SOCPRO REVIEWER MIDTERM: LAWFULLY RIGHT EDITION
  • 1. What year was the GDPR enacted?
A) 2020
B) 2018
C) 2000
D) 2012
  • 2. In the Philippines the Data Privacy Act is also known as RA _____.
A) 10175
B) 10173
C) 9995
D) 8792
  • 3. IT and CS professionals act as _____ of data.
A) Data Stewards
B) Data Brokers
C) Data Owners
D) Data Scientists
  • 4. Which GDPR right allows users to have their data deleted?
A) Right to Erasure
B) Right to Rectification
C) Right to Access
D) Right to Object
  • 5. The maximum GDPR fine is up to _____% of global turnover.
A) 2
B) 20
C) 10
D) 4
  • 6. Which law protects personal information in California?
A) GDPR
B) CCPA
C) PIPEDA
D) LGPD
  • 7. PIPEDA is the privacy law of which country?
A) Australia
B) Canada
C) Brazil
D) China
  • 8. LGPD is the data privacy law of which country?
A) Canada
B) Philippines
C) Brazil
D) China
  • 9. China's main data protection law is called _____.
A) GDPR
B) PIPL
C) LGPD
D) CCPA
  • 10. The GDPR principle that only necessary data should be collected is called _____.
A) Data Transparency
B) Data Integrity
C) Data Minimization
D) Data Portability
  • 11. A hacker who works legally and with authorization is called a _____ hat.
A) Black
B) Red
C) Grey
D) White
  • 12. A criminal hacker is also known as a _____ hat.
A) Black
B) White
C) Blue
D) Grey
  • 13. A hacker who may break laws but without malicious intent is called a _____ hat.
A) White
B) Black
C) Grey
D) Yellow
  • 14. Which Philippine agency enforces the Data Privacy Act?
A) PNP-ACG
B) National Privacy Commission
C) NBI
D) DICT
  • 15. The Philippine Cybercrime Prevention Act is also known as RA _____.
A) 10175
B) 8792
C) 9995
D) 10173
  • 16. The Anti-Photo and Video Voyeurism Act is RA _____.
A) 9995
B) 10173
C) 8792
D) 10175
  • 17. The E-Commerce Act of 2000 is RA _____.
A) 8792
B) 10173
C) 10175
D) 9995
  • 18. Under RA 10175 the maximum imprisonment can reach _____ years.
A) 20
B) 12
C) 6
D) 5
  • 19. Under RA 10175 fines can reach up to ₱_____.
A) 500 thousand
B) 100 thousand
C) 10 million
D) 1 million
  • 20. A patent typically lasts for _____ years from the filing date.
A) 70
B) 10
C) 20
D) 50
  • 21. Copyright generally lasts for the life of the author plus _____ years.
A) 50
B) 70
C) 20
D) 100
  • 22. Which IP type protects logos and brand names?
A) Trademark
B) Patent
C) Copyright
D) Trade Secret
  • 23. Which IP type protects confidential business information like formulas?
A) Patent
B) Trademark
C) Copyright
D) Trade Secret
  • 24. Which type of patent protects new ornamental designs?
A) Trade Patent
B) Plant Patent
C) Utility Patent
D) Design Patent
  • 25. Which type of patent is granted for new plant varieties?
A) Plant Patent
B) Design Patent
C) Utility Patent
D) Botanical Patent
  • 26. Which doctrine allows limited use of copyrighted material without permission?
A) Public Domain
B) Fair Use
C) DRM
D) Creative Commons
  • 27. DRM stands for _____.
A) Dynamic Rights Manager
B) Digital Rights Management
C) Data Resource Management
D) Digital Record Monitoring
  • 28. Copying someone's work word-for-word is called _____ plagiarism.
A) Accidental
B) Direct
C) Self
D) Paraphrasing
  • 29. Rewriting someone else's ideas without attribution is _____ plagiarism.
A) Self
B) Direct
C) Accidental
D) Paraphrasing
  • 30. Reusing your own previous work without disclosure is called _____ plagiarism.
A) Accidental
B) Paraphrasing
C) Self
D) Direct
  • 31. Unintentionally failing to credit a source is _____ plagiarism.
A) Direct
B) Self
C) Paraphrasing
D) Accidental
  • 32. Which tool is commonly used to detect plagiarism?
A) Wireshark
B) Turnitin
C) Kali Linux
D) Nmap
  • 33. Which international treaty harmonizes international copyright law?
A) DMCA
B) Berne Convention
C) GDPR
D) Patent Cooperation Treaty
  • 34. Which operating system is popular among ethical hackers?
A) Kali Linux
B) Windows Server
C) Ubuntu Desktop
D) macOS
  • 35. Which tool is used for network scanning?
A) Nmap
B) Turnitin
C) Grammarly
D) Copyscape
  • 36. Which tool is used for packet analysis?
A) Kali Linux
B) Nmap
C) Wireshark
D) Grammarly
  • 37. CEH certification stands for _____.
A) Cybersecurity Ethical Handler
B) Certified Ethical Hacker
C) Certified Expert Hacker
D) Computer Engineering Hacker
  • 38. The COMELEC data breach occurred in _____.
A) 2012
B) 2016
C) 2018
D) 2020
  • 39. Approximately how many Filipino voters were affected by the COMELEC data breach?
A) 1 million
B) 100 million
C) 10 million
D) 55 million
  • 40. Sensitive Personal Information under the Data Privacy Act includes _____.
A) Health and genetic data
B) Browser history
C) IP addresses
D) Email subjects
  • 41. The GDPR principle requiring data to be up-to-date is called _____.
A) Accuracy
B) Integrity
C) Storage Limitation
D) Transparency
  • 42. The principle that data should not be kept longer than necessary is _____.
A) Storage Limitation
B) Accuracy
C) Data Minimization
D) Purpose Limitation
  • 43. Consent that requires active agreement is called _____.
A) Implicit
B) Opt-in
C) Opt-out
D) Pre-selected
  • 44. GDPR mandates which type of consent for sensitive data processing?
A) Opt-out
B) Presumed
C) Opt-in
D) Implicit
  • 45. The right allowing users to transfer data between providers is the Right to _____.
A) Rectification
B) Object
C) Access
D) Data Portability
  • 46. The right to correct inaccurate data is called the Right to _____.
A) Rectification
B) Access
C) Object
D) Erasure
  • 47. The _____ Act legalizes online contracts and signatures in the Philippines.
A) Data Privacy
B) Anti-Voyeurism
C) E-Commerce
D) Cybercrime Prevention
  • 48. Under RA 10173 organizations must appoint a _____.
A) Data Protection Officer
B) Data Risk Analyst
C) Information Security Engineer
D) Chief Privacy Manager
  • 49. Maximum imprisonment under the Philippine Data Privacy Act is _____ years.
A) 3
B) 12
C) 20
D) 6
  • 50. The RA 10173 principle of collecting data only for a valid reason is _____.
A) Legitimate Purpose
B) Integrity
C) Proportionality
D) Transparency
  • 51. The RA 10173 principle that only necessary data should be collected is _____.
A) Proportionality
B) Legitimate Purpose
C) Accuracy
D) Transparency
  • 52. Hacking systems without consent even to report flaws is considered _____ hacking.
A) White Hat
B) Authorized
C) Unethical
D) Ethical
  • 53. Which Philippine group fights cybercrime alongside NBI and DICT?
A) NPC Response Team
B) PNP Anti-Cybercrime Group
C) AFP Cyber Command
D) DOST Cyber Unit
  • 54. The Philippine National Privacy Commission is abbreviated as _____.
A) DICT
B) NPC
C) NBI
D) PNP
  • 55. DICT stands for Department of Information and _____ Technology.
A) Computer
B) Connectivity
C) Cyber
D) Communications
  • 56. Under GDPR fines can reach up to €_____ million.
A) 10
B) 50
C) 5
D) 20
  • 57. Which of these is NOT a GDPR principle?
A) Profit Maximization
B) Accuracy
C) Purpose Limitation
D) Lawfulness
  • 58. A system may be secure but still violate _____.
A) Privacy
B) Portability
C) Compliance
D) Encryption
  • 59. Facial recognition and fingerprints are examples of _____ data.
A) Biometric
B) Behavioral
C) Genetic
D) Financial
  • 60. The unauthorized duplication of digital media is known as _____.
A) Phishing
B) Hacking
C) Plagiarism
D) Piracy
  • 61. DMCA takedown notices are used against _____.
A) Digital Piracy
B) Phishing
C) Data Breaches
D) Identity Theft
  • 62. Which license allows creators to share work with custom permissions?
A) Creative Commons
B) DRM
C) Fair Use
D) DMCA
  • 63. An agreement used to protect confidential business ideas is called an _____.
A) TOS
B) SLA
C) EULA
D) NDA
  • 64. Which Philippine ransomware attack compromised sensitive health records?
A) PhilHealth
B) PhilPost
C) COMELEC
D) LandBank
  • 65. The Bill of Rights of the Philippine Constitution protects the right to _____.
A) Ownership
B) Privacy
C) Hacking
D) Profit
  • 66. Which certification is commonly taken alongside CEH for security roles?
A) CCNA
B) CompTIA Security+
C) MCSE
D) AWS Cloud Practitioner
  • 67. GDPR requires processing that is lawful fair and _____.
A) Transparent
B) Portable
C) Secure
D) Accurate
  • 68. Which IP concept balances creator rights with public access for education and commentary?
A) Trademark
B) Patent
C) DRM
D) Fair Use
  • 69. The Hack4Gov initiative promotes _____ among Filipino youth.
A) Cyber Espionage
B) Ethical Hacking
C) Software Piracy
D) Data Entry
  • 70. Privacy governs how data is collected and used while _____ governs how data is protected.
A) Security
B) Portability
C) Consent
D) Ethics
  • 71. Which international treaty governs patents across countries?
A) Berne Convention
B) DMCA
C) Patent Cooperation Treaty
D) GDPR
  • 72. The right to limit how data is processed in some situations is the Right to _____.
A) Restriction of Processing
B) Portability
C) Access
D) Erasure
  • 73. Under RA 10173 an organization must notify the NPC in the event of a _____.
A) Server Migration
B) Data Breach
C) Software Update
D) Staff Change
  • 74. Which patent type covers new and useful machines or processes?
A) Design Patent
B) Plant Patent
C) Utility Patent
D) Trade Patent
  • 75. A formal request under GDPR for companies to show what data they hold about a user uses the Right to _____.
A) Access
B) Object
C) Portability
D) Rectification
  • 76. A mobile app secretly sells your contact list to advertisers. Which GDPR principle is violated?
A) Integrity
B) Storage Limitation
C) Accuracy
D) Purpose Limitation
  • 77. Maria wants her old social media account permanently deleted. Which right should she invoke?
A) Right to Access
B) Right to Restriction of Processing
C) Right to Rectification
D) Right to Erasure
  • 78. A job form requires your blood type even though it is unrelated to the job. Which principle is violated?
A) Data Minimization
B) Lawfulness
C) Accuracy
D) Integrity
  • 79. A bank finds client records were leaked. Under RA 10173 who must be notified?
A) Only the CEO
B) NPC and affected individuals
C) Nobody if contained
D) Only the police
  • 80. Ana wants to move her bank transaction history to another app. Which right helps her?
A) Right to Access
B) Right to Data Portability
C) Right to Object
D) Right to Erasure
  • 81. A marketer keeps emailing a user who already unsubscribed. Which right is violated?
A) Right to Object
B) Right to Portability
C) Right to Access
D) Right to Rectification
  • 82. A hospital has the wrong blood type on a patient file. Which right should the patient use?
A) Right to Access
B) Right to Object
C) Right to Rectification
D) Right to Erasure
  • 83. A student copies a Wikipedia paragraph word-for-word without citation. This is _____.
A) Paraphrasing Plagiarism
B) Accidental Plagiarism
C) Direct Plagiarism
D) Self-Plagiarism
  • 84. Juan invents a novel rice threshing machine. Which IP protection should he pursue?
A) Trade Secret
B) Utility Patent
C) Copyright
D) Trademark
  • 85. Lisa creates a distinctive logo for her restaurant. Which IP protection should she use?
A) Copyright
B) Trade Secret
C) Trademark
D) Patent
  • 86. A soda company keeps its recipe secret and never registers it. Which IP type protects it?
A) Patent
B) Copyright
C) Trademark
D) Trade Secret
  • 87. An IT professional tests a company network for flaws with written permission. This is _____.
A) Cyberbullying
B) Ethical hacking
C) Black-hat hacking
D) Data theft
  • 88. Someone hacks a bank without permission to steal money. This person is a _____.
A) Grey Hat
B) Black Hat
C) Blue Hat
D) White Hat
  • 89. Someone secretly records a couple and shares the video online. Which Philippine law is violated?
A) RA 10173
B) RA 8792
C) RA 9995 Anti-Voyeurism Act
D) RA 10175
  • 90. A student posts false news about a classmate online. This may be charged under _____.
A) RA 8792
B) RA 10175 online libel
C) Trademark law
D) Patent law
  • 91. A pentester uses Nmap under a signed contract. This activity is _____.
A) Legal ethical hacking
B) Data theft
C) Cyberbullying
D) Illegal hacking
  • 92. A student exploits a school website flaw to change their grades. This is _____.
A) Fair Use
B) Ethical hacking
C) Black-hat hacking
D) Legal research
  • 93. A site shows a long confusing policy with pre-checked consent boxes. Which ethical issue applies?
A) Patent issue
B) Manipulation of informed consent
C) Data encryption issue
D) Portability issue
  • 94. A smart speaker silently records household chats without notice. Which concern is central?
A) Patent
B) Copyright
C) Trademark
D) IoT privacy
  • 95. An AI company trains a model using internet-scraped personal photos. Which issue arises?
A) Trademark dilution
B) Data collection without consent
C) DRM bypass
D) Patent infringement
  • 96. A university posts student grades publicly with full names. Which right is violated?
A) Right to Privacy
B) Object
C) Fair Use
D) Portability
  • 97. A Philippine hospital delays informing patients of a ransomware leak. This violates _____.
A) Fair Use
B) RA 10173 breach notification
C) Copyright
D) DMCA
  • 98. A programmer uses open-source code but removes the author credits. This violates _____.
A) Trade Secrets
B) Patents
C) License terms
D) DMCA
  • 99. An EU citizen sues a Philippine app for mishandling their data. Which law can apply?
A) No law applies
B) GDPR due to extraterritoriality
C) Only PH laws
D) Only US laws
  • 100. A teacher uses short novel excerpts in class for educational critique. This likely falls under _____.
A) Fair Use
B) Patent Infringement
C) Copyright Infringement
D) Direct Plagiarism
Created with That Quiz — where a math practice test is always one click away.