You are on page 1of 3

1. When was the birth of cybersecurity?

2. Who was considered as the father of phreaking?


3. Who disrupts fleming;s first public demonstration of marconi’s “secure” wireless telegraphy
technology by sending insulting morse code messages?
4. Who was the first filipino to be convicted of cybercrime, particularly in hacking?
5. The famous virus that was created by Onel de Guzman on May 4, 2000, that spread across Hong
kong, to Europe, to the United states, infecting and damaging computers and networks of small
big companies, private and government institutions?
6. His conviction was considered a landmark case, as he is the fist local hacker to be convicted
under section 33a of the E-Commerce Law or Republic Act 8792?
7. What particular worm that has been called the world’s first digital weapon?
8. Who is remembered as one of the most notorious hackers in internet hackers in internet history
that was able to penetrate some of the most highly-guarded networks in the world, including
those of Motorola and Nokia?
9. These are names used for and by individuals who participate in phreaking. The term first
referred to groups who had reverse engineered the system of tones used to route long-distance
calls?
10. Kevin Poulsen was multi-talented and also indulge in lock picking, forgery and hacking under the
pseudonym?
11. It is also called computer crime, the use of a computer as an instrument to further illegal ends,
such as committing fraud, trafficking in child pornography and intellectual property, stealing
identities, or violating privacy?
12. Cyber is derived from the word ____, which means science of communication and control over
machine and man?
13. These are individuals or team of people that may use a device to access a user’s personal
information, confidential business information, government information, or disable a device to
commit malicious activities on digital systems or networks with the intention of stealing
sensitive company information or personal data, and generating proof?
14. The following are some of the reasons for the vulnerability of computers to cyber criminality
except one?
15. Computer is not an essentially and element of cyber criminality and it is either a tool or target of
cyber crimes. The statement is?
16. What category of crime that is similar to a real-life instance of a criminally illegally possessing an
individual’s bank or credit card details?
17. This refers to the use of internet to conduct violent acts that result in, or threaten, the loss of
life or significant bodily harm, in order to achieve political or ideological gains through threat or
intimidation?
18. These are hackers who commit illegal acts, and their main purpose is to harm information
systems, steal information?
19. What do you call those who target data which valuable on its face (e.g., trade secrets and
proprietary data) or directed at data (eg., credit card data) which may be used to further other
criminal activity?
20. This is the least common category of cybercrime, but is the most serious offense?
21. In the instance of an internal employee, there may be no initial motivation by the employee to
commit any form of crime against their employer. However, while undertaking their duties they
may identify a vulnerability in the internal systems where money or data could be removed
without anyone else being able to identify their actions. What particular motivation of
cybercriminals is being described?
22. Some cyber criminals may commit technical attacks against others as a training exercise to
develop their skills for a more financially lucrative attack. What particular motivation of
cybercriminal is being described?
23. This category of cybercrime involves cyberstalking, distributing pornography, and trafficking?
24. A type of hackers that have the knowledge and skills that would enable them to function in the
same way as black-hats, but they decided to be on the right side of the law?
25. A group of hackers that falls between black- and white-hat hackers who have shifting or
changing ethics depending on the specific situation?
26. What is the definition of cybercrime according to the Department of justice to attune the
definition of cybercrime to the legal framework of the Philippines, Republic act no. 10175 or the
cybercrime prevention act of 2012?
27. The following ae the categories of cybercrime except one?
28. It refers are networks from compromised computers that are controlled externally by remote
hackers?
29. This type of attack involves hackers sending malicious email attachments or URLS to users to
gain access their accounts or computer?
30. The attack is rarely personal and the attack on the target company is nothing more than a
business venture to make money. What motivation of cybercriminal is being described?
31. This type of cybercrime are used to make an online service unavailable and take the network
down by overwhelming the site with traffic from a variety of sources?
32. This cybercrime involves criminals sharing and distributing inappropriate content that can be
considered highly distressing and offensive?
33. This type of content exists both on the everyday internet and on the dark web, an anonymous
network?
34. These are less threatening than other cybercrimes, but are type of malware. They uninstall
necessary software in your system including search engines and pre-downloaded apps?
35. The following are the type of hackers except one?
36. A motivation of cybercriminal wherein the state actor is a government agency or aligned group
who conducts cyber activities on behalf of that government. The motivation may be to seek the
Ip of the specific industries in foreign countries to gain a competitive advantage?
37. Revenge is the motivation of cybercriminal when an attacker may commit a criminal offense
against company after a perceived injustice against themselves. The statement is?
38. When the opportunity exists for persons in remote locations to target the critical infrastructure
of an entity they wish to cause extreme harm to. The motivation is terrorism?
39. A person in a remote location may see their goals advanced by causing a massive security failure
in another nation’s critical infrastructure-such as power, nuclear energy, or water delivery-that
leads to large-scale loss of live. What particular motivation is being described?
40. One of the characteristic of cybercrime is that these are legal activities done with malicious
purposes?
41. It is common motivator for the criminal, whether internal or external to the company?
42. When one assumes the identity of another person and uses such identity to steal funds, access
confidential information, or participate in tax or health insurance fraud, what cybercrime is
committed?
43. This kind of cybercrime involves online harassment where the user is subjected a plethora of
online messages and emails?
44. A cybercrime that involves criminals making direct contact with you usually by phone or email.
They want to gain your confidence and usually pose as a customer service agent so you’ll give
the necessary information needed?
45. These are usually in the form of ads or spam emails that include promises of rewards or offers of
unrealistic amounts of money?
46. A type of cybercrime that needs a vulnerability (bug in the code of software) in order to gain
control of user’s computer?
47. The definition of cybercrime that is given by Yor and Steinmetz?
48. It is essentially an element of cyber criminality and it is either a tool or target of cybercrimes?
49. What refers to the virtual computer world, and more specifically, is an electronic medium used
to form a global computer network to facilitate online communication?
50. It is the new horizon which is controlled by machine for information and communication
between human beings across the world?

You might also like