Professional Documents
Culture Documents
CYbercrime 2
CYbercrime 2
data or a computer system, usually by encrypting it, until the victim pays a ransom fee
to the attacker.*
Phishing
Cryptojacking
Cyber espionage
Ransomware attack
Any person who willfully abets, aids, or financially benefits in the commission of any of
the offenses enumerated Republic Act 10175 shall be held liable, except with respect to
Sections 4(c)(2) on Child Pornography and 4(c)(4) on online Libel.*
Wholly true
Partially true
Wholly false
Partially false
The court shall have this period from the filing of the complaint to try and decide the
case in relation to environmental cases.*
15 days
2 months
1 year
5 years
This office shall serve as the Cybercrime Operations Center of the CICC.*
NBI
PNP
DOJ Office of Cybercrime
Regional Trial Court
The law aims to achieve and maintain clean air that meets the National Air Quality
guideline values for criteria pollutants, throughout the Philippines, while minimizing the
possible associated impacts to the economy.*
RA 6969
RA 8749
RA 9275
RA 9003
The act of throwing trash or garbage in a place not properly designated for the same is
a violation to*
REPUBLIC ACT 8749
REPUBLIC ACT 9275
REPUBLIC ACT 9003
REPUBLIC ACT 9512
The following are the common example of crime violating certain law on mining,
EXCEPT*
Water system contamination
Mines waste
Mining operation without permit
Reforestation
These are devices used for entering data or instructions to the central processing unit.
Are classified according to the method they use to enter data.*
Keying devices
Pointing devices
Input devices
Special (Control) keys
It is the science of acquiring, retrieving, preserving and presenting data that has been
processed electronically and stored on digital media*
Digital forensics
Cybercrime
Cyber
Computer system
means any part taken or substance extracted from wildlife, in raw or in processed form
including stuffed animals and herbarium specimens.*
Derivatives
Mineral
Wildlife
Product
Network Hacking is a way of gathering all the critical information about a network with
an intent to harm the network and block its operations. The statement is the opposite of
not false.*
Wholly true
Partially true
Wholly false
Partially false
Content data shall be similarly preserved for six (6) months from the date of receipt of
the order from law enforcement authorities requiring its preservation.*
three (3) months
six (6) months
forty-eight (48) hours
thirty-six (36) hours
One among many purposes of RA No. 7586 is to reserve certain areas exclusively for
the environment, and to exclude all other forms of land use and utilization solely as
places where wildlife, flora, and fauna can grow, and where the rich biodiversity of the
ecosystem can be preserved. The following places where protected areas under RA
7586, EXCEPT*
Natural park
Natural monument
Wildlife sanctuary
All of the above
None of the above
refers to an order issued by the court directing or enjoining any person or government
agency to perform or desist from performing an act in order to protect, preserve or
rehabilitate the environment.*
Consent decree
Continuing Mandamus
Environmental protection Order
Warrrant
Very essential that an investigator knows the crime he’s investigating. The which among
the following describes Illegal Logging*
cutting, gathering, or collecting timber or other forest products without the necessary permit from
the government.
Transporting illegally cut timber and forest products
All of the above
None of them
The following are the guidelines for preservation of evidence for crimes involving
environmental laws, Except*
Investory
Limit the number of individual handling evidence
Packing, labeling, sealing and marking of evidence
Turn-over
In relation to the previous question, failure to timely file the returns for any of the issued
warrants under this Rule or to duly turn over to the court’s custody any of the items
disclosed, intercepted, searched, seized, and/or examined as prescribed hereunder
shall subject the responsible law enforcement authorities to an action for-*
Obstruction of Justice
Contempt
Cybercrime
Neglect of Duty
They are those who are hired and are given permission to attack the system. They can
attack the system just to expose the vulnerabilities that an attacker can take advantage
of.*
Ethical Hacker
State-sponsored hackers
Malicious Insider
Grey Hat Hacker
The law aims to protect the country's water bodies from pollution from land-based
sources (industries and commercial establishments, agriculture and
community/household activities).*
RA 6969
RA 8749
RA 9275
RA 9003
states that when human activities may lead to threats of serious and irreversible
damage to the environment that is scientifically plausible but uncertain, actions shall be
taken to avoid or diminish that threat.*
Strategic lawsuit
Environmental protection
Continuing mandamus
Precautionary principle
Law enforcement agencies were solely responsible for conservation of the environment.
Is the statement true?*
Yes, constitutionally
Yes, as construed in statutes
No, CJS is a mechanism responsible for it.
No, the PNP was generally mandated to enforce all laws.
Which of the following activities refers to the act of legally intercepting computer data
conducted by law enforcement authorities?*
listening
recording
monitoring
surveillance
all of these
Blue Hat Hackers are types of hackers who’re learning the ropes of hacking. They are
slightly different from the Script Kiddies due to their intention. The intent is to strive and
learn to become full-fledged hackers.*
Wholly true
Partially true
Wholly false
Partially false
The integrity of traffic data and subscriber information shall be kept, retained and
preserved by a service provider for a minimum period of ____ from the date of the
transaction.*
three (3) months
six (6) months
forty-eight (48) hours
thirty-six (36) hours
It is a hacking technique designed to flood your web server with a myriad of requests to
the point that it overloads the web server resulting in a website crash.*
Denial of Service (DoS\DDoS) Attacks
Cookie Theft
Fake W.A.P.
Phishing
Where a search and seizure warrant is properly issued, the law enforcement authorities
shall likewise have the following powers and duties, except:*
Secure a computer system or a computer data storage medium;
Make and retain a copy of those computer data secured;
Conduct forensic analysis or examination of the computer data storage medium:
Render accessibility on those computer data in the accessed computer or computer and
communications network.
Violation of laws implies violation of an individual's right. Thus, a person throwing his
garbage anywhere is against the right of an individual to?*
Life
Liberty
Property
None of them
Is a collective term describing the network of treaties, statutes, regulations, common
and customary laws addressing the effects of human activity on the natural
environment.*
Biochemical law
Environmental Law
remedial law
Political Law
People modify the environment for their purposes and obtain benefits (Ecosystem
Services) from it. Is the statement true?*
Yes, the humans are responsible for the development of ecosystem
Yes, actions of human disrupt the function of the ecosystem
No, ecosystem is independent
No, Modification of environment to fit with society is good
The warrants shall only be effective for the length of time as determined by the court,
which shall not exceed from its issuance.*
10 days
15 days
72 hours
24 hours
”Development that meets the needs of the present without compromising the ability of
the future generations to meet their own needs.” this quote falls to the principle of*
Everything is connected to everything else
All forms of life are important
Everything must go somewhere
Ours is a finite earth
It is the main circuit board on the computer.*
Motherboard
Random-Access Memory
Hard disk
Solid-State Drives
A set of integrated devices that input, output, process, and store data and information.*
Computer hardware
Computer software
Liveware
Computer system
This office shall serve as the public information arm of the EPA.*
Interim Officers
Public Affairs Office
Public Information Desk
DITC
In this phase, the hacker tries to exploit all the vulnerabilities of the target system.*
Reconnaissance
Scanning
Gaining Access
Maintaining Access
use of computer networks to gain illicit access to confidential information, typically that
held by*
government or other organization.
Phishing
Cryptojacking
Cyber espionage
when spam emails, or other forms of communication, are sent en masse, with the
intention of tricking recipients into doing something that undermines their security or the
security of the organization they work for.*
Phishing
Cryptojacking
Cyber espionage
Ransomware attack
The goal of this phase is to collect, preserve, analyze the physical evidence and
reconstruct what happened in the crime scene.*
Preparation Phase
Physical Forensics and Investigation Phase
Digital Forensics Phase
Reporting and Presentation phase