You are on page 1of 5

PHINMA-ARAULLO UNIVERSITY

College of Criminal Justice Education


CRI 227 (Introduction to Cybercrime Investigation)
First Periodical Examination
Prepared by: Eugenio O. Dela Rosa Jr.

INSTRUCTION: Read each question carefully and choose the best answer. Write
your answer on the provided paper. Strictly no cheating, talking to seatmates, and
no erasures allowed.

PART I : MULTIPLE CHOICE

1.It is criminal activity that either targets or uses a computer, a computer network or
a
network device.
a. Computer Crime
b. Cyber borg
c. Cybercrime
d. A or C
2.It is known as the “Cybercrime Prevention Act of 2012″.
a. R.A. 8792
b. R.A. 9995
c. R.A. 8293
d. R.A. 10175
3. Cybercrimes are categorized into three broad categories, these are;
I. INDIVIDUAL
II. PRIVATE PERSON
III. GOVERNMENT
IV. PROPERTY
V. THEFT OF USERS ACCOUNT
a. I, II AND III
b. II, III, IV AND V
c. I, II, III, IV
d. II, III, IV, AND V
4.It is the use of computer networks to gain illicit access to confidential
information, typically that held by a government or other organization.
a. Ransomware attacks
b. Cyber Extortion
c. Identity fraud
d. Cyber Espionage
5.Cybercrime that leverages deceptive emails, websites, and text messages to steal
confidential personal and corporate information. Victims are tricked into giving
up personal information such as their credit card data, phone number, mailing
address, company information refers to?
a. Identity theft
b. Password Attacks
c. Web Attacks
d. Phising
6.What criminal acts use instruments of modern technology such as computers and
internet?
a. Desktop crimes
b. Cybercrimes
c. Web Crimes
d. All of the aforementioned
7.Hacking, shutting down or misusing websites or computer networks; spreading
hate and inciting terrorism; distributing child pornography; grooming: making
sexual advances to minors are acts of cybercrimes. The elements of cybercrimes
are?
I. Any offense that is committed by a computer, computer system, or
computer network
II. Any offense in which the computer, computer system or computer network
is the target.
III. Any offense in which the computer, computer system or computer network
is used to hide or store possible evidence.
IV. Any offense in which the computer, or computer system or computer
network is used in the performance of sexual deviation.
a. I, II AND IV
b. II, III, AND IV
c. I, II AND III
d. I, III AND IV
8.Cybercrime that targets computers often involves viruses and other types of
malware. Cybercriminals may infect computers with viruses and malware to
damage devices or stop them working. They may also use malware to delete or
steal data. What is the target of I Love You virus created by Onel De Guzman?
a. Ransomware system
b. Motherboard Sytem
c. Operating System
d. Files of the software system
9.Act of terrorism through the use of cybercrime or cyber resources-
a.E-aided act
b.Internet access
c.Cyber resources
d.Cyber terrorism
10.It is the processes electronic signals that represent either a one (“on”) or a zero
(“off”). The “on” state is represented by the presence of an electronic signal; the
“off” state is represented by the absence of an electronic signal.
a. Digital Photograph
b. Digital creator
c. Digital parts
d. Digital devices
11.Which information or data of value to investigation that stored, received, and
send through digital device.
a. Constat evidence
b. Statistical work of evidence
c. Digital Evidence
d. Documentary evidence
12.The CPU can also be thought of as the _____________ of the computer.
a. Arm
b. Mind
c. Encephalon
d. Leg
13.Besides fixed storage components, removable storage media are also used in most
personal computers.
a. These input and output devices connect to the computer via various connection
ports
b. The data is stored when the computer is turned off and where it is retrieved
from when the computer is turned on
c. The media allows you to take your data with you.
d. None of the aforementioned
14.How is the computer system works?
a. Storing data and information
b. Digital electronic machine that is programmed to perform some operations as
per computer programs instructed by live ware
c. taking data, processing it, returning results, and storing it
d. All of the aforementioned
15.It is also known as programs or applications. They are classified into two classes
namely - system software and application software.
a. Computer hardware
b. Computer live ware
c. Computer software
d. User of the computer
16.Also known as orgware or humanware. The user commands the computer system
to execute on instructions.
a. Computer itself
b. Student
c. Computer software
d. Input devices
17.The function of this device that enters data and instructions into the computer
using a pointer that appears on the screen. The items to be entered are selected by
either pointing to or clicking on them.
a. Mouse
b. Digital Device
c. CPU
d. Byte
18.Is a medium that connects different computers altogether and makes sure that the
connection is eternal. When two or more computers need to communicate, they
need to be connected through wires or a wireless connection.
a. National information infrastructure
b. Cyberspace
c. www.
d. Any of the aforementioned
19. It the activity of identifying weaknesses in a computer system or a network to
exploit the security to gain access to personal data or business data.
a. Cracking
b. Hacking
c. Illegal access
d. Hackers and Crackers
20. It is the act of compromising digital devices and networks through unauthorized
access to an account or computer system. Hacking is not always a malicious act,
but it is most commonly associated with illegal activity and data theft by cyber
criminals.
a. Hacking
b. Cracking
c. Illegal access
d. Hackers and Crackers
21. They are one type of hackers who use the knowledge for malicious purposes.
They are someone whom we can call a cracker. The way they use the knowledge
is to gain access to the information of the user which might be dangerous for the
victims knows as black hat hacker, on the other hand the hacker who is employed
by organizations, and they are permitted to attack an organization?
a. Black hat hacker
b. White hat hacker
c. Grey hat hacker
d. Red hat hacker
22. These types of hackers include individuals working in an organization who can
expose confidential information.
a. Hacktivist
b. State/Nation Sponsored Hackers
c. Malicious insider
d. Elite Hacker
23. It is the term that is used for describing the activities that are performed on a
system after gaining unauthorized access. Backdoors help the hacker to gain
quicker access to the target system in the future.
a. Gaining Access
b. Reconnaissance
c. Payload
d. Website Hacking
24.

You might also like