RA 8293
Which are common compliance challenges in the Philippines? Lack of awareness of privacy laws, Limited resources among SMEs, Cross-border transfer complexities
Which of the following are general data privacy principles under RA 10173? Transparency , Legitimate purpose, Proportionality
RA 8792 grants legal recognition to: Electronic contracts and digital signatures
The COMELEC 2016 data breach exposed how many voters’ personal data? 55 million
Which law mandated the use of digital signatures in government transactions? E.O. 810
Which laws regulate digital signatures? RA 8792 – E-Commerce Act, E.O. 810 – Institutionalizing digital signatures
An employee leaks a co-worker’s medical record on social media out of spite. This is malicious disclosure under RA 10173. TRUE
Which RA 10173 provision ensures accountability when outsourcing data processing? Section 21 – Principle of Accountability
If a personal information controller hires a third-party processor, what is required? A written contract ensuring compliance with the DPA
What penalty did the ILOVEYOU virus author face under Philippine law? None, because no cybercrime law existed then
A government office shreds outdated personnel files before disposal. This complies with RA 10173’s rules on disposal of information. TRUE
A company ignores the NPC’s compliance orders without consequence. This is consistent with RA 10173. FALSE
A school refuses to correct inaccurate student records when requested. This violates the right to rectification under RA 10173. TRUE
Which are responsibilities of a Data Protection Officer (DPO)? Ensure compliance with the DPA , Conduct privacy impact assessments, Serve as contact with NPC
A parent uses a child’s personal data to open a fraudulent loan account. This is identity theft under RA 10175. TRUE
Which is NOT a right of the data subject? Right to own government databases
A person hacks into a bank’s system to steal client information. This is punishable as illegal access under RA 10175. TRUE
Which agency enforces RA 8293 (Intellectual Property Code)? IPOPHL
Which law prohibits the unauthorized capture and distribution of sexual images? TRUE
Which type of data requires stricter protection under RA 10173? Sensitive personal information
The NPC reports directly to: Office of the President
Which provisions extend privileged communication to electronic formats? Lawyer–client communication, Doctor–patient communication
A hospital fails to notify the NPC within 72 hours after discovering a breach of patient records. This violates RA 10173. TRUE
A blogger copies entire copyrighted articles and reposts them online without permission. This violates RA 8293. TRUE
An individual posts intimate videos of an ex-partner online without consent. This violates RA 9995. TRUE
A company continuously trains its staff on data privacy awareness. This is a best practice for compliance. TRUE
A public official knowingly misuses citizens’ personal data for political gain. This may result in aggravated liability under RA 10173. TRUE
RA 9775 criminalizes: Child pornography
A company uses employee health data in performance evaluations without consent. This is lawful under RA 10173. FALSE
Which cases involved major data breaches in the Philippines? COMELEC “Comeleak” (2016), DFA passport data breach (2019), PhilHealth ransomware attack (2021)
Which are security measures recommended under RA 10173? Encryption of sensitive data, Access controls, Regular security audits
Under RA 10173, the right to data portability allows individuals to: Obtain and transfer their own data to another service provider
Which 2016 incident was one of the world’s largest government-related data breaches? COMELEC “Comeleak”
Which principle requires that data collection only be for lawful and specific purposes? Legitimate purpose
Which are considered cybercrime offenses under RA 10175? Illegal access, Identity theft, Cyber libel
A news outlet publishes the grades of students with names without consent. This is an authorized disclosure under RA 10173. FALSE
Which RA 10175 offense involves altering or destroying computer data? Data interference
A hacker installs malware to disrupt government websites. This is system interference under RA 10175. TRUE
How soon must the NPC be notified of a data breach? 72 hours
Which law required government websites to migrate to secure hosting? A.O.39
Which provision extends lawyer–client confidentiality to digital formats? Section 15
The DFA 2019 passport data breach violated: RA 10173 and RA 10175
Which demonstrates proportionality? Collecting only information needed for a loan application
Under RA 10175, system interference refers to: Disrupting or destroying a computer system
A hospital discovers a data breach but hides it from the NPC to protect its reputation. This is concealment of a security incident under RA 10173. TRUE
Which organization suffered a ransomware attack in 2021 that disrupted services? Philhealth
A cybercriminal sends phishing emails disguised as government COVID-19 aid notices. This is computer-related fraud under RA 10175. TRUE
Which is an example of a cross-border compliance challenge? Transferring Filipino personal data to servers abroad
Which agency leads prosecution of cybercrime? DOJ-Office of Cybercrime
A hospital requires its contractors to comply with the same privacy standards it follows. This aligns with RA 10173. TRUE
Which law established a national Public Key Infrastructure (PKI)? E.O. 810
Which of the following is considered system interference under RA 10175? Launching a denial-of-service attack
A hospital publishes patient records online without consent. Which law is violated? RA 10173
Which body was created under RA 10173? National Privacy Commission (NPC)
The main objective of the Data Privacy Act is to: Protect personal data while allowing free flow of information
What year was the Data Privacy Act (RA 10173) enacted? 2012
What penalty applies when multiple RA 10173 violations are committed together? Higher penalties under Section 33
What penalty applies for improper disposal of sensitive personal information under RA 10173? 1–3 years imprisonment and ₱100K–₱1M fine
A government agency mandates all employees to use certified digital signatures for internal communication. This aligns with E.O. 810. TRUE
Which rights are transmissible to heirs under RA 10173? Right to access Right to access , Right to rectification , Right to erasure
A bank encrypts its transaction logs and limits access to authorized employees. This follows proper security measures under RA 10173. TRUE
Which laws criminalize unauthorized capture or distribution of intimate images? RA 9995 – Anti-Photo and Video Voyeurism Act , RA 10175 – Cybercrime Prevention Act (content-related offenses)
RA 8792 primarily regulates: Electronic transactions and digital signatures
Which are functions of the National Privacy Commission (NPC)? Investigate data breaches, Issue compliance orders, Promote data privacy awareness
Which case involved hackers attempting to steal millions from a bank in 2016? PNB vs. Hackers
Which case highlighted the lack of a cybercrime law before RA 10175? ILOVEYOU virus
A bank deletes customer records once accounts are closed and obligations are settled. This follows proportionality under RA 10173. TRUE
Which law prohibits unauthorized interception of communications? RA 4200
Which of the following is NOT one of the Five Pillars of Privacy Accountability? Outsourcing all personal data with no safeguards
Which 2020 incident exposed personal data of city residents? Marikina LGU data breach
Under RA 10173, large-scale offenses involve at least: 100 Persons
Which agency supervises the Government Web Hosting Service mandated by A.O. 39? DOST-ICTO (now DICT)
A bank encrypts its transaction logs and limits access to authorized employees. This follows proper security measures under RA 10173. TRUE
What is the penalty for illegal access to critical infrastructure under RA 10175? Reclusion temporal (12–20 years)
Which is a cybercrime under RA 10175? Unauthorized access to a bank system
Which are penalties under RA 10173 for violations? Imprisonment terms, Monetary fines, Restitution for victims
Which is an example of negligent access? An employee leaving a laptop with personal data unattended
Which of the following best practices improve compliance with RA 10173? Regular staff training on privacy, Privacy impact assessments, Having a breach response plan
A telecom company clearly informs customers about data collection purposes before signing a contract. This follows the principle of transparency under RA 10173. TRUE
Which of the following is an example of privileged communication extended under RA 10173? Doctor–patient
Which is NOT a general data privacy principle under RA 10173? Confidentiality
A company transfers Filipino customer data to a foreign server without ensuring equivalent protection. This is a compliance issue under RA 10173. TRUE
Which laws are directly related to intellectual property and copyright? RA 8293 – Intellectual Property Code, RA 10175 – Cybercrime Prevention Act (IP-related offenses)
A company obtains valid consent to collect customer emails but later sells them to marketers without permission. This is lawful under RA 10173. FALSE
A group hacks government websites to protest against a law. This is punishable under RA 10175. TRUE
Which right allows a person to demand deletion of their personal data? Right to erasure (Right to be forgotten)
A student records a private phone call with a friend without consent. This is a violation of RA 4200. TRUE
Which of the following is an example of unlawful processing of personal information? A company selling email addresses without consent
Which are examples of improper disposal of sensitive information? Throwing unshredded medical records in public trash , Leaving police reports in open dumpsters
RA 9995 prohibits: Unauthorized recording and distribution of intimate videos
Rights under the DPA are: Transferable to heirs upon death or incapacity
A firm achieves PCI DSS certification. Which type of transactions does this certification primarily protect? Credit card transactions
Which of the following best describes COBIT? Governance and management framework for IT
Which ISO standards deal with privacy frameworks? ISO 29100 & ISO 27701
Which requirements are part of HIPAA safeguards? Administrative safeguards , Technical safeguards , Physical safeguards
A BPO firm secures cloud-hosted HR systems. Which standards guide both cloud security and cloud privacy? ISO 27017 and ISO 27018
Which ISO standard is designed to manage privacy within an ISMS? ISO 27701
A retailer without breach notification procedures is still compliant with ISO 27001. FALSE
A telecommunications provider builds a SOC that continuously monitors threats. Which compliance requirement supports this? ISO 27001 and NIST CSF monitoring
A retail chain adopts ISO 27001. What is its primary focus? Information Security Management System (ISMS) requirements
A BPO firm handling EU clients’ personal data adopts ISO 27701 to strengthen privacy protections. What does ISO 27701 primarily address? Privacy Information Management
A developer team integrates secure coding practices and validation into every project stage. Which ISO covers this? ISO 27034
A government financial agency develops both IT controls and financial governance policies. Which frameworks together best support this? COBIT and COSO
Which framework provides end-to-end services for cybersecurity and privacy portfolio? Global Cybersecurity Knowledge Ecosystem
An organization’s compliance team prepares a “Privacy Threat Scenario” as part of risk planning. This belongs to which framework implementation? Data Privacy Compliance Folder / Standard Tree
A cloud provider implements ISO 27017 and ISO 27018. What do these specifically address? Cloud security and cloud privacy
Cloud privacy protections are addressed by ISO 27017 and ISO 27018. TRUE
A manufacturing company adopts COSO to strengthen enterprise governance. Its emphasis is on: Internal control and risk management
ISO 29100 is designed as a privacy framework applicable globally. TRUE
A financial services company must secure customer credit card transactions. Which compliance framework applies? PCI DSS
Which ISO standard sets out the Information Security Code of Practice? ISO 27002
PCI DSS applies only to government agencies. FALSE
An enterprise adopts ISO 27033. Which domain does this cover? Network Security
Which are considered evolving compliance structures and programs? Data Privacy Wall , End-to-End Security Portfolio , Global Cybersecurity Knowledge Ecosystem
Which ISO standards support application and software security? ISO 27034 & ISO 27036 (supplier security)
A financial institution evaluates how IT processes align with enterprise objectives. Which framework fits best? COBIT
A credit card breach occurred in a retailer due to weak encryption. Which mandatory standard was breached? PCI DSS
Which are privacy-focused standards? ISO 29100 , ISO 27701 , ISO 27018
A bank outsources IT services but fails to secure supplier contracts. This violates ISO 27036. TRUE
Which compliance framework provides enterprise risk and financial reporting guidance? COSO
A national government develops a program to protect its digital ecosystem using NIST guidelines. What is the first function? Identify
Which technologies raise issues with cross-border compliance? Cloud computing, Blockchain applications, Big data analytics
AI systems processing sensitive health records must comply with: GDPR and HIPAA provisions
Blockchain’s permanence of transactions creates challenges for: Data subject rights under GDPR
Blockchain can challenge data rectification rights due to its immutability. TRUE
A company uses AI surveillance to monitor employees’ emotional states. Which primary ethical concern arises? Privacy and autonomy
A company analyzing big data identifies ethnicity trends and sells them to insurers. Which principle is violated? Non-discrimination and fairness
A company using big data sells anonymized datasets that can still be re-identified. Which principle is violated? Privacy and data protection by design
Cloud providers that do not implement incident response plans most likely violate: Accountability and security obligations
AI models collecting personal voice data for assistants without consent primarily raise: Privacy and informed consent
A company deploying AI to personalize pricing may risk violating: Fairness and discrimination protections
IoT devices monitoring patient health require compliance with: GDPR and HIPAA provisions
An AI system used for hiring decisions is found to discriminate against women. Which principle is most directly violated? Fairness
Which principle is undermined when AI is used in predictive hiring without testing for bias? Fairness and non-discrimination
IoT devices collecting children’s data without parental consent may breach COPPA and GDPR. TRUE
An IoT smart car continuously shares driving habits with insurers without notice. Which concern arises? Consent and informed choice
Blockchain’s immutability conflicts with which GDPR principle? Right to be forgotten
Blockchain applications in finance raise compliance issues with: Anti-money laundering and data protection laws
AI used in predictive policing without testing for bias risks reinforcing discrimination. TRUE
IoT wearables that monitor employee productivity without consent raise: Workplace surveillance and autonomy issues
A company uses predictive AI in policing that unfairly targets minorities. Which principle is violated? Non-discrimination
IoT security cameras are hacked, exposing household activities. This raises concerns about: Confidentiality and cybersecurity
An AI-driven chatbot stores all conversations without notifying users. Which law or principle applies? Informed consent under data protection laws
Blockchain’s inability to delete or update data conflicts with which GDPR principle? Right to rectification and erasure
IoT surveillance in workplaces without informing employees violates: Consent and autonomy
Which legal risks are raised by blockchain in financial services? Anti-money laundering concerns , Data protection compliance , Jurisdictional conflicts
AI-powered pricing algorithms may violate fairness if they discriminate against vulnerable groups. TRUE
Which technology creates tension with GDPR’s right to rectification due to immutability? Blockchain
A company using AI for recruitment fails to disclose its use to applicants. Which principle is violated? Transparency and fairness
Cloud providers may face which compliance issue when storing multinational client data? Cross-border transfer restrictions
An AI system provides medical diagnoses but is not validated by experts. Which principle is violated? Accuracy and reliability
China’s Cybersecurity Law requires companies operating in China to: Store data locally within China’s borders
A company in the U.S. offering services to EU customers must comply with GDPR even if it has no EU office. TRUE
Which APP requires organizations to have open and transparent data handling practices? APP 1
Which mechanism allows multinational companies to transfer data within their own group under GDPR? Binding Corporate Rules (BCRs)
The CCPA gives consumers the right to know what categories of personal data are collected about them. TRUE
A Singaporean firm collects and uses personal data without informing individuals. Which PDPA rule is violated? Notification obligation
Which are GDPR principles? Accuracy, Data minimization, Storage limitation
Which GDPR principle requires data to be kept accurate and up-to-date? Accuracy
A multinational transfers data from the EU to a non-adequate country using Standard Contractual Clauses (SCCs). Which GDPR mechanism is applied? Cross-border safeguard mechanism
GDPR requires explicit consent for processing sensitive categories of personal data. TRUE
An Australian firm denies consumers the ability to correct inaccurate records. Which APP is violated? APP 13
Which UN Resolution first recognized the digital privacy right globally? 68/167
Which GDPR mechanism allows international data transfers to countries deemed to provide adequate protection? Adequacy decisions
Which APPs involve transparency and notification? APP 1 & APP 5
Which principle under GDPR requires organizations to actively protect against unauthorized access? Integrity and confidentiality
Which APPI principle ensures correction of inaccurate data? Right to correction
Which measures are emphasized by China’s Cybersecurity Law? Data localization, Security reviews for network products, Protection of critical information infrastructure
Which GDPR right ensures a person can request correction of incorrect personal data? Right to rectification
The GDPR principle of storage limitation requires data to be deleted when no longer needed. TRUE
The GDPR requires organizations to demonstrate compliance with accountability measures. TRUE
A company fails to implement security measures and suffers a breach. Which GDPR principle is violated? Integrity and confidentiality
Which compliance challenges are common in global data protection? Cross-border transfer restrictions, Varying consent requirements , Overlapping jurisdictional obligations
Which GDPR data subject rights allow control over personal information? Right to access, Right to erasure, Right to portability
An EU organization that keeps personal data indefinitely breaches: Storage limitation
An EU controller processes more personal data than needed. Which GDPR principle is violated? Data minimization
Which APPs ensure security and correction of personal information? APP 11 & APP 13
A hospital in Singapore fails to notify patients about how their data is used. Which PDPA obligation is violated? Notification obligation
Which laws require consent before collection and disclosure of personal data? GDPR , PDPA, APPI
Which U.S. law gives consumers rights similar to GDPR but limited to California? CCPA
Under APPs, organizations must notify individuals when collecting their data. Which APP is this? APP 5
A Manila-based syndicate recruits minors through chat apps for cybersex operations. Which international challenge complicates prosecution? Jurisdictional and cross-border legal cooperation
A ransomware group attacks Philippine power grids. Which national security issue is threatened? Critical infrastructure security
A Philippine online prostitution ring is hosted on offshore servers. Which issue complicates law enforcement? Jurisdiction and cross-border evidence sharing
A dark web market sells Philippine voters’ personal data. Which two frameworks apply? RA 10173 (Data Privacy Act) and RA 10175 (Cybercrime Prevention Act)
Lack of trained personnel is a barrier to effective cybercrime enforcement in the Philippines. TRUE
Which outcomes result from repeated cybersecurity non-compliance? Financial penalties, Loss of licenses, Reputational damage
A denial-of-service attack against Philippine ISPs undermines system availability. TRUE
Which principles should fintech companies uphold to maintain trust? Confidentiality, Integrity, Accountability
A Philippine e-wallet service hacked for customer balances demonstrates a loss of data confidentiality. FALSE
Which institution plays a critical role in fintech cybersecurity compliance in the Philippines? BSP
A Philippine fintech app mishandles biometric authentication data. This violates: Data Privacy Act principles on sensitive personal information
A fintech app is compromised, exposing credit card data. Which industry requirement is most applicable? PCI DSS
Which strategies strengthen Philippine cybercrime response? International cooperation, Improved digital literacy, Enhanced cyber forensics
An online prostitution ring uses cryptocurrencies for payment. What makes enforcement difficult? Anonymity of crypto transactions
Hackers manipulating fintech transaction records compromise data integrity. TRUE
A Philippine fintech company stores personal data without encryption. Which law is most relevant? RA 10173 (Data Privacy Act)
RA 9995 protects citizens from sextortion and non-consensual photo distribution. TRUE
A cybercrime syndicate offers “digital drugs” that exploit audio-visual stimulation. Which concern arises? Cultural and health implications of online exploitation
A darknet vendor sells stolen Philippine ID information. Which law is violated? RA 10173 and RA 10175
A government agency discovers spyware installed on its servers by unknown actors. Which category of cybercrime does this fall under? Cyber espionage
The Bangko Sentral ng Pilipinas requires e-wallets to adopt risk management policies. This ensures: Financial stability and customer protection
Hackers manipulate fintech transaction records. Which part of the CIA triad is compromised? Integrity
A suspect is caught operating an online prostitution ring. Which is the strongest legal basis for prosecution? RA 9775 and RA 10175 combined
Which safeguards are expected in Philippine e-wallet systems? Encryption of personal data, Two-factor authentication, Fraud monitoring systems
Cybercrime in the Philippines is unique due to strong enforcement and judicial efficiency. FALSE
A dark web operation in Manila uses cryptocurrency to launder drug proceeds. Which area of regulation is most relevant? Fintech and anti-money laundering (AML)
Hackers disrupt Philippine e-commerce with denial-of-service attacks. Which dimension of cybersecurity is most affected? Availability
Which principles were violated in the COMELEC breach? Confidentiality, Integrity, Accountability
The Philippine government launches the National Cybersecurity Plan 2022 to address: Resilience against cybercrime and critical infrastructure protection
Which cybercrime most directly enables online prostitution? Cybersex
Created by: user-1835460
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards