- 1. Criminal activities carried out by means of computers or the internet, that either targets or uses a computer, a computer network or a networked device?
A) Computer Fraud B) Computer Crime C) Cybercrime D) All of the above E) Identity Theft
- 2. - Characteristics of Cybercrime -
The account user may unknowingly enter sensitive or personal information to an unsecured or malicious forms or website. Cybercriminals send fake emails, texts, or social media messages that appear to come from a legitimate source?
A) All of the above B) Anonimity C) Portability D) Accessibility E) Global Reach
- 3. - Characteristics of Cybercrime -
Cybercrime is a global problem that affects businesses and individuals, the use of computers and digital devices to commit a wide range of illegal activities?
A) Anonimity B) Portability C) Global Reach D) All of the above E) Accessibility
- 4. - Characteristics of Cybercrime -
Is a tool that cybercriminals use to hide their identity and actions, making it harder to investigate crimes. Anonymity can be achieved through software, fake identities, and other techniques.
A) All of the above B) Portability C) Global Reach D) Accessibility E) Anonymity
- 5. - Characteristics of Cybercrime -
When data is shared between systems, it becomes more vulnerable to unauthorized access. Cybercriminals can intercept data as it's transferred between systems?
A) Global Reach B) All of the above C) Anonymity D) Portability E) Accessibility
- 6. In 1971 Bob Thomas created the first virus that maliciously replicating program of a computer system?
A) Trojan B) Malware C) Both a & b D) Creeper virus E) Worm virus
- 7. The first cyber-attack was in France, when attackers stole information from the telegraph system. Question what year is the said attacked?
A) 1834 B) 1832 C) 1483 D) 1843 E) None of the above
- 8. Who is the personality in early cybercrime that stole password from MIT computer using punch card?
A) Bob Thomas B) None of the above C) Allen Scherr D) Rene Carmille E) Elon Musk
- 9. Philippine Cybercrime Prevention Act of 2012
A) RA 10175 B) RA 11701 C) RA 17011 D) RA 11057 E) RA 10591
- 10. A machine that can store and process information. capable storing data, calculating algorithms, and displaying information
A) Electronic gadget B) None of the above C) Laptop D) Computer E) Windows hardware
- 11. Briefly discuss the three elements cyber libel (5 Points)
|