You are on page 1of 6

UM Tagum College

UM Visayan Campus, Tagum City, Davao del Norte


Telefax No.: (084) 655-9607 | Local 135

CS 8 – Social Issues and Professional Practice

Third Examination

General Instructions:

• You are only allowed to commit two (2) erasures for the entire part of the exam.
• Tampering or altering your answers is considered as an erasure.
• Not following instructions would result to score divided by 2 for the specific part of exam
not followed.
• Cheating is strictly not allowed. Anyone caught will be dealt with accordingly.
• Approach your teacher if you have questions.

I. MULTIPLE CHOICE. SHADE THE LETTER of the correct answer. If you think the answer is
not found the choices, WRITE THE CORRECT ANSWER.

1. What is cybercrime? A. Stealing personal information


A. Traditional crime committed with B. Enhancing computer performance
the use of computers C. Promoting online safety
B. Any crime committed using digital D. Improving internet speed
technology
C. Hacking into government databases 5. Which type of phishing involves attackers
D. Only crimes related to software posing as a trustworthy entity to obtain
development sensitive information?
A. Spear phishing
2. What is phishing? B. Vishing
A. A type of malware C. Pharming
B. A method of social engineering D. Whaling
C. Unauthorized access to computer
systems 6. What is smishing?
D. A form of online protest A. Social media phishing
B. SMS phishing
3. What is the primary purpose of a C. Smartphone phishing
phishing email? D. Smarwatch phishing
A. To provide useful information.
B. To spread awareness about 7. What is vishing?
cybersecurity A. Voice-based phishing
C. To deceive recipients into revealing B. Visual phishing
sensitive information C. Video-based phishing
D. To offer free software downloads D. Virtual phishing

4. Which of the following is a common goal 8. What is the primary purpose of smishing
of phishing attacks? attack?
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135

A. Intercepting emails D. An ethical hacking tool


B. Stealing data through social media
C. Manipulating smartphone users 14. How can users enhance their
through text messages cybersecurity in the context of phishing?
D. Spreading malware through A. Use the same password in all of your
smartphone apps accounts
B. Click on every link received in emails
9. Which of the following is a common sign C. Regularly update passwords
of a phishing email? D. Share sensitive information freely
A. Urgency and threats
B. Grammatically perfect sentences 15. What is social engineering in the context
C. Generic greetings of cybercrimes?
D. Clear sender identification A. Manipulating individuals into
divulging confidential information
10. What is whaling in the context of B. A method of securely coding
phishing attack? software
A. Large-scale phishing attacks C. Using encryption algorithms to
B. Attacks on marine-related industries protect data
C. Targeting high-profile individuals or D. A form of artificial intelligence in
executives cybersecurity
D. Attacks on environmental
organizations 16. How can users protect themselves from
phishing attacks on social media platforms?
11. What precautionary measure can help A. Accept all friend requests
prevent falling victim to phishing attacks? B. Share personal information openly
A. Sharing passwords with colleagues C. Verify the authenticity of messages
B. Clicking on links from unknown and links
sources D. Use the same password across all
C. Verifying the legitimacy of emails platforms
before responding
D. Disabling antivirus software 17. What is the purpose of a denial-of-
service (DoS) attack?
12. Which of the following is NOT a method A. To steal sensitive information
of delivering phishing emails? B. To overwhelm a system, making it
A. Email attachments unavailable to users
B. Social media messages C. To spread malware through email
C. Instant messaging attachments
D. Face-to-face communication D. To enhance the performance of a
website
13. What is ransomware?
A. A type of phishing attack 18. Which type of phishing attack involves
B. Malicious software that encrypts fraudulent phone calls to obtain sensitive
files and demands payment for information?
their release A. Smishing
C. A form of social engineering B. Vishing
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135

C. Pharming D. Ignore the website's URL and


D. Whaling proceed with transactions

19. What is a common precautionary 23. What does the term "bug" refer to in
measure to avoid falling victim to software development?
ransomware attacks? A. A feature requested by the customer
A. Opening email attachments from B. An error or flaw in the code
unknown sources C. A document outlining project
B. Regularly updating antivirus requirements
software D. A software design pattern
C. Disabling firewall protection
D. Sharing encryption keys with 24. Which of the following is a common
colleagues practice to prevent phishing attacks in an
organizational setting?
20. What should users do if they suspect A. Share sensitive information freely
they have fallen victim to a phishing attack? within the organization
A. Keep it to themselves to avoid B. Disable all security features to
embarrassment streamline communication
B. Share the incident on social media C. Use generic, easily guessable
for awareness passwords for all accounts
C. Change passwords and monitor D. Conduct regular security awareness
accounts for suspicious activity training for employees
D. Respond to further phishing
attempts to gather evidence 25. What should users be cautious about
when receiving unexpected emails urging
21. What is the significance of regularly immediate action, such as verifying account
updating software and operating systems in information or resetting passwords?
preventing phishing attacks? A. Take immediate action without
A. It slows down computer question
performance B. Verify the email's legitimacy by
B. It increases vulnerability to attacks clicking on provided links
C. It patches security vulnerabilities C. Contact the company directly using
and enhances protection official contact information input
D. It has no impact on cybersecurity D. Share the email on social media for
community
22. How can users identify a secure website
and reduce the risk of falling victim to 26. Why is it crucial for organizations to
phishing on fake websites? implement a strong incident response plan
A. Look for a padlock icon in the to combat phishing attacks?
address bar and use "https" in the A. To ignore phishing attempts and
URL discourage attackers
B. Trust websites with flashy B. To alert employees about the latest
animations and pop-ups phishing techniques.
C. Share personal information without C. To efficiently respond and mitigate
checking the site's security features the impact of a successful attack
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135

D. To share sensitive information with D. Respond to urgent requests for


external entities information immediately

27. How can users strengthen their 31. What is angler phishing?
password security to prevent falling victim A. A type of fishing for aquatic animals
to phishing attacks? B. A phishing attack targeting anglers
A. Use the same password for multiple and fishermen
accounts C. A deceptive technique that uses fake
B. Use easily guessable passwords like customer support handles on social
"password123" media
C. Enable multi-factor authentication D. A phishing attack that leverages
(MFA) comments on social media to
D. Share passwords with trusted distribute malicious content
friends
32. How do attackers often disguise their
28. In smishing attacks, what is a common malicious links in angler phishing attacks?
characteristic of malicious text messages? A. By using shortened URLs
A. Grammatically perfect sentences B. By using long and descriptive URLS
B. Urgent requests for information C. By embedding the links in images
C. Clear sender identification D. By avoiding the use of links
D. Neutral and non-emotional language altogether

29. What precautionary measure can help 33. How can users recognize potential
individuals avoid falling victim to smishing angler phishing attacks on social media?
attacks? A. By ignoring all comments on social
A. Open all text messages and click on media
links without verification B. By clicking on all shared links for
B. Share personal information freely verification
through text messages C. By checking the authenticity of
C. Verify the legitimacy of text profiles and scrutinizing links in
messages and avoid clicking on comments
suspicious links D. By responding to all comments to
D. Respond to urgent requests for establish communication
information immediately
34. In angler phishing, what is the danger of
30. What precautionary measure can help clicking on malicious links in comments or
individuals avoid falling victim to vishing replies?
attacks? A. A. It improves online security
A. Avoid answering phone calls from B. It can lead to the installation of
unknown numbers malware or the theft of sensitive
B. Share personal information over the information
phone freely C. It enhances social media
C. Trust all incoming calls without engagement
verification D. It supports legitimate businesses
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135

35. What is a potential consequence for B. It enhances social media


individuals who fall victim to angler phishing engagement
attacks? C. It supports legitimate businesses
A. Increased social media followers D. It can lead to the installation of
B. Enhanced cybersecurity awareness malware or the theft of sensitive
C. Compromised accounts and information
potential identity theft
D. Improved online reputation 40. Why do attackers favor social media
platforms for angler phishing?
36. What is the primary cybersecurity law in A. Social media has strong security
the Philippines that aims to prevent and measures
address cybercrime? B. Social media users are less likely to
A. Data Privacy Act of 2012 click on links
B. Cybersecurity Act of 2012 C. Social media allows for easy
C. Republic Act No. 10175 distribution and engagement
D. Electronic Commerce Act of 2000 D. Social media bans phishing content
41. What does the term "debugging" mean
37. What is the significance of the Anti- in software development?
Cybercrime Group (ACG) in the Philippines? A. Removing features from the
A. It is responsible for investigating software
and combating cybercrime B. Testing the software with real-world
B. It focuses on preventing physical data
crimes only C. Fixing errors or defects in the code
C. It promotes cybersecurity awareness D. Documenting the software
through educational programs requirements
D. It manages the country's internet
infrastructure 42. What is the purpose of a software
warranty?
38. What is the primary focus of the Data A. To guarantee that the software will
Privacy Act of 2012 in the Philippines? never have any bugs
A. Protecting individuals from cyber B. To provide financial compensation if
threats the software fails
B. Regulating the use of electronic C. To ensure that the software meets
signatures specific quality standards
C. Safeguarding the privacy of D. To protect the software from
personal information collected and unauthorized use
processed by the government and
private sector 43. What is a software failure?
D. Enforcing strict internet censorship A. A planned outcome of the software
development process
39. In angler phishing, what is the danger of B. An unexpected behavior or defect
clicking on malicious links in comments or in the software that prevents it
replies? from functioning as intended
A. It improves online security C. A feature enhancement requested
by users
UM Tagum College
UM Visayan Campus, Tagum City, Davao del Norte
Telefax No.: (084) 655-9607 | Local 135

D. A documented requirement of the B. To minimize the financial impact on


software the developer due to defects
C. To enhance customer satisfaction
44. What is the term for a software failure and confidence in the software
that results in a violation of the software's product
security policy? D. To shift the blame for failures onto
A. Security breach the customer
B. Privacy infringement
C. Vulnerability exploit 49. Which of the following is NOT a
D. Authentication failure common cause of software failure?
A. Incorrect user input
45. Which of the following is NOT a B. Hardware failure
consequence of software failure? C. Inadequate testing
A. Financial loss D. Well-documented code
B. Loss of user trust
C. Increased productivity 50. What is the primary goal of software
D. Reputation damage development?
A. Maximizing project cost
46. What is software warranty? B. Minimizing project duration
A. A guarantee that the software will C. Meeting customer requirements
never fail D. Reducing project scop
B. A legal agreement between the
software developer and the user
C. A promise that the software will
meet specific quality standards for a
specified period
D. An insurance policy covering
damages caused by software failures

47. What is software development?


A. The process of designing hardware
components for computers
B. The process of marketing and selling
software products
C. The process of maintaining and
updating existing software systems
D. The process of designing,
specifying, documenting, testing,
and framework of computer coded
programming

48. What is the primary goal of addressing


software failures through warranty?
A. To absolve the developer of any
responsibility for software defects

You might also like