CYBERCRIME
  • 1. In 1971 Bob Thomas created the first virus that maliciously replicating program of a computer system?
A) Trojan
B) both a&b
C) Worm Virus
D) Creeper Virus
E) Malware
  • 2. Characteristics of Cybercrime -
    Is a tool that cybercriminals use to hide their identity and actions, making it harder to investigate crimes. Anonymity can be achieved through software, fake identities, and other techniques.
A) Anonimity
B) Portability
C) All of the Above
D) Global reach
E) Accessibility
  • 3. Characteristics of Cybercrime -
    Cybercrime is a global problem that affects businesses and individuals, the use of computers and digital devices to commit a wide range of illegal activities?
A) Portability
B) Accessibility
C) Anonimity
D) All of the Above
E) Global Reach
  • 4. Characteristics of Cybercrime -
    The account user may unknowingly enter sensitive or personal information to an unsecured or malicious forms or website. Cybercriminals send fake emails, texts, or social media messages that appear to come from a legitimate source?
A) All of the above
B) Anonimity
C) Global Reach
D) Portability
E) Accessibility
  • 5. Philippine Cybercrime Prevention Act of 2012
A) RA 10175
B) RA 11057
C) RA 10591
D) RA 17011
E) RA 11701
  • 6. A machine that can store and process information. capable storing data, calculating algorithms, and displaying information
A) Windows hardware
B) Electronic Gadgets
C) Laptop
D) Computer
E) None of the Above
  • 7. The first cyber-attack was in France, when attackers stole information from the telegraph system. Question what year is the said attacked?
A) 1832
B) 1843
C) 1483
D) None of the Above
E) 1834
  • 8. Who is the personality in early cybercrime that stole password from MIT computer using punch card?
A) Allen Scherr
B) Bob Thomas
C) Elon Musk
D) None of the above
E) Rene Carmille
  • 9. Characteristics of Cybercrime -
    When data is shared between systems, it becomes more vulnerable to unauthorized access.
    Cybercriminals can intercept data as it's transferred between systems?
    Global Reach
    Accessibility
    • Portability
    All of the above
    • Anonymity
A) Portability
B) Anonimity
C) None of the Above
D) Global Reach
E) Accessibility
  • 10. What is the meaning of the word "Vague"?
A) Uncertain or unclear
B) Heart broken
C) Unlawfull or illegal
D) Positive
E) None of these
  • 11. It can hinder effective crime prevention and response, potentially leading to increased crime rates and a strain on existing resources?
A) Jurisdictional Challenges
B) Lack of specialized Units
C) Vague Provision
D) Privacy and Surveillance concern
E) None of the above
  • 12. A concern that arises from the potential for individuals' personal information and activities to be monitored without their knowledge or consent, raising ethical and legal questions about data security and individual autonomy?
A) None of the above
B) Privacy and Surveillance concern
C) Lack of Special Units
D) Jurisdictional Challenges
E) Vague Provision
  • 13. Committed with unfaithfulness or abuse of confidence, by means of false pretenses of fraudulent means.
A) Hacking
B) Digital Forensic
C) Estafa or Swindling
D) None of the above
E) Cyber Warrant
  • 14. Is a restriction or constraint that arises due to the tools, systems, or technology used in a project.
    These limitations can affect performance, quality, or the feasibility of achieving certain goals?
A) All of the above
B) Lack of Special Units
C) Jurisdictional Challenges
D) Vague Provision
E) Technical Limitation
  • 15. The anti-Child Pornography Act of 2009
A) None of the Above
B) RA 5779
C) RA 9775
D) RA 9577
E) RA 7759
  • 16. A person who threatens another with the infliction of harm upon the person, honor, or property of the latter or of his family or any wrong amounting to a crime is prohibited from doing so. In the event that the Threat committed online
A) Sec 8 of RA 10175
B) Sec 6 RA 10175
C) None of the above
D) Sec 9 RA 10175
E) Sec 7 RA 10175
  • 17. It is the public imputation/accusation of a discreditable act or condition to another conveyed with a malice underpinning by means of a computer device or internet technology
A) Cyber libel
B) None of the above
C) Cyber Fraud
D) Cyber
E) Cyber Cyber
  • 18. Criminal activities carried out by means of computers or the internet, that either targets or uses a computer, a computer network or a networked device?
A) Computer Crime
B) Computer Fraud
C) Identity Theft
D) All of the Above
E) Cybercrime
  • 19. The main means of mass communication (broadcasting, publishing, and the Internet), regarded collectively.
A) Media
B) Press
C) Newspaper
D) None of the Above
E) Showbiz Balita
  • 20. Example of Specialized Units: They Investigate and prevent cyber-related crimes like hacking, identity theft, and online fraud.
A) Cyber crime Units
B) Forensic Units
C) Aviation Units
D) Maritime Units
E) None of these
  • 21. Refers to laws or regulations that are overly broad, ambiguous, or unclear, making it difficult for individuals, organizations, or law enforcement to understand what specific online activities are prohibited or regulated?
A) Vague provisions
B) both a&b
C) Technical Limitations
D) Cybercrime
E) All of the above
  • 22. In Privacy and Surveillance Concern: Is the unauthorized access to personal information, such as names, addresses, financial details, or social security numbers, leading to identity theft or other formal of harm
A) Maritesing
B) Data Breaches and Identity Theft
C) None of the above
D) Scamming
E) Phishing
  • 23. The Anti-Photo and Video Voyeurism Act of 2009
A) none of the above
B) RA 9995
C) RA 9165
D) RA 175
E) RA 5999
  • 24. A PNP Unit that is mandated to implement and enforce pertinent laws on cyber related crimes?
A) PNP-CGA
B) PNP-ACG
C) PNP-AGC
D) PNP-PCG
E) PNP-CAG
  • 25. Can be defined as: "Offenses that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim, mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet and through the use of ICT.
A) Crime
B) Felony
C) Cybercrime
D) None of these
E) Cyber
  • 26. Example of Specialized Units: They are the responsible in Collection and analysis of evidence from crime scenes, using specialized equipment and techniques
A) Patroller
B) Desk Officer
C) Jailer
D) Forensic Units
E) Investigator
  • 27. An order to disclosed and accordingly require any person or service provider to disclose or submit subscriber's information.
A) Court order
B) Cybercrime Warrants
C) Warrant of Arrest
D) none of the above
E) Search warrant
  • 28. The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another
A) None of the Above
B) Scamming
C) illegal access
D) Hacking
E) Identity theft
  • 29. Is the dispute over whether a court, tribunal, or regulatory body has the authority to hear a case or enforce laws. These challenges can be based on different factors, such as the type of case, the parties involved, or the location of the dispute?
A) none of the above
B) Technical Limitation
C) Lack of specialized Unit
D) Vague Provision
E) Jurisdictional Challenges
  • 30. On Need for Specialization: Gaining insights into how hackers operate to prevent attacks
A) Digital Forensic
B) None of the above
C) Legal & Policy Frameworks
D) Cybersecurity Fundamentals
E) Ethical Hacking & Penetration Testing
  • 31. On Need for Specialization: Gaining insights into how hackers operate to prevent attacks
A) Cybersecurity Fundamentals
B) Legal & Policy Frameworks
C) none of the above
D) Digital Forensic
E) Ethical Hacking & Penetration Testing
  • 32. On Need for Specialization: Cybercrime is often international, making jurisdiction enforcement difficult, cooperation between global law enforcement agencies.
A) Legal & Policy Frameworks
B) Cross-Border Jurisdiction Issues
C) Cybersecurity Fundamentals
D) Digital Forensic
E) none of the above
  • 33. Refers to involving activities in which people spend time talking each other and or enjoying things together.
A) Social Media
B) Online platform
C) None of the above
D) facebook
E) World wide web
  • 34. On Harm Centric Approach: Organizations using a harm-centric approach are transparent about their practices and are accountable for any harm caused by their technology
A) Transparency and accountability
B) None of the above
C) User centered designed
D) Prioritizing Harm
E) AI
  • 35. On Need for Specialization: Understanding cyber laws and international.
A) Ethical hacking and penetration testing
B) Legal and Policy framework
C) Digital Forensic
D) Cyber security fundamentals
E) None of these
  • 36. On Need for Specialization: Understanding how to collect and analyze electronic evidence.
A) Cybersecurity Fundamentals
B) Legal & Policy Frameworks
C) Digital Forensic
D) Ethical Hacking & Penetration Testing
E) None of the above
  • 37. On Rapid Evolution of Technology: Cybercriminals exploit cutting-edge technologies such as artificial intelligence, encryption, and the dark web to commit crimes while remaining anonymous.
A) Cybersecurity Fundamentals
B) Digital Forensic
C) None of the above
D) Increased Complexity of Cybercrime
E) Legal & Policy Frameworks
  • 38. it is a branch of Computer Science that pursues creating the computers or machines as intelligent as human beings. It is the science and engineering of making intelligent machines, especially intelligent computer programs. (2 pts)
A) Payment Gateway Fraud
B) Deep Fakes and Impersonation
C) Cybercrime
D) Artificial Intelligence
E) None of the above
  • 39. On Types of Fishing Attacks: Scammers use voice calls to trick victims into revealing sensitive information
A) Vishing
B) Smishing
C) Email Phishing
D) None of the above
E) Whaling
  • 40. On Types of Data Breaches: The attackers targeted the vendors, partners, or service providers who have access to a company's data. To exploit a path of least resistance
A) Insider Threat
B) Unintentional Exposure
C) None of the above
D) Physical Theft or Loss
E) Third-Party Breaches
  • 41. On Risk of Using Public Wi-fi: Hackers use tools to eavesdrop on unsecured data transmissions, capturing unencrypted usernames, passwords, and other sensitive information.
A) none of the above
B) Packet Sniffing
C) Malware Distribution •
D) Man-in-the-Middle Attack
E) Evil Twin Attack
  • 42. On Risk of Using Public Wi-fi: Cybercriminals set up fake Wi-Fi networks with similar names to legitimate ones (e.g., "Free Airport Wi-Fi") to trick users into connecting. Once connected, the attacker can monitor and steal your data.
A) Man in the Middle Attacks
B) Malware Distribution
C) Packet Sniffing
D) Evil Twin Attacks
E) none of the above
  • 43. It enables the rapid, large-scale execution of attacks with minimal human intervention. Through Al-powered tools, (2 pts)
A) Deep Fakes and impersonation
B) Automation and Scalability
C) Payment Gateway Fraud
D) Password Cracking
E) none of the above
  • 44. On Harm Centric Approach: It prevents and minimize harm as the primary goal above other considerations like maximizing profit or convenience
A) Transparency and accountability
B) User centered design
C) Prioritizing Harm
D) Proactive Measures
E) none of the above
  • 45. This enables attackers to crack passwords faster than manual methods, significantly increasing the chances of success in breaking into accounts. (2 pts)
A) none of the above
B) Cracking password
C) Password cracking
D) hacking
E) key logger
  • 46. On Harm Centric Approach: It emphasizes taking proactive steps to anticipate and address potential harms before they occur.
A) Proactive Measures
B) both a&b
C) none of the above
D) Transparency and accountability
E) Prioritizing Harm
  • 47. Is the advanced data analysis, cybercriminals can automate processes like identifying vulnerabilities, crafting personalized phishing attacks, and executing social engineering tactics with greater precision. (2 pts)
A) Sophistication and Targeting
B) Transparency and accountability
C) Password Cracking
D) Phishing
E) Phishing
  • 48. On Harm Centric Approach: It requires constant evaluation and adaptation as technology evolves and new risks emerge
A) none of the above
B) Continues Learning and adoptatio
C) Proactive measures
D) Prioritizing harm
E) Transparency and accountability
  • 49. On Types of Data Breaches: Misconfigured databases, weak passwords, or improper disposal of data.
A) none of the above
B) Insider threats
C) Third party breaches
D) Third party breaches
E) Unintentional Exposure
  • 50. Unlike traditional identity theft-where a criminal steals and uses someone's full identity-synthetic identity theft creates a new, fake identity that doesn't directly belong to any real person.
A) both a&b
B) Data breaches
C) Social Engineering
D) none of the above
E) Synthetic Identity Theft
  • 51. On Types of Fishing Attacks: Employees or contractors intentionally or accidentally expose data.
A) Insider threat
B) Phishing
C) Physical Theft Loss
D) Scamming
E) none of the above
  • 52. is a type of online fraud that involves tricking victims into revealing sensitive information such as passwords, credit card numbers, or personal identifiable information
A) Social Engineering
B) Synthetic Identity theft
C) Date breaches
D) none of the above
E) Phishing
  • 53. It is an Al-generated video, image, or audio file that is meant to deceive people commonly appear on the internet for no other purpose than to entertain and confuse. However, they can also be used more maliciously as part of disinformation campaigns,
    "fake news," smear campaigns of high-profile individuals, or cyberattacks. (2 pts
A) none of the above
B) Payment Gateway Fraud
C) Password Cracking
D) Deep Fakes and Impersonation
E) Global Reach
  • 54. On Types of Phishing; Scammers target specific individuals or groups with tailored emails that appear to be from a trusted source.
A) Email Phishing
B) Spear Phishing
C) none of the above
D) Man-in-the-Middle Attack
E) Evil Twin Attack
  • 55. On Harm Centric Approach: Designing technology with a strong focus on user safety and well-being is crucial. This includes considering vulnerable groups and mitigating potential risks
A) Proactive measures
B) none of the above
C) User-Centered Design
D) Prioritizing Harm
E) Transparency and accountability
  • 56. Unlike traditional identity theft-where a criminal steals and uses someone's full identity-synthetic identity theft creates a new, fake identity that doesn't directly belong to any real person.
A) Synthetic Identity Theft
B) Social Engineering
C) both a&b
D) Data Breaches
E) None of the above
  • 57. Refers to the psychological manipulation of individuals into divulging confidential or personal information that can be used for malicious purposes. Rather than relying on technical vulnerabilities, social engineering exploits human behavior, trust, and emotions to gain unauthorized access to systems, data, or physical locations.
A) Third party breaches
B) Insider Threat
C) Third party breaches
D) none of the above
E) Social Engineering
Created with That Quiz — a math test site for students of all grade levels.