- 1. Criminal activities carried out by means of computers or the internet, that either targets or uses a computer, a computer network or a networked device?
A) All of the above B) Computer Crime C) Identity Theft D) Cybercrime E) Computer Fraud
- 2. - Characteristics of Cybercrime -
The account user may unknowingly enter sensitive or personal information to an unsecured or malicious forms or website. Cybercriminals send fake emails, texts, or social media messages that appear to come from a legitimate source?
A) Portability B) Anonimity C) All of the above D) Global Reach E) Accessibility
- 3. - Characteristics of Cybercrime -
Cybercrime is a global problem that affects businesses and individuals, the use of computers and digital devices to commit a wide range of illegal activities?
A) Accessibility B) Portability C) All of the above D) Anonimity E) Global Reach
- 4. - Characteristics of Cybercrime -
Is a tool that cybercriminals use to hide their identity and actions, making it harder to investigate crimes. Anonymity can be achieved through software, fake identities, and other techniques.
A) Global Reach B) Anonymity C) Accessibility D) All of the above E) Portability
- 5. - Characteristics of Cybercrime -
When data is shared between systems, it becomes more vulnerable to unauthorized access. Cybercriminals can intercept data as it's transferred between systems?
A) All of the above B) Anonymity C) Global Reach D) Portability E) Accessibility
- 6. In 1971 Bob Thomas created the first virus that maliciously replicating program of a computer system?
A) Creeper virus B) Worm virus C) Malware D) Both a & b E) Trojan
- 7. The first cyber-attack was in France, when attackers stole information from the telegraph system. Question what year is the said attacked?
A) None of the above B) 1834 C) 1483 D) 1843 E) 1832
- 8. Who is the personality in early cybercrime that stole password from MIT computer using punch card?
A) Allen Scherr B) Elon Musk C) None of the above D) Rene Carmille E) Bob Thomas
- 9. Philippine Cybercrime Prevention Act of 2012
A) RA 10591 B) RA 17011 C) RA 11701 D) RA 10175 E) RA 11057
- 10. A machine that can store and process information. capable storing data, calculating algorithms, and displaying information
A) Windows hardware B) Laptop C) None of the above D) Computer E) Electronic gadget
- 11. Briefly discuss the three elements cyber libel (5 Points)
|