You are on page 1of 4

METRO MANILA COLLEGE

U-Site,Brgy.Kaligayahan, Quezon City


CRIMINOLOGY DEPARTMENT

NAME: _________________________________________________________________________________
Last Name First Name M.I.

CDI 4 (Semi-Final Examination)


Test I: Read the question carefully and encircle the correct answer

1. Unauthorized access into or interference in a computer system in order to corrupt, alter, steal, or destroy using
a computer or other similar information and communication devices.
A. Hacking B. Cracking
C. Data Diddling D. Salami Attack
2. A criminal activity in which computers or networks are a target, tool or incidental to the commission of a crime.
A. Ling Zue B. Trojan Attack
C. Cyber Crime D. Internet theft
3. A higher form of hacking in which the unauthorized access culminates with the process of defeating the security
system for the purpose of acquiring money or information and/or availing of free services.
A. Denial or service attack B. Email Bombing
C. Cracking D. Web Jacking
4. kind of activity refers to sending large number of mail to the victim resulting into crushing of the entire system.
A. Web Jacking B. Email Bombing
C. Data Diddling D. Salami Attack
5. Involves altering a raw data just before a computer process it and then changing it back after the processing is
completed.
A. Denial or service attack B. Email Bombing
C. Virus or Worm Attack D. Data Diddling
6. Computer of the victim is flooded with ore requests than it can handle which cause it to crash.
A. Denial or Service Attack B. International cooperation strategy
C. Supply reduction strategy D. None of the above
7. In these kinds of offenses the hacker gains access and control over the web site of another. He may even
mutilate or change the information on this site.
A. Denial or service attack B. Email Bombing
C. Web Jacking D. None of the above
8. Virus is programs that attach themselves to a computer or a file and then circulate themselves to other files and
to other computer s on a network.
A. Salami Attack B. Virus or Worm Attacks
C. Cyber Crime D. Internet theft
9. In software field this means an unauthorized programme, which passively gains control over another’s system
by representing itself as an authorized programme.
A. Trojan Attacks B. Web Jacking
C. Data Diddling D. Salami Attack
10. An electronic machine, operating under the control of instructions stored in its own memory, which can accept
data (input) manipulate data (output) and store results for future use.
A. Computer B. Device
C. Unit D. Hard Drive
11. Act shall be known as the "Electronic Commerce Act of 2000".
A. RA 9223 B. RA 1405
C. RA 8792 D. RA 8293
12. Refers to a person who is intended by the originator to receive the electronic data message or electronic
document.
A. Sender B. Despatcher
C. Originator D. Addressee
13. Information generated, sent, received or stored by electronic, optical or similar means.
A. Data Message B. Optical Media
C. Electronic Signature D. Electronic Data Message
14. refers to any distinctive mark, characteristic and/or sound in electronic form, representing the identity of a
person and attached to or logically associated with the electronic data message or electronic document or any
methodology or procedures employed or adopted by a person and executed or adopted by such person with
the intention of authenticating or approving an electronic data message or electronic document.
A. Electronic Document B. Electronic Data Message
C. Electronic Signature D. Data Message
15. refers to information or the representation of information, data, figures, symbols or other modes of written
expression, described or however represented, by which a right is established or an obligation extinguished, or
by which a fact may be proved and affirmed, which is received, recorded, transmitted, stored, processed,
retrieved or produced electronically.
A. Electronic Document B. Data Message
C. Electronic Signature D. Electronic Data Message

Test II Identification

16. ____________________________________ refers to a secret code which secures and defend sensitive
information that crosses over public channels into a form decipherable only with a matching electronic key.
17. ____________________________________ refers to a person by whom, or on whose behalf, the electronic
document purports to have been created, generated and/or sent . The term does not include a person acting
as an intermediary with respect to that electronic document.
18. ____________________________________ refers to the transmission of information through ICT media,
including voice, video and other forms of data.
19. ____________________________________ refers to the modification or change, in form or substance, of an
existing computer data or program.
20. ____________________________________ to a computer or a computer network, the electronic medium in
which online communication takes place.
21. ____________________________________ refers to the collection of tools, policies, risk management
approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber
environment and organization and user’s assets.
22. ____________________________________ The access to the whole or any part of a computer system
without right.
23. ____________________________________ The intentional or reckless alteration, damaging, deletion or
deterioration of computer data, electronic document, or electronic data message, without right, including the
introduction or transmission of viruses.
24. ____________________________________ The intentional alteration or reckless hindering or interference
with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting,
deteriorating, altering or suppressing computer data or program, electronic document, or electronic data
message, without right or authority, including the introduction or transmission of viruses.
25. ____________________________________ The acquisition of a domain name over the internet in bad faith
to profit, mislead, destroy reputation, and deprive others from registering the same
26____________________________________ The willful engagement, maintenance, control, or operation,
directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer
system, for favor or consideration.
27. ____________________________________ The unlawful or prohibited acts of libel as defined in Article 355 of
the Revised Penal Code, as amended, committed through a computer system or any other similar means
which may be devised in the future.
28. ____________________________________ Act known as the "Intellectual Property Code of the
Philippines."
29. ____________________________________ An exclusive right to the benefits of an invention or improvement
granted by the for a specific period of time, on the basis that it is novel (not previously known or described in
a publication), "non-obvious" (a form which anyone in the field of expertise could identify), and useful.
30. ____________________________________ A bundle of intangible rights granted by statute to the author or
originator of certain literary or artistic productions, whereby, for a limited period, the exclusive privilege is
given to that person (or to any party to whom he or she transfers ownership) to make copies of the same for
publication and sale.

Test III Enumeration

Four categories of intellectual property

1.
2.
3.
4.

Composition of CICC
1.
2.
3.
4.

Mode and Manner of Committing Cyber Crime


1)
2)
3)
4)
5)
6)
7)
8)
9)
10)
Answer Key: CDI 4 Semi-Final Examination
Mode and Manner of Committing Cyber Crime
1. A 1) HACKING
2. C 2) CRACKING
3. C 3) Email Bombing
4. B 4) Data Diddling
5. D 5) Salami Attack
6. A 6) Denial or Service Attack
7. C 7) Virus or Worm Attacks
8. B 8) Logic Bomb
9. A 9) Trojan Attacks
10. A 10) Internet Time Theft
11. C 11) Web Jacking
12. D
13. D
14. C
15. A

Test II Identification
Cybercrime Offenses of RA 10175
16. “Electronic Key”
1) Illegal access
17. “Originator”
2) Illegal interception
18. Communication
3) Data interference
19. Alteration
4) System interference
20 . Cyber
5) Misuse of devices
21. Cyber security
22. Illegal Access
6) Cyber-squatting
23. Data Interference
24. System Interference
25. Cyber-squatting
26.cybersex
27. Libel
28.R.A. 8293
29. Patents
30. Copyright

Test III Enumeration


Four categories of intellectual property
1. Patent
2. Trademark
3. Trade secret
4. Copyright

Composition of CICC
1. Executive director of DOST
2. Director of NBI
3. DOJ Head
4. private sector and academe

You might also like