- 1. Sending numerous emails to the victim which shall result to a system or server crash/faifure is known as Email Bombing
A) True B) False C) Maybe
- 2. Shawarma attack is prevalent in the financial institutions or intended for the purpose of financial crimes
A) False B) True C) Maybe
- 3. Hacking includes information stored in computer hard disks, removable storage media etc. Theft may be by appropriating the data physically or by tampering through a virtual medium
A) True B) Maybe C) False
- 4. Who is the Father of Computer
A) Charles Bobbage B) Charles Xavier C) King Charles III D) Charles Darwin
- 5. Form that a computer may be used for Illegal Activities
A) Sale of Illegal Articles B) Rerckless Imprudence C) Homicide D) Robbery
- 6. The first person ever to be convicted for committing a cybercrime. He is also known as Captain Zap
A) Adrian Farley B) Jan Murphy C) lan Tayao D) Allen Scherr
- 7. He created the first computer virus also known as the Creeper Virus
A) Charles Bobbage B) Duke Tomas C) Bob Thomas D) Tim Thomas
- 8. These countries are known as the top scamming countries in the world
A) None of These B) United Kingdom, United States, Malaysia C) Canada, Mexico, Greenland D) India, Nigeria, Philippines
- 9. This evolution in Cybercrime is best understood through the lens of changing..____. (TTPs)
A) Technical, Tacticality, Procedural B) Timebound, Testing, Procedural C) Timeliness, Technicality and Profitability D) Technics, Tactics and Procedures
- 10. He launched a cyber-attack against the MIT computer networks, stealing passwords from their database via punch card.
A) Allen L Scherr B) Alan Sanders C) Bill Gates D) None of these
- 11. Altering raw data just before a computer processes it and changing it back after the process has been completed.
A) Data Didding B) Theft of Information Contained in Electronic Form C) Salami Attack D) E-mail Bombing
- 12. What year did the First Cyber Attack happen in France?
A) 1734 B) 1834 C) None of these D) 1934
- 13. The offense normally referred as "Hacking" in a generic sense.
A) Hacking B) Theft of Information Contained in Electronic Form C) E-mail Bombing D) Data Didding
- 14. Theft of sensitive customer data, leading to identity theft, financial fraud, and regulatory fines
A) Data Breach B) Ransomware Attacks C) Malware Infections D) Phishing Scams
- 15. The Cybercrime Industry is worth
A) P1.5 Million B) 1.5 Billion C) P1.5 Trillion D) 1.5 Trillion
- 16. The CIA Triad refers to:
A) Integrity B) Confidentiality C) Availability D) All of these
- 17. This is the National Support Unit (NSU) of the Philippine National Police (PNP) that handles Cybercrime related incidents and reports.
A) PNP Criminal Investigation and Detection Group B) PNP Anti-Cybercrime Group C) Puerto Princesa City Police Office D) PNP Maritime Group
|