ICYBER PADZ4
  • 1. A type of hacker that fall somewhere between white hat hackers and black hat hackers.
A) Gray hat hacker
B) Black hat hacker
C) White hat hacker
D) any of these
  • 2. Sato was hired by the City Mayor of Palawan to fixed the anomalies inside the cybergroup of his administration. Sato has been good and fixed easily the problem but little they didn't know she was did another thing there while fixing just to get more income as hacker. What kind of motives that Sato has?
A) White hacker
B) Gray hat hacker
C) Revenge
D) Greed
  • 3. What piece of software that runs user applications and provides interface to the hardware?
A) Boot sequence instructions
B) Operator
C) Application Software
D) Operating Systems
  • 4. What is the virtual computer world which is used to form a global computer networks to facilitate online communication
A) Cyber criminal
B) Cybersecurity
C) Cyberspace
D) Cybercrime
  • 5. All cybercrime are committed in the virtual world or space.
A) TRUE
B) PARTIALLY FALSE
C) FALSE
D) PARTIALLY TRUE
  • 6. A type of email that you did not request and do not want to receive from unknown individuals or organizations not in your mailing list
A) phishing
B) none of these
C) spoofing
D) spam
  • 7. It is the use of electronic messaging systems like e-mails and other digital delivery systems and broadcast media to send unwanted bulk messages indiscriminately.
A) Spamming
B) Attacking
C) Hacking
D) Loading
  • 8. is a part of the deep web. It is specifically designed to be anonymous and inaccessible through normal means.
A) surface web
B) deep web
C) dark web
D) any of these
  • 9. This occurs when defamation takes place with the help of computers and/or the Internet. E.g. someone publishes defamatory matter about another on a website.
A) Cyber Defamation
B) Cyber Pornography
C) Cyber Sex
D) Cyber Staking
  • 10. This kind of crime is normally prevalent in the financial institutions or for the purpose of committing financial crimes. An important feature of this type of offense is that alteration is so small that it would normally unnoticed.
A) Hacking
B) Theft of Information Contained in Electronic Form
C) Salami Attack
D) Logic bomb
  • 11. It refers to the market that are used to buy and sell recreational drugs online.
A) Dark web
B) Public market
C) Night Market
D) Warehouse
  • 12. What did the ?I LOVE YOU? virus demonstrate about computer-related crimes?
A) It revealed the vulnerability of government institutions.
B) The importance of firewalls and antivirus software.
C) There is a potential for remote attacks causing widespread damage
D) There is a need for international cybersecurity treaties.
  • 13. It is an activity done using computers and internet.
A) Cyberacts
B) Cybercrime
C) Cybergroup
D) Cybersecurity
  • 14. Hacking designed to cause terror.
A) Cyber defamation
B) Cyber pornography
C) Cyber ​​Terrosim
D) Cyber libel
  • 15. Gina, a bank employee inserts a program, into the bank's servers, that deducts a small amount of from the account of every customer. This unauthorized debt is likely to go unnoticed by an accountholder.

    Gina's act refers to what types of cybercrime?
A) Worm
B) Salami attack
C) DOS attack
D) Virus
  • 16. It is is when a perpetrator singles out a specific person and causes the person emotional distress and causes the individual to fear for his or her life, safety, or safety of others.
A) Stalking
B) Hacking
C) Talking
D) Wanting
  • 17. How did the I LOVE YOU virus spread?
A) By erasing system files
B) By replicating and sending itself to email contacts
C) By encrypting the computer?s hard drive
D) Through encrypted emails
  • 18. A hacking technique where the attacker can buy advertising spaces on the websites and when a user clicks on the ad, he might get directed to a page that's infected with malware.
A) Clickjacking
B) virus
C) Cookie theft
D) Bait and Switch
  • 19. What is the act of stealing creative expressions, patents, or trademarks from individuals or companies?
A) Phishing
B) Hacking
C) Identity-based attack
D) Intellectual property theft
  • 20. It refers to a content may be offensive in a nonspecific way, harassment directs obscenities and derogatory comments at specific individuals focusing for example on gender, race, religion, nationality, sexual orientation.
A) Cyeber stalking
B) Online Harassment
C) Online Degrading
D) Online Stalking
  • 21. Who is hacker?
A) The use of the Internet or other electronic means to stalk or harass an individual, group, or organization
B) Professional Technician
C) Computer Programming
D) The valuable skills for computer programmers and technicians.
  • 22. It is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
A) Cyberstalking
B) Scamming
C) Phishing
D) Spoofing
  • 23. It refers to protecting the government and corporate networks, seeking to make it difficult for hackers to find and exploit vulnerabilities.
A) Cyberspace
B) Cybersecurity
C) Cyberacts
D) Cybercrime
  • 24. An utilizes hacking to cause violence against persons or property, or at least cause enough harm to generate fear.
A) Cyber defamation
B) Cyber terrorism
C) Cyber Attack
D) Salami attack
  • 25. Which offense is characterized by causing annoyance or irritation without falling under specific criminal offenses?
A) Cyber threats
B) Unjust vexation
C) Cyber libel
D) Photo and video voyeurism
  • 26. These attacks are often used in committing financial crime and are based on the idea that an alteration, so insignificant, would go completely unnoticed in a single case
A) Salami attack
B) Email bombing
C) Trojan attack
D) Email spoofing
  • 27. It is also known as Hacking. Involves gaining access illegally to a computer system or network and in some cases making unauthorized use of this access.
A) Spoofing
B) IP address
C) Unauthorized Access
D) Identity theft
  • 28. What is encompassed by data interference?
A) Intentional deletion of electronic documents
B) All of the above
C) Unauthorized alteration of computer data
D) Introduction of computer viruses
  • 29. Sato was hired by the City Mayor of Palawan to fixed the anomalies inside the cybergroup of his administration. Sato has been good and fixed easily the problem but little they didn't know she was did another thing there while fixing just to get more income as hacker. What kind of hacker is she?
A) Anomalies hacker
B) Black hat hacker
C) White hat hacker
D) Gray hat hacker
  • 30. Those are the responsible for the provision of services relating to a computer system.
A) Service Provider
B) PLDT
C) Traffic data
D) Compuer network
  • 31. It is also known as identity fraud, is a crime in which an imposter obtain key pieces of personally identifiable information, such as Social Security or driver's license numbers, in order to impersonate someone else.
A) Extortion
B) Carding
C) Identity theft
D) Bank fraud
  • 32. The is part of the internet that is accessible through search engines like google.
A) dark web
B) dark net web
C) deep web
D) surface web
  • 33. Some internet criminals threaten to or actually flood an internet site with millions of bogus messages and/or orders so that site services will be tied up and unable to perform as promised.
A) Denial of Service attack
B) Illegal Copyright Infringement
C) Distributing Illegal Infringement
D) Internet Securities Fraud
  • 34. A type of scam in which criminals attempt to obtain someone's personal information by pretending to be a legitimate business, neighbor or some other innocent party.
A) Scamming
B) Spoofing
C) Pharming
D) Phishing
  • 35. A hacker who also known as ethical hackers, strive to operate in the public's best interest, rather than to create turmoil.
A) White hat hacker
B) Gray hat hacker
C) Black hat hacker
D) any of these
Created with That Quiz — the site for test creation and grading in math and other subjects.