- 1. A type of hacker that fall somewhere between white hat hackers and black hat hackers.
A) White hat hacker B) any of these C) Black hat hacker D) Gray hat hacker
- 2. Sato was hired by the City Mayor of Palawan to fixed the anomalies inside the cybergroup of his administration. Sato has been good and fixed easily the problem but little they didn't know she was did another thing there while fixing just to get more income as hacker. What kind of motives that Sato has?
A) White hacker B) Gray hat hacker C) Greed D) Revenge
- 3. What piece of software that runs user applications and provides interface to the hardware?
A) Operator B) Application Software C) Boot sequence instructions D) Operating Systems
- 4. What is the virtual computer world which is used to form a global computer networks to facilitate online communication
A) Cyberspace B) Cyber criminal C) Cybersecurity D) Cybercrime
- 5. All cybercrime are committed in the virtual world or space.
A) FALSE B) PARTIALLY FALSE C) PARTIALLY TRUE D) TRUE
- 6. A type of email that you did not request and do not want to receive from unknown individuals or organizations not in your mailing list
A) spoofing B) spam C) none of these D) phishing
- 7. It is the use of electronic messaging systems like e-mails and other digital delivery systems and broadcast media to send unwanted bulk messages indiscriminately.
A) Loading B) Attacking C) Spamming D) Hacking
- 8. is a part of the deep web. It is specifically designed to be anonymous and inaccessible through normal means.
A) surface web B) any of these C) deep web D) dark web
- 9. This occurs when defamation takes place with the help of computers and/or the Internet. E.g. someone publishes defamatory matter about another on a website.
A) Cyber Defamation B) Cyber Pornography C) Cyber Sex D) Cyber Staking
- 10. This kind of crime is normally prevalent in the financial institutions or for the purpose of committing financial crimes. An important feature of this type of offense is that alteration is so small that it would normally unnoticed.
A) Salami Attack B) Theft of Information Contained in Electronic Form C) Hacking D) Logic bomb
- 11. It refers to the market that are used to buy and sell recreational drugs online.
A) Night Market B) Dark web C) Warehouse D) Public market
- 12. What did the ?I LOVE YOU? virus demonstrate about computer-related crimes?
A) It revealed the vulnerability of government institutions. B) There is a need for international cybersecurity treaties. C) The importance of firewalls and antivirus software. D) There is a potential for remote attacks causing widespread damage
- 13. It is an activity done using computers and internet.
A) Cyberacts B) Cybersecurity C) Cybercrime D) Cybergroup
- 14. Hacking designed to cause terror.
A) Cyber libel B) Cyber Terrosim C) Cyber pornography D) Cyber defamation
- 15. Gina, a bank employee inserts a program, into the bank's servers, that deducts a small amount of from the account of every customer. This unauthorized debt is likely to go unnoticed by an accountholder.
Gina's act refers to what types of cybercrime?
A) Virus B) Worm C) Salami attack D) DOS attack
- 16. It is is when a perpetrator singles out a specific person and causes the person emotional distress and causes the individual to fear for his or her life, safety, or safety of others.
A) Hacking B) Wanting C) Talking D) Stalking
- 17. How did the I LOVE YOU virus spread?
A) By erasing system files B) By encrypting the computer?s hard drive C) Through encrypted emails D) By replicating and sending itself to email contacts
- 18. A hacking technique where the attacker can buy advertising spaces on the websites and when a user clicks on the ad, he might get directed to a page that's infected with malware.
A) Clickjacking B) Bait and Switch C) Cookie theft D) virus
- 19. What is the act of stealing creative expressions, patents, or trademarks from individuals or companies?
A) Identity-based attack B) Hacking C) Phishing D) Intellectual property theft
- 20. It refers to a content may be offensive in a nonspecific way, harassment directs obscenities and derogatory comments at specific individuals focusing for example on gender, race, religion, nationality, sexual orientation.
A) Online Stalking B) Cyeber stalking C) Online Harassment D) Online Degrading
A) Computer Programming B) The use of the Internet or other electronic means to stalk or harass an individual, group, or organization C) Professional Technician D) The valuable skills for computer programmers and technicians.
- 22. It is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
A) Cyberstalking B) Scamming C) Spoofing D) Phishing
- 23. It refers to protecting the government and corporate networks, seeking to make it difficult for hackers to find and exploit vulnerabilities.
A) Cyberspace B) Cybersecurity C) Cybercrime D) Cyberacts
- 24. An utilizes hacking to cause violence against persons or property, or at least cause enough harm to generate fear.
A) Salami attack B) Cyber defamation C) Cyber terrorism D) Cyber Attack
- 25. Which offense is characterized by causing annoyance or irritation without falling under specific criminal offenses?
A) Unjust vexation B) Cyber libel C) Cyber threats D) Photo and video voyeurism
- 26. These attacks are often used in committing financial crime and are based on the idea that an alteration, so insignificant, would go completely unnoticed in a single case
A) Salami attack B) Email bombing C) Email spoofing D) Trojan attack
- 27. It is also known as Hacking. Involves gaining access illegally to a computer system or network and in some cases making unauthorized use of this access.
A) Spoofing B) Identity theft C) IP address D) Unauthorized Access
- 28. What is encompassed by data interference?
A) Unauthorized alteration of computer data B) All of the above C) Introduction of computer viruses D) Intentional deletion of electronic documents
- 29. Sato was hired by the City Mayor of Palawan to fixed the anomalies inside the cybergroup of his administration. Sato has been good and fixed easily the problem but little they didn't know she was did another thing there while fixing just to get more income as hacker. What kind of hacker is she?
A) Gray hat hacker B) Black hat hacker C) White hat hacker D) Anomalies hacker
- 30. Those are the responsible for the provision of services relating to a computer system.
A) PLDT B) Compuer network C) Service Provider D) Traffic data
- 31. It is also known as identity fraud, is a crime in which an imposter obtain key pieces of personally identifiable information, such as Social Security or driver's license numbers, in order to impersonate someone else.
A) Bank fraud B) Carding C) Identity theft D) Extortion
- 32. The is part of the internet that is accessible through search engines like google.
A) dark net web B) dark web C) surface web D) deep web
- 33. Some internet criminals threaten to or actually flood an internet site with millions of bogus messages and/or orders so that site services will be tied up and unable to perform as promised.
A) Illegal Copyright Infringement B) Denial of Service attack C) Distributing Illegal Infringement D) Internet Securities Fraud
- 34. A type of scam in which criminals attempt to obtain someone's personal information by pretending to be a legitimate business, neighbor or some other innocent party.
A) Pharming B) Scamming C) Phishing D) Spoofing
- 35. A hacker who also known as ethical hackers, strive to operate in the public's best interest, rather than to create turmoil.
A) Gray hat hacker B) Black hat hacker C) White hat hacker D) any of these
|