You are on page 1of 6

RIZWOODS COLLEGES programs, computer data and/or traffic data so

#14 Cabreros St. Basak San Nicholas vital to this country that the incapacity or
------------------------------------------------------------------------------ destruction of or interference with such system
-------- and assets would have a debilitating impact on
COLLEGE OF CRIMINAL JUSTICE  security, national or economic security, national
MIDTERM EXAMINATION public health and safety, or any combination of
those matters
INTRODUCTION TO CYBERCRIME
a. Critical Infrastructure
1. refers to the instruction, communication with, b. Cyber Security
storing data in, retrieving data from, or otherwise c. Data Base
making use of any resources of a computer d. Interception
system or communication network. 10. . refers to the collection of tools, policies, risk
a. Computer management approaches, actions, training, best
b. Communication practices, assurance and technologies that can
c. Alteration be used to protect the cyber environment and
d. Access organization and user’s assets.
2. refers to the modification or change, in form or a. Critical Infrastructure
substance, of an existing computer data or b. Cyber Security
program. c. Data Base
a. Computer d. Interception
b. Communication 11. refers to a representation of information,
c. Alteration knowledge, facts, concepts, or instructions which
d. Access are being prepared, processed or stored or have
3. refers to the transmission of information through been prepared, processed or stored in a
ICT media, including voice, video and other forms formalized manner and which are intended for
of data. use in a computer system.
a. Computer a. Critical Infrastructure
b. Communication b. Cyber Security
c. Alteration c. Data Base
d. Access d. Interception
4. refers to an electronic, magnetic, optical, 12. refers to listening to, recording, monitoring or
electrochemical, or other data processing or surveillance of the content of communications,
communications device, or grouping of such including procuring of the content of data, either
devices, capable of performing logical, arithmetic, directly, through access and use of a computer
routing, or storage functions and which includes system or indirectly, through the use of electronic
any storage facility or equipment or eavesdropping or tapping devices, at the same
communications facility or equipment directly time that the communication is occurring
related to or operating in conjunction with such a. Critical Infrastructure
device. b. Cyber Security
A. Computer c. Data Base
B. Communication d. Interception
C. Alteration 13. Refers to a criminal activity involving the use of a
D. Access computer.
5. refers to any representation of facts, information, a. COMPUTER CRIME
or concepts in a form suitable for processing in a b. NET CRIME
computer system including a program suitable to c. CRIME
cause a computer system to perform a function d. NOTA
and includes electronic documents and/or 14. Refers to criminal use of the internet.
electronic data messages whether stored in local a. CYBERCRIME
computer systems or online. b. NET CRIME
a. cyber c. COMPUTER CRIME
b. Computer System d. NOTA
c. Computer Program 15. A crime under the Revised Penal Code is referred
d. Computer Data to as
6. refers to a set of instructions executed by the a. CYBERCRIME
computer to achieve intended results. b. NET CRIME
a. cyber c. COMPUTER CRIME
b. Computer System d. Felony
c. Computer Program 16. CLASSIFICATION OF COMPUTER CRIMES
d. Computer Data a. Financial Fraud Crimes and Cybercrime
7. refers to any device or group of interconnected or b. Cybercrime and Computer Fraud
related devices, one or more of which, pursuant c. Financial Fraud Crimes and Computer Fraud
to a program, performs automated processing of 17. defined as an intentional act of deception
data. involving financialtransactions for purposes of
a. cyber personal gain.
b. Computer System a. Cybercrime
c. Computer Program b. Financial Fraud Crime
d. Computer Data c. Computer Crime
8. refers to a computer or a computer network, the d. Nota
electronic medium in which online communication 18. Is any dishonest misrepresentation of fact
takes place. intended to let another to door refrain from doin.g
a. cyber something which causes loss.
b. Computer System a. Computer Fraud Crime
c. Computer Program b. Financial Fraud Crime
d. Computer Data c. Cybercrime
9. refers to the computer systems, and/or networks, d. Nota
whether physical or virtual, and/or the computer
19. An electronic medium that is used to facilitate b. Phishing
online communication. c. Webjacking
a. Computer Fraud Crime d. Cyberstalking
b. Financial Fraud Crime 31. It is one of the oldest cybercrime
c. Cybercrime a. Identity Theft
d. Nota b. Phishing
20. Computer as a target and Computer as a tool is c. Webjacking
categories of d. Cyberstalking
a. Netcrime 32. Does Stealing Kenneth fillado wallets and purses
b. Cybercrime containing identification cards and bank
c. Computer Crime Information is necessary to commit Identity Theft
d. NOTA a. Yes
21. When the individual is the main target of b. No
cybercrime, the computer can be c. Maybe
considered as d. Sometimes
a. Tool 33. Rummaging through your trash for discarded
b. Target personal data in a practice
c. Instrument known as
d. NOTA a. Dumpster diving
22. An electronic medium that is used to facilitate b. Diving
online communication. c. Trash Diving
a. Facebook d. Dumpster driving
b. Twitter 34. What is the weakest link in cybersecurity?
c. Instragram A. Weak encryption.
d. Cyberspace B. B. Humans.
23. it refers to the virtual computer world C. C. Short passwords.
a. Facebook D. D. NOTA
b. Twitter 35. Which one of these things will a comprehensive
c. Instragram cyber insurance NOT protect you from?
d. Cyberspace A. Poor cybersecurity hygiene and
24. Antivirus and Antispyware programs, Firewall that implementation.
block unauthorized access to a network and B. A ransomware attack on your company’s
VPNs is a example of computer network.
a. Cybercrime C. An employee skimming/stealing customers’
b. Cyberspace credit cards.
c. Cybersecurity 36. Refers to the freedom from unauthorized intrusion
d. Net Crime a. Anti-Trespassing
25. It actually prevents the cyber attacks.
a. Cybercrime b. Solitary
b. Cyberspace c. Privacy
c. Cybersecurity d. None of the above
d. Net Crime
37. A statement that injures a third party’s reputation
26. Ogz Pango use fake email account to get
information from internet user. What type of a. Harassment
Cybercrime does Ogz pango commit? b. Defamation
a. Phising
b. Identity Theft
c. Editorial
c. Online Harassment d. NOTA
d. Web jacking 38. The Cybercrime Prevention Act officially recorded
27. Using fake email messages to get personal as ____________________________ is a law in
information from internet users. the Philippines that aims to address legal issues
a. Phishing concerning online interaction.
b. Cyberstalking a. RA 10175
c. Cybersex
d. Identity Theft b. RA 10715
28. It aims to steal user data including the log in c. RA 10517
credentials, credit card number and
d. RA 10101
sensitive personal information of the user.
39. Refers to the disparities in access to telephone,
a. Phishing
personal computers, and the internet across
b. Cyberstalking
certain
c. Cybersex
d. Identity Theft a. Media Differences
29. The following is the correct way to detect b. Digital divide
phishing except
a. Watch for overly generic content and
c. Electronic discord
greetings. d. None of the above
b. Examine the entire email address 40. It refers to the model for delivering content online
c. Look for urgency or demanding actions to any person who wants to take a course, with
d. Check for secure websites. – any webpage a. Educational Model
where you enter personal information should a
30. Uhm Fillado uses your personal information such b. Massive Open Online Course
as your name, address, credit or bank account c. Model of Online Learning
and any sensitive information to assume your
d. Electronic Learning Model
identity in order to commit fraud or other criminal
acts. What type of Cybercrime does Uhm Fillado 41. A phishing email is one which
commit. a. requests a payment for goods you
a. Identity Theft have not received
b. encourages you to click on a link to a c. Computer-related Identity Theft.
fraudulent website d. Computer-related Forgery
c. offers you products in which you 50. The unlawful or prohibited acts defined and
may have no interest punishable by Republic Act No. 9775 or the Anti-
d. contains abusive and threatening Child Pornography Act of 2009, committed
language through a computer system: Provided, That the
42. The access to the whole or any part of a penalty to be imposed shall be (1) one degree
computer system without right higher than that provided for in Republic Act No.
a. Illegal access 9775.1âwphi1
b. Illegal Interception a. Cybersex
c. Data Interference b. Child Pornography
d. System Interference c. Computer-related Identity Theft.
43. The interception made by technical means d. Computer-related Forgery
without right of any non-public transmission of 51. occurs when a website, e-mail server, or
computer data to, from, or within a computer computer system is subjected to or threatened
system including electromagnetic emissions from with repeated denial of service or other attacks by
a computer system carrying such computer data. malicious hackers. These hackers demand
a. Illegal access money in return for promising to stop the attacks
b. Illegal Interception and to offer "protection".
c. Data Interference A. Cybersquatting
d. System Interference B. Cybercrime
44. The intentional or reckless alteration, damaging, C. CyberExtortion
deletion or deterioration of computer data, D. Cyberterrorism
electronic document, or electronic data message, 52. can be defined as an act of terrorism committed
without right, including the introduction or through the use of cyberspace or computer
transmission of viruses resources
a. Cybersquatting
a. Illegal access
b. Cybercrime
b. Illegal Interception c. CyberExtortion
c. Data Interference d. Cyberterrorism
d. System Interference 53. is the transportation of victims and then the live
45. The intentional alteration or reckless hindering or streaming of coerced sexual acts and or rape on
interference with the functioning of a computer or webcam.
computer network by inputting, transmitting, a. Cybersquatting
damaging, deleting, deteriorating, altering or b. Cybercrime
suppressing computer data or program, electronic c. CyberExtortion
document, or electronic data message, without d. Cyberterrorism
right or authority, including the introduction or 54. s the World Wide Web content that exists
transmission of viruses. on darknets: overlay networks that use
A. Illegal access the Internet but require specific software,
B. Illegal Interception configurations, or authorization to access
a. web
C. Data Interference
b. Dark web
D. System Interference c. Deep web
46. The acquisition of a domain name over the d. Browser
internet in bad faith to profit, mislead, destroy 55. are parts of the World Wide Web whose contents
reputation, and deprive others from registering are not indexed by standard web search-engines.
the same, This is in contrast to the "surface web", which is
a. Cybersex accessible to anyone using the Internet
b. Child Pornography a. web
c. Computer-related Identity Theft. b. Dark web
d. Computer-related Forgery c. Deep web
47. The unauthorized input, alteration, or deletion of d. Browser
computer data or program or interference in the 56. when criminals send fraudulent emails pretending to
functioning of a computer system, causing be from legitimate businesses, in an attempt to
damage thereby with fraudulent intent: collect sensitive, personal information. Often, any
a. Cybersex links in the email will redirect to a website owned by
b. Child Pornography the scammer, so always be careful about what
c. Computer-related Identity Theft. information you give out on the Internet.
d. Computer-related Forgery A. Phishing
48. The intentional acquisition, use, misuse, transfer,
possession, alteration or deletion of identifying B. Harassment
information belonging to another, whether natural
or juridical, without right: C. Ransomware
a. Cybersex D. Prostitution
b. Child Pornography 57. Cyberstalkers use electronic communication, such
c. Computer-related Identity Theft. as email, social media, or websites to stalk and
d. Computer-related Forgery harass people. Forms of online harassment include
49. The willful engagement, maintenance, control, or slander, libel, false accusations, threats, or any other
operation, directly or indirectly, of any lascivious behavior that demeans or embarrasses someone.
exhibition of sexual organs or sexual activity, with Sentences for cyberstalking can include jail time and
the aid of a computer system, for favor or hefty fines.
consideration. A. Phishing
a. Cybersex B. Harassment
b. Child Pornography C. Ransomware
D. Prostitution 68. can be defined as an act of terrorism committed
58. Cyber criminals can install malicious software on through the use of cyberspace or computer
your system that will essentially hold your important resources
information hostage until you meet their demands a. Cybersquatting
A. Phishing b. Cybercrime
B. Harassment c. CyberExtortion
C. Ransomware d. Cyberterrorism
D. Prostitution 69. is the transportation of victims and then the live
59. Many escorts will advertise their services in online streaming of coerced sexual acts and or rape on
classifieds, social media forums, or their own webcam.
personal websites, making it easy and discreet for a. Cybersquatting
people to find them b. Cybercrime
A. Phishing c. CyberExtortion
B. Harassment d. Cyberterrorism
C. Ransomware 70. It is the World Wide Web content that exists
D. Prostitution on darknets: overlay networks that use
60. Using fake email messages to get personal the Internet but require specific software,
information from internet users. configurations, or authorization to access
A. Phishing A. Web
B. Cyberstalking B. Dark web
C. Cybersex C. Deep web
D. Identity Theft D. Browser
61. It aims to steal user data including the log in 71. are parts of the World Wide Web whose contents
credentials, credit card number and are not indexed by standard web search-engines.
sensitive personal information of the user. This is in contrast to the "surface web", which is
A. PhishinG accessible to anyone using the Internet
B. Cyberstalking a. web
C. Cybersex b. Dark web
D. identity Theft c. Deep web
62. The following is the correct way to detect phishing d. Browser
except 72. What kind of virus “I LOVE YOU VIRUS”
a. Watch for overly generic content and a. Malware Virus
greetings. b. Trojan Virus
b. Examine the entire email address c. Computer Worm
c. Look for urgency or demanding actions d. NOTA
d. Check for secure websites. – any webpage 73. means any card, plate, code, account number,
where you enter personal information should a electronic serial number, personal identification
63. The Cybercrime Prevention Act officially recorded number, or other telecommunications service,
as ____________________________ is a law in equipment, or instrumental identifier, or other
the Philippines that aims to address legal issues means of account access that can be used to
concerning online interaction. obtain money, good, services, or any other thing
A. RA 10175 of value or to initiate a transfer of funds (other
B. RA 10715 than a transfer originated solely by paper
C. RA 10517 instrument);
D. RA 10101 a. Access Device
64. Refers to the disparities in access to telephone, b. Card
personal computers, and the internet across c. ATM
certain d. Payment Card
a. Media Differences 74. cards that can be used by cardholders and
b. Digital divide accepted by terminals to withdraw a cash and/or
c. Electronic discord make payment for purchase of goods or services,
d. None of the above fund transfer, and other financial transactions.
65. It refers to the model for delivering content online Typically, payment cards are electronically linked
to any person who wants to take a course, with deposits, prepaid, or loan credit accounts;
a. Educational Model a. Access Device
b. Massive Open Online Course b. Card
c. Model of Online Learning c. ATM
d. Electronic Learning Model d. Payment Card
66. A phishing email is one which 75. means any access device that is counterfeit,
a. requests a payment for goods fictitious, altered, or forged, or an identifiable
you have not received component of an access device or counterfeit
b. encourages you to click on a access device or any fraudulent copy or
link to a fraudulent website reproduction of a valid access device;
c. offers you products in which you a. Counterfeit Access Device
may have no interest b. Card
d. contains abusive and c. ATM
threatening language d. Payment Card
67. occurs when a website, e-mail server, or 76. refers to the unauthorized access into or
computer system is subjected to or threatened interference in a computer system/server or
with repeated denial of service or other attacks by information and communications system; or any
malicious hackers. These hackers demand access in order to corrupt, alter, steal, or destroy
money in return for promising to stop the attacks using a computer 
and to offer "protection". a. Counterfeit Access Device
A. Cybersquatting b. Card
B. Cybercrime c. Hacking
C. CyberExtortion d. Payment Card
D. Cyberterrorism
77. refers to a type of fraud which involves illegal receiving, recording, transmitting, storing,
copying of information from the magnetic stripe of processing, retrieving, or producing information,
payment card to gain access to customer data, figures, symbols or other modes of written
accounts; expression according to mathematical and logical
a. Counterfeit Access Device rules or of performing any one or more of these
b. Card Skimming functions.
c. Hacking A. Computer
d. Payment Card B. Computer Data
78. refers to a computer program designed to C. Computer Breech
perform a group of coordinated functions, tasks, D. Data
or activities for the benefit of the user 88. refers to a secret code which secures and
a. Counterfeit Access Device defends sensitive information that cross over
b. Card Skimming public channels into a form decipherable only with
c. Hacking a matching electronic key.
d. Application A. Electronic Key
79. refers to the use of the internet by bank B. Electronic Data Message
customers in order to manage thqir bank C. Electronic Documents
accounts and perform account transactions D. Electronic Signature
a. Banking 89. refers to a person who in behalf of another
b. Online Banking person and with respect to a particular electronic
c. Data breech document sends, receives and/or stores provides
d. Access other services in respect of that electronic data
80. ICT Stands for message or electronic document.
a. Information and Communication Technology A. Electronic Key
b. Industrial and Communication Technology B. Electronic Data Message
c. Intelligencen and Communication C. Intermediary
Technology D. Electronic Signature
d. Internal and Communication Technology 90. Refers to a person by whom, or on whose behalf,
81. Cybercrime Prevention Act of 2012 signed by the electronic document purports to have been
a. Pres. Benigno Aquino created, generated and/or sent. The term does
b. Pres. Corazon Aquino not include a person acting as an intermediary
c. Pres. Erap Estrada with respect to that electronic document.
d. Pres. Emilio Aguinaldo A. Origin
82.  also known as the "Electronic Commerce Act." B. Originator
a. RA 8792 C. Data
D. Copyright
b. RA 8777 91. It aims to steal user data including the log in
c. RA 8992 credentials, credit card number and
sensitive personal information of the user.
d. RA 8282 a. Phishing
83. refers to information generated, sent, received or b. Cyberstalking
stored by electronic, optical or similar means. c. Cybersex
a. Electric d. Identity Theft
92. The following is the correct way to detect phishing
b. Electronic Data Message
except
c. Electronic a. Watch for overly generic content and
greetings.
d. Electronic Signature
b. Examine the entire email address
84. Refers to any distinctive mark, characteristic c. Look for urgency or demanding actions
and/or sound in electronic form, d. Check for secure websites. – any webpage
a. Electric where you enter personal information should a
b. Electronic Data Message 93. Uhm Fillado uses your personal information such
as your name, address, credit or bank account
c. Electronic and any sensitive information to assume your
d. Electronic Signature identity in order to commit fraud or other criminal
acts. What type of Cybercrime does Uhm Fillado
85. refers to information or the representation of
commit.
information, data, figures, symbols or other
A. Identity Theft
modes of written expression,
B. Phishing
a. Electric C. Webjacking
b. Electronic Data Message D. Cyberstalking
94. It is one of the oldest cybercrime
c. Electronic Documents a. Identity Theft
d. Electronic Signature b. Phishing
86. Refers to a person who is intended by the c. Webjacking
originator to receive the electronic data message d. Cyberstalking
or electronic document. The term does not 95. Does Stealing Kenneth fillado wallets and purses
include a person acting as an intermediary with containing identification cards and bank
respect to that electronic data message or Information is necessary to commit Identity Theft
electronic data document a. Yes
A. Addressee b. No
B. Address c. Maybe
C. Data d. Sometimes
D. Email 96. Rummaging through your trash for discarded
87. refers to any device or apparatus which, by personal data in a practice
electronic, electro-mechanical, or magnetic known as
impulse, or by other means, is capable of a. Dumpster diving
b. Diving
c. Trash Diving
d. Dumpster driving
97. What is the weakest link in cybersecurity?
a. Weak encryption.
b. Humans.
c. Short passwords.
d. NOTA
98. Which one of these things will a comprehensive
cyber insurance NOT protect you from?
A. Poor cybersecurity hygiene and
implementation.
B. A ransomware attack on your company’s
computer network.
C. An employee skimming/stealing customers’
credit cards.
99. Refers to the freedom from unauthorized intrusion
a. Anti-Trespassing
b. Solitary
c. Privacy
d. None of the above
100. A statement that injures a third party’s reputation
a. Harassment
b. Defamation
c. Editorial
d. NOTA

PREPARED BY:

ARVIN I. SABERON

APPROVED BY:

MR. MARLON ABELLANA


Dean of College Criminal Justice

You might also like