You are on page 1of 7

9.

A tactic whereby users within an online space


Cybercrime and Environmental Laws bombard victims with offensive, insulting, and
1. The first Filipino to be convicted of cybercrime, threatening messages to silence the target, force them
particularly hacking. to take back what they said and/or apologize, or to
force them to leave the platform.
A. JJ HELTERBRAND B. JJ MARIA OSAWA
C. JJ MARIA CLARA D. JJ MARIA GINER A. DOGPILING B. DOS ATTACK
C. DOXWARE D. DISINHIBITION
2. Refers to the immediate physical and social setting in
which people live or in which something happens or 10. Cyber acts that compromise and disrupt critical
develop infrastructure systems, which amount to an armed
attack.
A. BUILT ENVIRONMENT B. NATURAL ENVIRONMENT
C. SOCIAL ENVIRONMENT D. ALL OF THE ABOVE A. CYBERBULLYING. B. CYBERHARASSMENT.
C. CYBERSTALKING. D. NONE OF THE ABOVE
3. It became the first national park in the Philippines
established on June 27, 1933 following the National 11. A structured group of three or more persons,
Parks Act no. 3195. existing for a period of time and acting in concert with
the aim of committing one or more serious crimes or
A. MT. MAKILING B. MT. ARAYAT offences.
C. MT. APO D. MT. EVEREST
A. CYBER-DEPENDENT CRIME.
4. Is considered to be the world's largest rainforest with B. CYBER-ENABLED CRIMES.
biggest biological diversity. C. CYBER ORGANIZED CRIME.
D. CYBER ORGANIZED CRIMINALS.
A. AFRICA B. AMAZON
C. EUROPE D. BRAZIL 12. A cybercrime facilitated by the Internet and digital
technologies.
5. Famous as the birthplace of Darwin's theory of
evolution and has a vast number of endemic species. A. CYBER-DEPENDENT CRIME
B. CYBER-ENABLED CRIMES
A. GREEN ISLAND B. GREED ISLAND
C. CYBER ORGANIZED CRIME
C. GALAPAGOS ISLAND D. NONE OF THE ABOVE
D. CYBER ORGANIZED CRIMINALS
6. Genetic diversity is defined as
13. It broke a new ground by defining three innovative
A. DIVERSITY WITHIN FLORA "flexibility mechanisms" to lower the overall costs of
B. DIVERSITY WITHIN THE FAUNA achieving its emissions targets.
C. DIVERSITY WITHIN THE SPECIES
A. TYOKO PROTOCOL
D. DIVERSITY WITHIN THE FAUNA AND FLORA
B. KYOTO PROTOCOL
7. It is the preservation of components of biological C. KIYOTO PROTOCOL
diversity outside their natural habitats D. NONE OF THE ABOVE
A. IN CONSERVATION B. EX-CONSERVATION 14. Refers to the shifting and/or permanent slash- and-
C. INSIDE – CONSERVATION burn cultivation of forest land having little or no
D. EX-SITU – CONSERVATION provision to prevent soil erosion.
8. The sending of emails with infected attachments or A. KAINGIN B. KAININ
links that are designed to dupe the receiver into clicking C. KAIGIN D. DEFORESTATION
on the attachments or links.

A. SPEARPHISHING B. SPYWARE
C. STALKERWARE D. SWAPPERS
15. Is a practice of protecting the natural environment 21. The first computer system in the Philippines an IBM
on individual, organization controlled or governmental 650 - is installed at the to handle the country's land
levels, for the benefit of both the environment and survey computations in 1960.
humans.
A. BUREAU OF AGRARIAN REFORM
A. ENVIRONMENTAL PRESERVATION B. DTI
B. ENVIRONMENTAL PROTECTION C. BUREAU OF LANDS
C. ENVIRONMENTAL CONSERVATION D. NONE OF THE ABOVE
D. NONE OF THE ABOVE
22. The process of tracing illicit acts back to the source
16. Are relatively large areas not materially altered by of the cybercrime. Also known as trace back.
human activity where extractive resource uses are not
A. BACK-TRACING B. BOTCODE
allowed and maintained to protect outstanding natural
C. BOTHERDER D. BRUTE FORCE ATTACK
and scenic areas of national or international significance
for scientific, educational and recreational use. 23. Refers to an electronic, magnetic, optical,
electrochemical, or other data processing or
A. NATURAL PARKS B. NATIONAL PARKS
communications device, or grouping of such devices,
C. PEOPLE'S PARK D. PARK
capable of performing logical, arithmetic, routing or
17. It became the Landmark and placed the country on storage functions.
the global cyber-map and pushed congress to pass the
A. TECHNOLOGY B. COMPUTER
first "cybercrime law".
C. ELECTRONICS D. NONE OF THE ABOVE
A. I DON'T LOVE YOU VIRUS
24. In 2011, Philippines named with a percentage of
B. LOVE IS VIRUS
93.9 for Facebook alone.
C. SHE LOVES YOU VIRUS
D. NONE OF THE ABOVE A. CYBER-NETWORKING CAPITAL OF THE WORLD
B. SOCIAL NETWORKING CAPITAL OF THE WORLD
18. Malware that infects a user's digital device, encrypts
C. NETWORKING CAPITAL OF THE WORLD
the user's documents, and threatens to delete files and
D. NONE OF THE ABOVE
data if the victim does not pay the ransom.
25. Refers to the human-made surroundings that
A. CRYPTOJACKING
provide the setting for human activity.
B. CYBERSMEARING
C. CRYPTORANSOMWARE A. BUILT ENVIRONMENT
D. NONE OF THE ABOVE B. NATURAL ENVIRONMENT
C. SOCIAL ENVIRONMENT.
19. The shielding of one's identity to enable individuals
D. ALL OF THE ABOVE
to engage in activities without revealing themselves
and/or their actions to others. 26. Manila's most air polluted district due to open dump
sites and industrial waste.
A. ANONYMITY
B. ANONYMIZERS A. PACO B. BINONDO
C. ANONYMOUS PROXY SERVERS C. TONDO D. ERMITA
D. NONE OF THE ABOVE
27. Means the ecological community considered
20. A tactic whereby the processing power of infected together with non-living factors and its environment as
computers is used to mine cryptocurrency for the a unit.
financial benefit of the person controlling the bot-
infected digital devices. A. ECOLOGY B. SOLAR SYSTEM
C. ECOSYSTEM D. ENVIRONMENT
A. CRYPTOJACKING B. CYBERSMEARING.
C. CRYPTORANSOMWARE. D. NONE OF THE ABOVE
28. Generally refers to the variety and variability of Life A. SPEARPHISHING B. SPYWARE
on Earth, and is represented by the number of different C. STALKERWARE D. SWAPPERS
species there are on the planet.
36. Pretending to be higher level executives in a
A. BIODIVERSITY B. BIODIVERSIFICATION company, lawyers, accountants, and others in positions
C. BIOECONOMY D. NONE OF THE ABOVE of authority and trust, in order to trick employees into
sending them funds.
29. False or misleading promises of love and
companionship designed to scam individuals out of A. VIRUS B. WORM
their time, money and/or other items. C. WHALING D. WEB CRAWLERS

A. CATPHISHING B. CENSORSHIP 37. Designed and constructed the first working


C. BOTHERDER D. BUFFER mechanical calculator in 1623.

30. The use of information and communication A. WILHELM SCHICKARD


technology by children to annoy, humiliate, insult, B. BLAISE PASCAL AND GOFFRIED LIEBNITS
offend, harass, alarm, stalk, abuse or otherwise attack C. GOTTFRIED LEIBNIZ
another child or children. D. THOMAS DE COLMAR

A. CYBERBULLYING B. CYBERHARASSMENT 38. Demonstrated a digital mechanical calculator, called


C. CYBERSTALKING D. CYBERTERRORISM the Stepped Reckoner 1673. He may be considered the
first computer scientist and information theorist, for,
31. The process whereby an individual demonstrates a
among other reasons, documenting the binary number
lack of social restraint with regards to online behavior.
system.
A. DOGPILING B. DOS ATTACK
A. WILHELM SCHICKARD
C. DOXWARE D. DISINHIBITION
B. BLAISE PASCAL AND GOFFRIED LIEBNITS
32. The part of the World Wide Web, which is known C. GOTTFRIED LEIBNIZ
for its obscure and hidden websites that host illicit D. THOMAS DE COLMAR
activities, goods, and services, and can only be accessed
39. The development that meets the needs of the
using specialized software.
present without compromising the ability of future
A. DEEP WEB B. ILLICIT WEB generations to meet their own needs is called?
C. UNDERGROUND WEB D. DARK WEB.
A. MUTUAL DEVELOPMENT
33. A cybercrime that interferes with systems by B. INTEGRATED DEVELOPMENT
overwhelming servers with requests to prevent C. REASONABLE DEVELOPMENT
legitimate traffic from accessing a site and/or using a D. SUSTAINABLE DEVELOPMENT
system. Also known as denial of service attack.
40. A biosphere reserve has following parts:
A. DOGPILING B. DOS ATTACK
A. INPUT, PROCESS AND OUTPUT ZONE
C. DOXWARE D. DISINHIBITION
B. IN AND EX-ZONE
34. Phishing via text messaging. Also known as SMS C. CORE, BUFFER AND TRANSITION ZONE
phishing. D. LEGAL AND ILLEGAL ZONE

A. SEXTORTION B. SMISHING 41. It is the permanent destruction of indigenous


C. SEXTING D. SPAM. forests and wood lands.

35. A form of spyware that can run on a victim's A. AFFORESTATION B. DEFORESTATION


computer, smartphone or other Internet-enabled digital C. FORESTATION D. REFORESTATION
device and collect and relay all the user's actions on
these devices, from emails and text messages sent and
received, to photographs taken and keystrokes.
42. It is the study of a region's plants and their practical 52. The use of a script or bot to guess user credentials.
uses through the traditional knowledge of a local
A. BACK-TRACING B. BOTCODE
culture and people.
C. BOTHERDER D. BRUTE FORCE ATTACK
A. BOTANY B. ETHNOGRAPHY
53. Measures that establish privileges, determine
C. ETHNOBOTANY D. ETHOLOGY
authorized access, and prevent unauthorized access.
43. It is the deterioration of the environment through
A. ACCESS B. ACCESS CONTROLS
depletion of resources such as air, water and soil; the
C. ILLEGAL ACCESS D. NONE OF THE ABOVE
destruction of ecosystems; habitat destruction; the
extinction of wildlife. 54. These proxy servers enable users to hide identity
data by masking their IP address and substituting it with
A. POLLUTION B. ENVIRONMENTAL DEGRADATION
a different IP address. Also known as anonymous proxy
C. BIODEGRADATION D. GENETIC DEGRADATION
servers.
44.
A. ANONYMITY B. ANONYMIZERS
45. C. ANONYMOUS PROXY SERVERS
D. NONE OF THE ABOVE
46. Malware that requires user activity to spread.
55. Typically defined as the protection of confidentiality,
A. VIRUS B. WORM
integrity and availability of computer data and systems
C. WHALING D. WEB CRAWLERS
in order to enhance security, resilience, reliability and
47. Self-generated sexually explicit material. trust in ICT.

A. SEXTORTION B. SMISHING A. CYBER CRIME B. CYBER SECURITY


C. SEXTING D. SPAM C. COMPUTER CRIME D. COMPUTER SECURITY

48. The part of the World Wide Web that is not indexed 56. Refers to the instruction, communication with,
by search engines and is not easily accessible and/or storing data in, retrieving data from, or otherwise
available to the public. making use of any resources of a computer system or
communication network.
A. DEEP WEB B. ILLICIT WEB
C. UNDERGROUND WEB D. DARK WEB A. ACCESS B. ACCESS CONTROLS
C. ILLEGAL ACCESS D. NONE OF THE ABOVE
49. A cybercrime that would not be possible without the
Internet and digital technologies. 57. The first use of computer.

A. CYBER-DEPENDENT CRIME A. ENTERTAINMENT B. COMPUTATION


B. CYBER-ENABLED CRIMES C. COMMUNICATION D. NONE OF THE ABOVE
C. CYBER ORGANIZED CRIME
58. Refer to forest reservations essentially of natural
D. CYBER ORGANIZED CRIMINALS
wilderness character which have been withdrawn from
50. This is a memory area allocated to an application. settlement, occupancy or any form of exploitation
except in conformity with approved management plan
A. BOTNET B. BOTCODE and set aside as such exclusively to conserve the area or
C. BOTHERDER D. BUFFER preserve the scenery, the natural and historic objects,
51. The words "economy" and "ecology" both came wild animals and plants therein and to provide
from the Greek word_________which means "home". enjoyment of these features in such areas.

A. OKIOS B. OIKOS A. NATURAL PARKS B. NATIONAL PARKS


C. OIKIOS D. KIOSKE C. PEOPLE'S PARK D. PARK
59. The largest country in Latin America and South 66. A form cryptoransomware that perpetrators use
America and the fifth largest country in the world. Due against victims that releases the user's data if ransom is
to this vastness, there are different types of not paid to decrypt the files and data.
ecosystems, which prevail all over the country.
A. DOGPILING B. DOS ATTACK
A. MEXICO` B. BRAZIL C. DOXWARE D. DISINHIBITION
C. CANADA D. UK
67. An intermediary server that is used to connect a
60. Is the process of methodically examining computer client with a server that the client is requesting
media for evidence. resources from.

A. COMPUTER SCIENCE A. RANSOMWARE B. PROXY SERVER


B. COMPUTER INFORMATION C. BOTH A AND B D. NONE OF THE ABOVE
C. COMPUTER FORENSICS
68. A form of cyber harassment whereby the victim is
D. ALL OF THE ABOVE
threatened with the release of sexually explicit content
61. Who was the Judge that convicted JJ Marie Giner? if the demands of the perpetrator are not met.
Situational crime prevention. Measures used to prevent
A. THOMAS DEWEY B. ROSALYN MISLOS-LOJA
and reduce crime.
C. ALEXANDER GESMUNDO D. NONE OF THE ABOVE
A. SEXTORTION B. SMISHING
62. According to the Conservation International, it is the
C. SEXTING D. SPAM
biggest nation in terms of the most biodiversity per
square kilometer than any other nation. 69. Semi-automated cryptocurrency exchanges.

A. ECUADOR B. VENEZUELA A. SPEARPHISHING B. SPYWARE


C. PERU D. MADAGASCAR C. STALKERWARE D. SWAPPERS

63. Those gases that can potentially or can reasonably 70. Stand-alone malicious software that spreads
be expected to induce global warming, which includes without the need for user activity.
carbon dioxide, methane, oxides of nitrogen,
A. VIRUSQ B. WORM
chorofluorocarbons, and the like.
C. WHALING D. WEB CRAWLERS.
A. GREEN GASES B. GREENHOUSE GASES
71. Environment is derived from
C. HOUSE GASES D. HOUSE GREEN GASES
A. ENVIRON B. ENVIRONNER
64. Fishing method that requires diving and other
C. ENVIRNER D. ENVIRONR
physical or mechanical acts to pound the coral reefs and
other habitat to entrap, gather or catch fish and other 72. In 1820 he launched the mechanical calculator
fishery species. industry when he released his simplified arithmometer,
which was the first calculating machine strong enough
A. SCUBA DIVING B. MURO-AMI
and reliable enough to be used daily in an office
C. MURO-SITA D. MURO-KANA
environment.
65. A term used to describe a continuing criminal
A. WILHELM SCHICKARD
enterprise that rationally works to profit from illicit
B. BLAISE PASCAL AND GOFFRIED LIEBNITS
activities that are in demand online.
C. GOTTFRIED LEIBNIZ
A. CYBER-DEPENDENT CRIME D. THOMAS DE COLMAR
B. CYBER-ENABLED CRIMES
73
C. CYBER ORGANIZED CRIME
D. CYBER ORGANIZED CRIMINALS 74

75
76. The creation of a fake, duplicate website that is 84.
designed to trick users to input their login credentials.
85.
A. Pharming B. Phishing
86. The use of information and communication
C. Hacking D. Cracking
technology to intentionally humiliate, annoy, attack,
77. Sending of unsolicited emails. threaten, alarm, offend and/or verbally abuse an
individual.
A. Sextortion B. Smishing
C. Sexting D. Spam A. Cyberbullying B. Cyberharassment
C. Cyberstalking D. Cyberterrorism
78. Applications designed to traverse the World Wide
Web to achieve specific objectives. 87. The sending of an email to targets with a website
link for users to click on, which might either download
A. Virus B. Worm
malware onto the users' digital devices or sends users
C. Whaling D. Web crawlers.
to a malicious website that is designed to steal users'
79. Refers to any method which can be used to gather credentials.
information about an object without coming in contact
A. Pharming B. Phishing
with it?
C. Hacking D. Cracking
A. Database B. remote sensing
C. WWW D. GIS
88. Malware designed to surreptitiously monitor
80. The use of information and communication
infected systems, and collect and relay information back
technology to commit a series of acts over a period of
to creator and/or user of the spyware.
time designed to harass, annoy, attack, threaten,
frighten, and/or verbally abuse an individual. A. Spearphishing B. Spyware
C. Stalkerware D. Swappers
A. Cyberbullying B. Cyberharassment
C. Cyberstalking D. Cyberterrorism 89. The first important legislation that formed the basis
of the current system of national parks and protected
81. Refers to a computer or a computer network, the
areas in the Philippines.
electronic medium in which online communication
takes place. A. Philippine Commission Act No.468
B. Philippine Commission Act No.648
A. Cyber B. website
C. Philippine Commission Act No. 864
C. internet D. electronics
D. None of the above.
82. The cyber-dependent crimes perpetrated against
90. Tools and techniques used to obfuscate cybercrime
critical infrastructure to cause some form of harm and
investigation and digital forensics efforts.
to provoke fear in the target population.
A. Anti- forensics
A. Cyberbullying B. Cyberharassment
B. Anti-digital forensics
C. Cyberstalking D. Cyberterrorism
C. Antimalware or Antivirus
83. The prohibition of information, visual depictions, D. Both a and b
and written or oral communications that are prohibited
91. Controller of bot-infected digital devices.
by law and/or their suppression by a government,
community or group because they are unlawful and/or A. Back-tracing
viewed as harmful, unpopular, undesirable, or politically B. Botcode
incorrect. C. Botherder
D. Brute force attack
A. Catphishing B. Censorship
C. Botherder D. Buffer
92. Offences committed against computer data,
computer data storage media, computer systems,
service providers.

A. Cyber crime B. Cyber security


C. Computer crime D. Computer security

93. Is an organized way of using all of the laws in our


legal system to minimize, prevent, punish, or remedy
the consequences of actions which damage or threaten
the environment, public health and safety.

A. Environmental crimes.
B. Environmental Law System
C. Environmental law
D. All of the above

94.

95.

96.

97. Birth of Philippine Internet

A. 1960
B. 1993
C. 2011
D. None of the above

98. The misuse and also the pollution of water supplies.


Often, individuals throughout the world have to deal
with either limited water supplies, or polluted water,
often causes by human actions.

A. Water contamination
B. Water degradation
C. Water pollution
D. None of the above

99.

100.

You might also like