You are on page 1of 6

CHAPTER THREE REVIEW QUESTIONS

1. The creator of the “I love your virus” was____.

a. Onel D Jesus

b. Joffrey De Cruz

c. Jonel De Guzman

d. Onel De Guzman

2. For MLAT function in extraditing a fugitive from justice hiding in a country where the Philippines
have a treaty is _____.

a. Strong political relation

b. Duality of criminal action

c. Comprehensive cybercrime law

d. Declared wanted by the court

3. The intentional alteration, or reckless hindering or interference with the functioning of a


computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or
suppressing computer data or program.

a. Misuse of device

b. System interference

c. Illegal access

d. Hacking

4. The Budapest convention against cybercrime proposes that one of the ways to fight cybercrimes
is to _____.

a. Develop skilled digital forensic investigators

b. Harmonized cybercrime laws of members States


c. Provide consultancy on how to investigate cybercrime

d. All of the above

5. ____ is performed by technical means without right of any non-public transmission of computer
data to, from, or within a computer system including electromagnetic emissions from a computer
system carrying such computer data.

a. Illegal access

b. Hacking

c. Illegal interception

d. Cybercrime

6. A type of cybercrime warrant issued when a computer device or system is previously seized by
another lawful method, such as a warrantless arrest.

a. WCD

b. WSSECD

c. WECD

d. WICD

7. The alteration or deletion of any computer data without right, resulting in inauthentic data, with
the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless
whether or not the data is directly readable and intelligible.

a. Fraud

b. Computer related forgery

c. Computer related fraud

d. DDOS attack
8. The cybercrime prevention act of 2012 was named marred with petitions filed with the Supreme
Court to declare the said law unconstitutional on the basis of its 21 questionable provision. However,
the Supreme Court ruled in favour of the law except for how many sections?

a. 5 sections

b. 2 sections

c. 3 sections

d. 4 sections

9. The number of months the integrity of traffic data and subscriber information shall be kept,
retained and preserved by a service provider from the date of the transaction.

a. 6 months

b. 12 months

c. 5 months

d. 3 months

10. The acquisition of the domain name over the internet in bad faith to profit, mislead, destroy
reputation, and deprive others from registering the same.

a. Cybersquatting

b. Computer related forgery

c. Computer related identity theft

d. Cyber bullying

11. The Philippines is the ____ member State Budapest Convention against cybercrimes.

a. 47th

b. 56th

c. 67th

d. 57th
12. Based on the DOJ advisory no. 1, complaints involving violations of RA 10175 may be filed before
the ____ for the conduct of the requisite preliminary investigation pursuant to Rule 112 of Revised Rules
of Court.

a. PNP Anti-Cybercrime Group

b. NBI Cybercrime Division

c. Prosecutor’s office

d. Department of Justice Office of Cybercrime

13. If a crime defined and punished in the RPC was committed through the use of ICT, the penalty is
____..

a. 2 degrees higher than provided in the RPC

b. The same with the RPC but the maximum period will be imposed

c. 1 degree higher than provided in the RPC

d. 1 degree lower than provided in the RPC

14. Illegal access is considered the ____ of the computer system without authority to do so.

a. Intrusion

b. Use

c. Access

d. Copying

15. The intentional acquisition, use, misuse, transfer, possession, alteration, or deletion of
identifying information belonging to another, whether natural or juridical, without right.

a. Illegal Access

b. Computer related forgery

c. Computer related fraud


d. Computer related identity theft

16. If the programmer of an ISP opened the account of a subscriber to correct its services. While
providing the necessary services discovered sex scandal and watched it, the programmer is liable for
____.

a. Illegal Access

b. Violation of privacy

c. Illegal interception

d. Violation of RA 9995

17. Using packet sniffing software and hardware to monitor network traffic and intercept those
packets someone is interested in is considered as ____.

a. Hacking

b. Illegal interception

c. Cybersquatting

d. Intrusion

18. Is a type of eavesdropping attack that occurs when a malicious actor inserts himself as a
relay/proxy into a communication session between people or systems?

a. Doppler

b. System Interference

c. Illegal interception

d. Man-in-the-middle

19. The following are NOT the powers and functions of law enforcement authorities, EXCEPT:

a. Coordinate the preparation of appropriate and effective measures to prevent and suppress
cybercrime activities as provided for in the Act,
b. Formulate guidelines in the investigation, forensic evidence recovery and forensic data analysis
consistent with industry standard practices.

c. Monitor cybercrime cases being handled by participating law enforcement and prosecution
agencies,

d. Call upon any government agency to render assistance in the accomplishment of the CICC’s
mandated tasks and functi

20. The following are the powers and duties of law enforcement authorities where a search and
seizure is properly issued by the competent authority, EXCEPT:

a. Secure a computer system or a computer data storage medium

b. Confiscate all the computer to be examined at the forensic computer laboratory

c. Make and retain a copy of those computer data secured

d. Maintain the integrity of the relevant stored computer data

You might also like