ThatQuiz Test Library Take this test now
SOCPRO REVIEWER MIDTERM: LAWFULLY RIGHT EDITION
Contributed by: Fernandez
  • 1. What year was the GDPR enacted?
A) 2018
B) 2000
C) 2020
D) 2012
  • 2. In the Philippines the Data Privacy Act is also known as RA _____.
A) 10173
B) 10175
C) 9995
D) 8792
  • 3. IT and CS professionals act as _____ of data.
A) Data Scientists
B) Data Stewards
C) Data Brokers
D) Data Owners
  • 4. Which GDPR right allows users to have their data deleted?
A) Right to Object
B) Right to Access
C) Right to Erasure
D) Right to Rectification
  • 5. The maximum GDPR fine is up to _____% of global turnover.
A) 20
B) 2
C) 4
D) 10
  • 6. Which law protects personal information in California?
A) LGPD
B) CCPA
C) PIPEDA
D) GDPR
  • 7. PIPEDA is the privacy law of which country?
A) Australia
B) Canada
C) Brazil
D) China
  • 8. LGPD is the data privacy law of which country?
A) Canada
B) China
C) Philippines
D) Brazil
  • 9. China's main data protection law is called _____.
A) LGPD
B) CCPA
C) PIPL
D) GDPR
  • 10. The GDPR principle that only necessary data should be collected is called _____.
A) Data Integrity
B) Data Transparency
C) Data Minimization
D) Data Portability
  • 11. A hacker who works legally and with authorization is called a _____ hat.
A) Red
B) White
C) Black
D) Grey
  • 12. A criminal hacker is also known as a _____ hat.
A) White
B) Blue
C) Grey
D) Black
  • 13. A hacker who may break laws but without malicious intent is called a _____ hat.
A) White
B) Yellow
C) Black
D) Grey
  • 14. Which Philippine agency enforces the Data Privacy Act?
A) NBI
B) National Privacy Commission
C) DICT
D) PNP-ACG
  • 15. The Philippine Cybercrime Prevention Act is also known as RA _____.
A) 8792
B) 10175
C) 10173
D) 9995
  • 16. The Anti-Photo and Video Voyeurism Act is RA _____.
A) 9995
B) 10175
C) 10173
D) 8792
  • 17. The E-Commerce Act of 2000 is RA _____.
A) 10173
B) 10175
C) 8792
D) 9995
  • 18. Under RA 10175 the maximum imprisonment can reach _____ years.
A) 12
B) 6
C) 20
D) 5
  • 19. Under RA 10175 fines can reach up to ₱_____.
A) 100 thousand
B) 1 million
C) 500 thousand
D) 10 million
  • 20. A patent typically lasts for _____ years from the filing date.
A) 50
B) 20
C) 10
D) 70
  • 21. Copyright generally lasts for the life of the author plus _____ years.
A) 100
B) 70
C) 50
D) 20
  • 22. Which IP type protects logos and brand names?
A) Copyright
B) Patent
C) Trade Secret
D) Trademark
  • 23. Which IP type protects confidential business information like formulas?
A) Patent
B) Trade Secret
C) Trademark
D) Copyright
  • 24. Which type of patent protects new ornamental designs?
A) Utility Patent
B) Plant Patent
C) Trade Patent
D) Design Patent
  • 25. Which type of patent is granted for new plant varieties?
A) Botanical Patent
B) Plant Patent
C) Utility Patent
D) Design Patent
  • 26. Which doctrine allows limited use of copyrighted material without permission?
A) Creative Commons
B) Fair Use
C) Public Domain
D) DRM
  • 27. DRM stands for _____.
A) Digital Rights Management
B) Digital Record Monitoring
C) Dynamic Rights Manager
D) Data Resource Management
  • 28. Copying someone's work word-for-word is called _____ plagiarism.
A) Accidental
B) Self
C) Direct
D) Paraphrasing
  • 29. Rewriting someone else's ideas without attribution is _____ plagiarism.
A) Accidental
B) Paraphrasing
C) Self
D) Direct
  • 30. Reusing your own previous work without disclosure is called _____ plagiarism.
A) Paraphrasing
B) Accidental
C) Direct
D) Self
  • 31. Unintentionally failing to credit a source is _____ plagiarism.
A) Direct
B) Accidental
C) Paraphrasing
D) Self
  • 32. Which tool is commonly used to detect plagiarism?
A) Kali Linux
B) Wireshark
C) Turnitin
D) Nmap
  • 33. Which international treaty harmonizes international copyright law?
A) GDPR
B) Patent Cooperation Treaty
C) DMCA
D) Berne Convention
  • 34. Which operating system is popular among ethical hackers?
A) Windows Server
B) macOS
C) Ubuntu Desktop
D) Kali Linux
  • 35. Which tool is used for network scanning?
A) Nmap
B) Turnitin
C) Copyscape
D) Grammarly
  • 36. Which tool is used for packet analysis?
A) Nmap
B) Kali Linux
C) Grammarly
D) Wireshark
  • 37. CEH certification stands for _____.
A) Certified Ethical Hacker
B) Certified Expert Hacker
C) Computer Engineering Hacker
D) Cybersecurity Ethical Handler
  • 38. The COMELEC data breach occurred in _____.
A) 2018
B) 2012
C) 2020
D) 2016
  • 39. Approximately how many Filipino voters were affected by the COMELEC data breach?
A) 100 million
B) 10 million
C) 1 million
D) 55 million
  • 40. Sensitive Personal Information under the Data Privacy Act includes _____.
A) Browser history
B) Email subjects
C) Health and genetic data
D) IP addresses
  • 41. The GDPR principle requiring data to be up-to-date is called _____.
A) Storage Limitation
B) Integrity
C) Transparency
D) Accuracy
  • 42. The principle that data should not be kept longer than necessary is _____.
A) Data Minimization
B) Purpose Limitation
C) Storage Limitation
D) Accuracy
  • 43. Consent that requires active agreement is called _____.
A) Pre-selected
B) Opt-in
C) Implicit
D) Opt-out
  • 44. GDPR mandates which type of consent for sensitive data processing?
A) Opt-out
B) Opt-in
C) Presumed
D) Implicit
  • 45. The right allowing users to transfer data between providers is the Right to _____.
A) Data Portability
B) Object
C) Access
D) Rectification
  • 46. The right to correct inaccurate data is called the Right to _____.
A) Rectification
B) Access
C) Erasure
D) Object
  • 47. The _____ Act legalizes online contracts and signatures in the Philippines.
A) Anti-Voyeurism
B) Cybercrime Prevention
C) E-Commerce
D) Data Privacy
  • 48. Under RA 10173 organizations must appoint a _____.
A) Data Risk Analyst
B) Data Protection Officer
C) Information Security Engineer
D) Chief Privacy Manager
  • 49. Maximum imprisonment under the Philippine Data Privacy Act is _____ years.
A) 12
B) 20
C) 6
D) 3
  • 50. The RA 10173 principle of collecting data only for a valid reason is _____.
A) Legitimate Purpose
B) Transparency
C) Proportionality
D) Integrity
  • 51. The RA 10173 principle that only necessary data should be collected is _____.
A) Legitimate Purpose
B) Transparency
C) Proportionality
D) Accuracy
  • 52. Hacking systems without consent even to report flaws is considered _____ hacking.
A) White Hat
B) Authorized
C) Ethical
D) Unethical
  • 53. Which Philippine group fights cybercrime alongside NBI and DICT?
A) NPC Response Team
B) DOST Cyber Unit
C) AFP Cyber Command
D) PNP Anti-Cybercrime Group
  • 54. The Philippine National Privacy Commission is abbreviated as _____.
A) NBI
B) NPC
C) PNP
D) DICT
  • 55. DICT stands for Department of Information and _____ Technology.
A) Cyber
B) Computer
C) Connectivity
D) Communications
  • 56. Under GDPR fines can reach up to €_____ million.
A) 50
B) 10
C) 20
D) 5
  • 57. Which of these is NOT a GDPR principle?
A) Purpose Limitation
B) Lawfulness
C) Accuracy
D) Profit Maximization
  • 58. A system may be secure but still violate _____.
A) Privacy
B) Encryption
C) Compliance
D) Portability
  • 59. Facial recognition and fingerprints are examples of _____ data.
A) Financial
B) Biometric
C) Genetic
D) Behavioral
  • 60. The unauthorized duplication of digital media is known as _____.
A) Piracy
B) Phishing
C) Plagiarism
D) Hacking
  • 61. DMCA takedown notices are used against _____.
A) Identity Theft
B) Phishing
C) Digital Piracy
D) Data Breaches
  • 62. Which license allows creators to share work with custom permissions?
A) Fair Use
B) DRM
C) DMCA
D) Creative Commons
  • 63. An agreement used to protect confidential business ideas is called an _____.
A) NDA
B) TOS
C) EULA
D) SLA
  • 64. Which Philippine ransomware attack compromised sensitive health records?
A) PhilPost
B) LandBank
C) PhilHealth
D) COMELEC
  • 65. The Bill of Rights of the Philippine Constitution protects the right to _____.
A) Ownership
B) Profit
C) Hacking
D) Privacy
  • 66. Which certification is commonly taken alongside CEH for security roles?
A) CCNA
B) MCSE
C) AWS Cloud Practitioner
D) CompTIA Security+
  • 67. GDPR requires processing that is lawful fair and _____.
A) Transparent
B) Secure
C) Portable
D) Accurate
  • 68. Which IP concept balances creator rights with public access for education and commentary?
A) DRM
B) Trademark
C) Patent
D) Fair Use
  • 69. The Hack4Gov initiative promotes _____ among Filipino youth.
A) Data Entry
B) Software Piracy
C) Ethical Hacking
D) Cyber Espionage
  • 70. Privacy governs how data is collected and used while _____ governs how data is protected.
A) Ethics
B) Security
C) Consent
D) Portability
  • 71. Which international treaty governs patents across countries?
A) Berne Convention
B) GDPR
C) Patent Cooperation Treaty
D) DMCA
  • 72. The right to limit how data is processed in some situations is the Right to _____.
A) Erasure
B) Access
C) Portability
D) Restriction of Processing
  • 73. Under RA 10173 an organization must notify the NPC in the event of a _____.
A) Software Update
B) Server Migration
C) Staff Change
D) Data Breach
  • 74. Which patent type covers new and useful machines or processes?
A) Utility Patent
B) Plant Patent
C) Trade Patent
D) Design Patent
  • 75. A formal request under GDPR for companies to show what data they hold about a user uses the Right to _____.
A) Rectification
B) Portability
C) Access
D) Object
  • 76. A mobile app secretly sells your contact list to advertisers. Which GDPR principle is violated?
A) Storage Limitation
B) Integrity
C) Purpose Limitation
D) Accuracy
  • 77. Maria wants her old social media account permanently deleted. Which right should she invoke?
A) Right to Erasure
B) Right to Access
C) Right to Rectification
D) Right to Restriction of Processing
  • 78. A job form requires your blood type even though it is unrelated to the job. Which principle is violated?
A) Integrity
B) Lawfulness
C) Accuracy
D) Data Minimization
  • 79. A bank finds client records were leaked. Under RA 10173 who must be notified?
A) Nobody if contained
B) Only the police
C) Only the CEO
D) NPC and affected individuals
  • 80. Ana wants to move her bank transaction history to another app. Which right helps her?
A) Right to Object
B) Right to Erasure
C) Right to Access
D) Right to Data Portability
  • 81. A marketer keeps emailing a user who already unsubscribed. Which right is violated?
A) Right to Rectification
B) Right to Object
C) Right to Portability
D) Right to Access
  • 82. A hospital has the wrong blood type on a patient file. Which right should the patient use?
A) Right to Access
B) Right to Rectification
C) Right to Object
D) Right to Erasure
  • 83. A student copies a Wikipedia paragraph word-for-word without citation. This is _____.
A) Self-Plagiarism
B) Direct Plagiarism
C) Paraphrasing Plagiarism
D) Accidental Plagiarism
  • 84. Juan invents a novel rice threshing machine. Which IP protection should he pursue?
A) Trade Secret
B) Utility Patent
C) Copyright
D) Trademark
  • 85. Lisa creates a distinctive logo for her restaurant. Which IP protection should she use?
A) Patent
B) Copyright
C) Trade Secret
D) Trademark
  • 86. A soda company keeps its recipe secret and never registers it. Which IP type protects it?
A) Copyright
B) Patent
C) Trademark
D) Trade Secret
  • 87. An IT professional tests a company network for flaws with written permission. This is _____.
A) Data theft
B) Cyberbullying
C) Black-hat hacking
D) Ethical hacking
  • 88. Someone hacks a bank without permission to steal money. This person is a _____.
A) Grey Hat
B) Black Hat
C) White Hat
D) Blue Hat
  • 89. Someone secretly records a couple and shares the video online. Which Philippine law is violated?
A) RA 9995 Anti-Voyeurism Act
B) RA 10173
C) RA 10175
D) RA 8792
  • 90. A student posts false news about a classmate online. This may be charged under _____.
A) RA 10175 online libel
B) RA 8792
C) Patent law
D) Trademark law
  • 91. A pentester uses Nmap under a signed contract. This activity is _____.
A) Legal ethical hacking
B) Data theft
C) Cyberbullying
D) Illegal hacking
  • 92. A student exploits a school website flaw to change their grades. This is _____.
A) Black-hat hacking
B) Fair Use
C) Ethical hacking
D) Legal research
  • 93. A site shows a long confusing policy with pre-checked consent boxes. Which ethical issue applies?
A) Manipulation of informed consent
B) Patent issue
C) Portability issue
D) Data encryption issue
  • 94. A smart speaker silently records household chats without notice. Which concern is central?
A) IoT privacy
B) Copyright
C) Patent
D) Trademark
  • 95. An AI company trains a model using internet-scraped personal photos. Which issue arises?
A) DRM bypass
B) Trademark dilution
C) Data collection without consent
D) Patent infringement
  • 96. A university posts student grades publicly with full names. Which right is violated?
A) Fair Use
B) Portability
C) Object
D) Right to Privacy
  • 97. A Philippine hospital delays informing patients of a ransomware leak. This violates _____.
A) DMCA
B) Copyright
C) Fair Use
D) RA 10173 breach notification
  • 98. A programmer uses open-source code but removes the author credits. This violates _____.
A) Trade Secrets
B) Patents
C) DMCA
D) License terms
  • 99. An EU citizen sues a Philippine app for mishandling their data. Which law can apply?
A) No law applies
B) GDPR due to extraterritoriality
C) Only US laws
D) Only PH laws
  • 100. A teacher uses short novel excerpts in class for educational critique. This likely falls under _____.
A) Copyright Infringement
B) Direct Plagiarism
C) Fair Use
D) Patent Infringement
Created with That Quiz — where a math practice test is always one click away.