Professional Documents
Culture Documents
A. SPEARPHISHING B. SPYWARE
C. STALKERWARE D. SWAPPERS
15. Is a practice of protecting the natural environment 21. The first computer system in the Philippines an IBM
on individual, organization controlled or governmental 650 - is installed at the to handle the country's land
levels, for the benefit of both the environment and survey computations in 1960.
humans.
A. BUREAU OF AGRARIAN REFORM
A. ENVIRONMENTAL PRESERVATION B. DTI
B. ENVIRONMENTAL PROTECTION C. BUREAU OF LANDS
C. ENVIRONMENTAL CONSERVATION D. NONE OF THE ABOVE
D. NONE OF THE ABOVE
22. The process of tracing illicit acts back to the source
16. Are relatively large areas not materially altered by of the cybercrime. Also known as trace back.
human activity where extractive resource uses are not
A. BACK-TRACING B. BOTCODE
allowed and maintained to protect outstanding natural
C. BOTHERDER D. BRUTE FORCE ATTACK
and scenic areas of national or international significance
for scientific, educational and recreational use. 23. Refers to an electronic, magnetic, optical,
electrochemical, or other data processing or
A. NATURAL PARKS B. NATIONAL PARKS
communications device, or grouping of such devices,
C. PEOPLE'S PARK D. PARK
capable of performing logical, arithmetic, routing or
17. It became the Landmark and placed the country on storage functions.
the global cyber-map and pushed congress to pass the
A. TECHNOLOGY B. COMPUTER
first "cybercrime law".
C. ELECTRONICS D. NONE OF THE ABOVE
A. I DON'T LOVE YOU VIRUS
24. In 2011, Philippines named with a percentage of
B. LOVE IS VIRUS
93.9 for Facebook alone.
C. SHE LOVES YOU VIRUS
D. NONE OF THE ABOVE A. CYBER-NETWORKING CAPITAL OF THE WORLD
B. SOCIAL NETWORKING CAPITAL OF THE WORLD
18. Malware that infects a user's digital device, encrypts
C. NETWORKING CAPITAL OF THE WORLD
the user's documents, and threatens to delete files and
D. NONE OF THE ABOVE
data if the victim does not pay the ransom.
25. Refers to the human-made surroundings that
A. CRYPTOJACKING
provide the setting for human activity.
B. CYBERSMEARING
C. CRYPTORANSOMWARE A. BUILT ENVIRONMENT
D. NONE OF THE ABOVE B. NATURAL ENVIRONMENT
C. SOCIAL ENVIRONMENT.
19. The shielding of one's identity to enable individuals
D. ALL OF THE ABOVE
to engage in activities without revealing themselves
and/or their actions to others. 26. Manila's most air polluted district due to open dump
sites and industrial waste.
A. ANONYMITY
B. ANONYMIZERS A. PACO B. BINONDO
C. ANONYMOUS PROXY SERVERS C. TONDO D. ERMITA
D. NONE OF THE ABOVE
27. Means the ecological community considered
20. A tactic whereby the processing power of infected together with non-living factors and its environment as
computers is used to mine cryptocurrency for the a unit.
financial benefit of the person controlling the bot-
infected digital devices. A. ECOLOGY B. SOLAR SYSTEM
C. ECOSYSTEM D. ENVIRONMENT
A. CRYPTOJACKING B. CYBERSMEARING.
C. CRYPTORANSOMWARE. D. NONE OF THE ABOVE
28. Generally refers to the variety and variability of Life A. SPEARPHISHING B. SPYWARE
on Earth, and is represented by the number of different C. STALKERWARE D. SWAPPERS
species there are on the planet.
36. Pretending to be higher level executives in a
A. BIODIVERSITY B. BIODIVERSIFICATION company, lawyers, accountants, and others in positions
C. BIOECONOMY D. NONE OF THE ABOVE of authority and trust, in order to trick employees into
sending them funds.
29. False or misleading promises of love and
companionship designed to scam individuals out of A. VIRUS B. WORM
their time, money and/or other items. C. WHALING D. WEB CRAWLERS
48. The part of the World Wide Web that is not indexed 56. Refers to the instruction, communication with,
by search engines and is not easily accessible and/or storing data in, retrieving data from, or otherwise
available to the public. making use of any resources of a computer system or
communication network.
A. DEEP WEB B. ILLICIT WEB
C. UNDERGROUND WEB D. DARK WEB A. ACCESS B. ACCESS CONTROLS
C. ILLEGAL ACCESS D. NONE OF THE ABOVE
49. A cybercrime that would not be possible without the
Internet and digital technologies. 57. The first use of computer.
63. Those gases that can potentially or can reasonably 70. Stand-alone malicious software that spreads
be expected to induce global warming, which includes without the need for user activity.
carbon dioxide, methane, oxides of nitrogen,
A. VIRUSQ B. WORM
chorofluorocarbons, and the like.
C. WHALING D. WEB CRAWLERS.
A. GREEN GASES B. GREENHOUSE GASES
71. Environment is derived from
C. HOUSE GASES D. HOUSE GREEN GASES
A. ENVIRON B. ENVIRONNER
64. Fishing method that requires diving and other
C. ENVIRNER D. ENVIRONR
physical or mechanical acts to pound the coral reefs and
other habitat to entrap, gather or catch fish and other 72. In 1820 he launched the mechanical calculator
fishery species. industry when he released his simplified arithmometer,
which was the first calculating machine strong enough
A. SCUBA DIVING B. MURO-AMI
and reliable enough to be used daily in an office
C. MURO-SITA D. MURO-KANA
environment.
65. A term used to describe a continuing criminal
A. WILHELM SCHICKARD
enterprise that rationally works to profit from illicit
B. BLAISE PASCAL AND GOFFRIED LIEBNITS
activities that are in demand online.
C. GOTTFRIED LEIBNIZ
A. CYBER-DEPENDENT CRIME D. THOMAS DE COLMAR
B. CYBER-ENABLED CRIMES
73
C. CYBER ORGANIZED CRIME
D. CYBER ORGANIZED CRIMINALS 74
75
76. The creation of a fake, duplicate website that is 84.
designed to trick users to input their login credentials.
85.
A. Pharming B. Phishing
86. The use of information and communication
C. Hacking D. Cracking
technology to intentionally humiliate, annoy, attack,
77. Sending of unsolicited emails. threaten, alarm, offend and/or verbally abuse an
individual.
A. Sextortion B. Smishing
C. Sexting D. Spam A. Cyberbullying B. Cyberharassment
C. Cyberstalking D. Cyberterrorism
78. Applications designed to traverse the World Wide
Web to achieve specific objectives. 87. The sending of an email to targets with a website
link for users to click on, which might either download
A. Virus B. Worm
malware onto the users' digital devices or sends users
C. Whaling D. Web crawlers.
to a malicious website that is designed to steal users'
79. Refers to any method which can be used to gather credentials.
information about an object without coming in contact
A. Pharming B. Phishing
with it?
C. Hacking D. Cracking
A. Database B. remote sensing
C. WWW D. GIS
88. Malware designed to surreptitiously monitor
80. The use of information and communication
infected systems, and collect and relay information back
technology to commit a series of acts over a period of
to creator and/or user of the spyware.
time designed to harass, annoy, attack, threaten,
frighten, and/or verbally abuse an individual. A. Spearphishing B. Spyware
C. Stalkerware D. Swappers
A. Cyberbullying B. Cyberharassment
C. Cyberstalking D. Cyberterrorism 89. The first important legislation that formed the basis
of the current system of national parks and protected
81. Refers to a computer or a computer network, the
areas in the Philippines.
electronic medium in which online communication
takes place. A. Philippine Commission Act No.468
B. Philippine Commission Act No.648
A. Cyber B. website
C. Philippine Commission Act No. 864
C. internet D. electronics
D. None of the above.
82. The cyber-dependent crimes perpetrated against
90. Tools and techniques used to obfuscate cybercrime
critical infrastructure to cause some form of harm and
investigation and digital forensics efforts.
to provoke fear in the target population.
A. Anti- forensics
A. Cyberbullying B. Cyberharassment
B. Anti-digital forensics
C. Cyberstalking D. Cyberterrorism
C. Antimalware or Antivirus
83. The prohibition of information, visual depictions, D. Both a and b
and written or oral communications that are prohibited
91. Controller of bot-infected digital devices.
by law and/or their suppression by a government,
community or group because they are unlawful and/or A. Back-tracing
viewed as harmful, unpopular, undesirable, or politically B. Botcode
incorrect. C. Botherder
D. Brute force attack
A. Catphishing B. Censorship
C. Botherder D. Buffer
92. Offences committed against computer data,
computer data storage media, computer systems,
service providers.
A. Environmental crimes.
B. Environmental Law System
C. Environmental law
D. All of the above
94.
95.
96.
A. 1960
B. 1993
C. 2011
D. None of the above
A. Water contamination
B. Water degradation
C. Water pollution
D. None of the above
99.
100.