Professional Documents
Culture Documents
INTRODUCTION TO CYBERCRIME
AND ENVIRONMENTAL LAWS AND PROTECTION
THURSDAY 2-5PM
PRELIMINARY EXAMINATIONS
-8 PAGES QUESTIONAIRE-
EXAM TIME: 3:00-4:30PM (1.5HRS.)
I. Multiple Choices. (1 point each = 75points) Encircle the letter that corresponds to the correct
answer.
1. The web page designated as being the first page seen upon entering the website.
a. Website c. World Wide Web
b. Hypertext d. Home Page
2. A web browser text that transmits the user to another website by means of clicking on
highlighted text.
a. Website c. World Wide Web
b. Hypertext d. Home Page
3. It is a part of the internet which utilizes a wide variety of features such as graphics, photographs,
sounds or video clips. The web utilizes hypertext to link information’s, to travel electronically from
one site to another.
a. Website c. World Wide Web
b. Hypertext d. Home page
4. Any location in the internet capable of storing web pages or hypertext information.
a. Website c. Web Browser
b. Hypertext d. Home page
5. A program that displays text, graphics, audio and visual information. It eliminates the labor of
intensive use of E-mail.
a. Web Browser c. World Wide Web
b. Hypertext d. Home page
6. This kind of crime is normally prevalent in the financial institutions or for the purpose of
committing financial crimes. An important feature of this type of offense is that the alteration is
so small that it would normally go unnoticed.
a. Trojan Attacks c. Salami Attack
b. Virus or Worm Attacks d. Web Jacking
7. In these kinds of offenses, the hacker gains access and control over the website of another.
a. Trojan Attacks c. Salamai Attack
b. Virus or Worm Attacks d. Web Jacking
8. This is a process of either altering or deleting the data on a computer and make functional copies
of themselves repeatedly till they eat up all the available space on a computer’s memory.
a. Trojan Attacks c. Salamai Attack
b. Virus or Worm Attacks d. Web Jacking
9. In software field this means an unauthorized program which passively gains control over
another’s system by presenting itself as an authorized program.
a. Trojan Attacks c. Salamai Attack
b. Virus or Worm Attacks d. Web Jacking
10. The Internet surfing hours of the victim are used up by another person by gaining access to the
login ID and the password.
a. Data Diddling c. Hacking
b. Denial of Service Attacks d. Internet Time Theft
11. The computer of the victim is flooded with more requests than it can handle which cause it to
crash.
a. Data Diddling c. Hacking
b. Denial of Service Attacks d. Internet Time Theft
12. It is the unauthorized access to or control over computer network security systems for some illicit
purpose.
a. Data Diddling c. Hacking
b. Denial of Service Attacks d. Internet Time Theft
13. This kind of an attack involves altering raw data just before a computer process it and then
changing it back after the processing is completed.
a. Data Diddling c. Hacking
b. E-mail Bombing d. Internet Time Theft
14. This kind of activity refers to sending large numbers of mail to the victim, which maybe an
individual or a company or even mail servers thereby ultimately resulting into crashing of the
entire system.
a. Data Diddling c. Hacking
b. E-mail Bombing d. Internet Time Theft
15. It involves following a person’s movements across the Internet by posting messages (sometimes
threatening) on the bulletin boards frequented by the victim, entering the chat-rooms frequented
by the victim, constantly bombarding the victim with emails.
a. Cyber-stalking c. Dissemination of obscene material.
b. Defamation d. Computer vandalism
16. Refers to set of instructions executed by the computer to achieve intended results.
a. Computer c. Computer System
b. Computer Program d. Computer Data
17. Refers to any representation of facts, information, or concepts in a form suitable for processing
in a computer system including a program suitable to cause a computer system to perform a
function.
a. Computer c. Computer System
b. Computer Program d. Computer Data
18. Refers to any device or group of interconnected or related devices, one or more of which,
pursuant to a programs, performs automated processing of data.
a. Computer c. Computer System
b. Computer Program d. Computer Data
20. Refers to a computer or a computer network, the electronic medium in which online
communication takes place.
a. Computer c. Computer System
b. Computer Program d. Cyber
21. Refers to the instruction, communication with, storing data in, retrieving data from, or otherwise
making use of any resources of a computer system or communication network.
a. Cybersecurity c. Communication
B. Access d. Alteration
22. Refers to the modification or change inform or substance, of an existing computer data or
program.
a. Cybersecurity c. Communication
b. Access d. Alteration
23. Refers to the collection of tools, policies, risk management approaches, actions, training, best
practices, assurance and technologies that can be used to protect the cyber environment and
organization and user’s assets.
a. Cybersecurity c. Communication
b. Access d. Alteration
24. Refers to the transmission of information through Information’s and Communications Technology
(ICT) media, including voice and other forms of data.
a. Cybersecurity c. Communication
b. Access d. Alteration
25. Any public or private entity that provides to users of its service the ability to communicate by
means of a computer system.
a. Interception c. Database
b. Critical Infrastructure d. Service provider
26. Refers to a representation of information, knowledge, facts, concepts, or instructions which are
being prepared, processed or stored or have been prepared, processed or stored in a formalized
manner and which are intended for use in a computer system.
a. Interception c. Database
b. Critical Infrastructure d. Service provider
27. Refers to the computer systems and/or networks whether, physical or virtual, and/or the
computer programs, computer data and or traffic data so vital to this country that the incapacity
or destruction of or interference with such system and assets would have a debilitating impact on
security, national or economic.
a. Interception c. Database
b. Critical Infrastructure d. Service provider
28. Refers to listening to, recording, monitoring or surveillance of the content of communications,
including procuring of the content of data, either directly, through access and use of a computer
system.
a. Interception c. Database
b. Critical Infrastructure d. Service provider
29. The intentional alteration or reckless hindering with the functioning of a computer or computer
network by inputting computer data or program, without right or authority, including the
introduction or transmission of viruses.
a. Data Inference c. Illegal Access
b. Illegal Interception d. System Interference
30. The access to the whole or any part of a computer system without right.
a. Data Inference c. Illegal Access
b. Illegal Interception d. System Interference
31. The intentional or reckless alteration, damaging, deletion or deterioration of computer data,
electronic document, or electronic data message, without right, including the introduction or
transmission of viruses.
a. Data Inference c. Illegal Access
b. Illegal Interception d. System Interference
32. The interception made by technical means without right of any non-public transmission of
computer data to, from, or within a computer system including electromagnetic emissions from a
computer system carrying such computer data.
a. Data Inference c. Illegal Access
b. Illegal Interception d. System Interference
33. The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying
information belonging to another, whether natural or juridical, without right.
a. Cyber-squatting c. Computer Related Forgery
b. Computer Related Fraud d. Computer Related Identity Theft
34. The input, alteration, or deletion of any computer data without right resulting in inauthentic data
with the intent that it be considered or acted upon for legal purpose.
a. Cyber-squatting c. Computer Related Forgery
b. Computer Related Fraud d. Computer Related Identity Theft
35. The unauthorized input, alteration, or deletion of computer data or program or interference in the
functioning of a computer system, causing damage thereby with fraudulent intent.
a. Cyber-squatting c. Computer Related Forgery
b. Computer Related Fraud d. Computer Related Identity Theft
36. The acquisition of a domain name over the internet in bad faith to profit, mislead, destroy
reputation, and deprive others from registering the same.
a. Cyber-squatting c. Computer Related Forgery
b. Computer Related Fraud d. Computer Related Identity Theft
37. All computer data, including content and traffic data, examined under a proper warrant shall,
within ____________after the expiration of the period fixed therein, be deposited with the court
in a sealed package.
a. 28 hours c. 48 hours
b. 38 hours d. 18 hours
38. The Director of the NBI is the __________ of the Cybercrime Investigation and Coordinating
Center.
a. Chairperson c. Vice Chairperson
b. Executive Secretary d. Chief Executive Officer
39. The Executive Director of the Information and Communications Technology Office under the
Department of Science and Technology (ICTO-DOST) is the ______________of the Cybercrime
Investigation and Coordinating Center.
a. Chairperson c. Vice Chairperson
b. Executive Secretary d. Chief Executive Officer
40. The willful engagement, maintenance, control, or operation, directly or indirectly, of any
lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for
favor or consideration.
a. Sex Slavery c. Cyber sex
b. Child Pornography d. Lascivious Conduct
41. The premeditated use of disruptive activities or the threat in cyber space with the intention to
further social, ideological, religious, political objectives or to intimidate any person in furtherance
of such objectives.
a. Cyber terrorism c. Fraud and Cheating
b. Trafficking d. Computer Vandalism
42. This is one of the lucrative businesses that are growing today in the cyber space. Some of the
cases of these that have come to light are those pertaining to credit card crimes, contractual
crimes and offering jobs.
a. Cyber terrorism c. Fraud and Cheating
b. Trafficking d. Computer Vandalism
43. This means deliberately destroying or damaging property of another through physical harm done
to the computer of any person. These acts may take the form of the theft of a computer, some
part of a computer or a peripheral attached to the computer or by physical damaging a computer
or its peripherals.
a. Cyber terrorism c. Fraud and Cheating
b. Trafficking d. Computer Vandalism
44. It is an act of imputing any person with intent to lower the person in the estimation of the right
thinking members of society generally or to cause him to be shunned or avoided or to expose
him to hatred, contempt or ridicule.
45. It is a mode/manner of committing cybercrime wherein the Internet surfing hours of the victim
are used up by another person. This is done by gaining access to the login ID and the password.
a. Defamation c. Web Jacking
b. Internet Time Theft d. Data Diddling
46. In these kinds of offenses, the hacker gains access and control over the website of another. He
may even mutilate or change the information on the site. This may be done for fulfilling political
objectives or for money.
a. Defamation c. Web Jacking
b. Internet Time Theft d. Data Diddling
47. Which is not one of the Classification of Cyber Crimes against person:
a. Harassment via e-mails C. Dissemination of obscene material
b. Cyber-stalking d. Distribution of pirated software
48. Which is one of the Classification of Cyber Crimes against Society at large in the following
choices?
a. Sale of illegal articles c. Dissemination of obscene material
b. Cyber-stalking d. Distribution of pirated software
49. Which of the following is not one of the three major types of internet securities fraud?
a. Market manipulation c. Illegal Touting
b. Fraudulent offering of securities d. None of the above
50. Which is not a Cyber Offense against the confidentiality, integrity and availability of computer
data and systems:
a. lllegal Access c. lllegal Interception
b. Data Interference d. None of the above
51. It occurs when a person uses the internet to steal someone’s identity or impersonate them to
open a new credit card account or conduct some financial transactions.
a. Identify Theft c. Internet Securities Fraud
b. Ponzi/Pyramid Schemes d. Illegal Copyright Infringement
52. These are investment schemes in which inventors are promised abnormally high profits on their
investments but no investments are actually made.
a. Identify Theft c. Internet Securities Fraud
b. Ponzi/Pyramid Schemes d. Illegal Copyright Infringement
53. It involves file sharing programs that allow internet users to download music and other
copyrighted materials without paying the artist and the records producers their rightful royalties.
a. Identify Theft c. Internet Securities Fraud
b. Ponzi/Pyramid Schemes d. Illegal Copyright Infringement
54. An individual either post erroneous and deceptive information’s online to artificially inflate the
price of stock (so they can sell previously purchase shares) or they post negative rumors, driving
down the price of a stock so they can buy it at lower levels.
a. Fraudulent Offering of Security c. Illegal Touting
b. Market manipulation d. None of the above
55. This is a cybercrime wherein some Cybercriminals creates website specially designed to
fraudulently sell securities. To make the offerings more attractive than they are, assets maybe
inflated, expected returns overstated and risk understated.
a. Fraudulent Offering of Security c. Illegal Touting
b. Market manipulation d. None of the above
56. This crime occurs when individuals make securities recommendations and fail to disclose that
they are being paid to disseminate their favorable opinions.
a. Fraudulent Offering of Security c. Illegal Touting
b. Market manipulation d. None of the above
57. This is global array of computers connected by a high speed reliable network. It connects millions
of computers, allowing for the rapid exchange of information’s, education, military, criminal
justice system and business professionals as well as researchers uses the system to send and
retrieve information.
a. Cyber space c. Illegal Touting
b. Internet d. Market manipulation
58. Cybercrime Investigation and Coordinating Center (CICC) is an inter-agency body created for
policy coordination among concerned agencies and for the formulation and enforcement of the
national cyber security plan. Under which administrative supervision does CICC belongs?
a. Office of the President c. National Bureau of Investigation
b. Department of Justice Philippine d. Philippine National Police
59. It refers to any information contained in the form of computer data or any other form that is held
by a service provider, relating to subscribers of its services other than traffic or content data and
by which identity can be established:
60. It refers to any computer data other than the content of the communication including, but not
limited to, the communication’s origin, destination, route, time, date, size, duration, or type of
underlying service.
a. Subscriber’s information. c. Traffic Data
b. User’s information d. None of the above
61. Which among the choices below is NOT an Offense against the confidentiality, integrity and
availability of computer data and systems:
a. lllegal Access c. lllegal Interception
b. Data Interference d. None of the choices
62. Which among the choices below is an Offense against the confidentiality, integrity and availability
of computer data and systems:
a. Misuse of Devices c. lllegal Interception
b. System Interference d. All of the choices
63. The possession of a device, including a computer program or a computer password with intent to
use said devices for the purpose of committing any of the offenses under this section.
a. Misuse of Devices c. lllegal Interception
b. System Interference d. All of the choices
65. The input, alteration, or deletion of any computer data without right resulting in inauthentic data
with the intent that it be considered or acted upon for legal purposes as if it were authentic,
regardless whether or not the data is directly readable and intelligible.
a. Computer-related Forgery c. Computer-related Identity Theft
b. Computer-related Fraud d. None of the choices
66. The unauthorized input, alteration, or deletion of computer data or program or interference in the
functioning of a computer system, causing damage thereby with fraudulent intent:
a. Computer-related Forgery c. Computer-related Identity Theft
b. Computer-related Fraud d. None of the choices
67. The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying
information belonging to another, whether natural or juridical, without right: Provided, That if no
damage has yet been caused, the penalty imposable shall be one (1) degree lower.
a. Computer-related Forgery c. Computer-related Identity Theft
b. Computer-related Fraud d. None of the choices
70. The integrity of traffic data and subscriber information relating to communication services
provided by a service provider shall be preserved for a minimum period of how many months
from the date of the transaction?
a. Six (6) months c. Four (4) months
b. Five (5) months d. Three (3) months
71. Where a search and seizure warrant is properly issued, the law enforcement authorities shall
have the following powers and duties to conduct interception within the time period specified in
the warrant. Which among the following choice/s is/are included in the powers and duties of the
said law enforcement authorities?
c. Both a and b
72. Which among the following is/are the power/s and function/s of the CICC or Cybercrime
Investigation and Coordinating Center?
a. To formulate a national cyber security plan and extend immediate assistance for the
suppression of real-time commission of cybercrime offenses through a computer
emergency response team (CERT)
73. Which among the following is/are the power/s and function/s of the CICC or Cybercrime
Investigation and Coordinating Center?
c. Both a and b
74. Which among the following is/are the power/s and function/s of the CICC or Cybercrime
Investigation and Coordinating Center?
a. To coordinate the support and participation of the business sector, local government
units and nongovernment organizations in cybercrime prevention programs and other
related projects;
c. Both a and b
75. Which among the following is/are the power/s and function/s of the CICC or Cybercrime
Investigation and Coordinating Center?
a. To call upon any government agency to render assistance in the accomplishment of the
CICC’s mandated tasks and functions; and
b. To perform all other matters related to cybercrime prevention and suppression, including
capacity building and such other functions and duties as may be necessary for the proper
implementation of this Act.
c. Both a and b
---------------------xxxxxxxx-----------------------xxxxxxxxx------------------------xxxxxxx--------------
1. Give at least 7 UNLAWFUL ACTS wherein the Computer is either used as a tool or
target or both.
2. What are the three (3) requirements under section 12 (5) of R.A 10175 for the
issuance and/or grant of court warrant after written application and the examination
under oath or affirmation of the applicant and the witnesses he may produce and the
showing?
---------------------xxxxxxxx-----------------------xxxxxxxxx------------------------xxxxxxx--------------
III. TRUE OR FALSE: Draw a star if the statement is True; draw a heart if the
statement is False. (1 POINT EACH = 15POINTS)
____1. Exclusionary Rule means that any evidence procured without a valid warrant or
beyond the authority of the same shall be inadmissible for any proceeding before any
court or tribunal.
____2. The CICC (Cybercrime Investigation and Coordinating Center) shall be headed by
the Executive Director of the Information and Communications Technology Office under
the Department of Science and Technology (ICTO-DOST) as Chairperson with the
Director of the NBI as Vice Chairperson.
____3. Aside from the Chairperson and Vice Chairperson of the CICC ( Cybercrime
Investigation and Coordinating Center), it shall also be composed of the following
members: The Chief of the PNP; Head of the DOJ Office of Cybercrime; and one (1)
representative from the private sector and academe.
____4. The CICC shall be manned by a secretariat of selected existing personnel and
representatives from the different participating agencies.
____6. The integrity of traffic data and subscriber information relating to communication
services provided by a service provider shall be preserved for a minimum period of five
(5) months from the date of the transaction.
____7. Content data shall be similarly preserved for five (5) months from the date of
receipt of the order from law enforcement authorities requiring its preservation.
____8. Law enforcement authorities may order a one-time extension for another five (5)
months: Provided, That once computer data preserved, transmitted or stored by a
service provider is used as evidence in a case, the mere furnishing to such service
provider of the transmittal document to the Office of the Prosecutor shall be deemed a
notification to preserve the computer data until the termination of the case.The service
provider ordered to preserve computer data shall keep confidential the order and its
compliance.
____9. Law enforcement authorities, upon securing a court warrant, shall issue an order
requiring any person or service provider to disclose or submit subscriber’s information,
traffic data or relevant data in his/its possession or control within Forty Eight (48) hours
from receipt of the order in relation to a valid complaint officially docketed and assigned
for investigation and the disclosure is necessary and relevant for the purpose of
investigation.
____10. All computer data, including content and traffic data, examined under a proper
warrant shall, within seventy-two (72) hours after the expiration of the period fixed
therein, be deposited with the court in a sealed package, and shall be accompanied by
an affidavit of the law enforcement authority executing it stating the dates and times
covered by the examination, and the law enforcement authority who may access the
deposit, among other relevant data.
1. What do you call the Office within the Department Of Justice (DOJ)
designated as the central authority in all matters related to international mutual
assistance and extradition in relation to cybercrime?