- 1. Sending numerous emails to the victim which shall result to a system or server crash/faifure is known as Email Bombing
A) Maybe B) True C) False
- 2. Shawarma attack is prevalent in the financial institutions or intended for the purpose of financial crimes
A) True B) Maybe C) False
- 3. Hacking includes information stored in computer hard disks, removable storage media etc. Theft may be by appropriating the data physically or by tampering through a virtual medium
A) Maybe B) True C) False
- 4. Who is the Father of Computer
A) King Charles III B) Charles Darwin C) Charles Bobbage D) Charles Xavier
- 5. Form that a computer may be used for Illegal Activities
A) Robbery B) Sale of Illegal Articles C) Rerckless Imprudence D) Homicide
- 6. The first person ever to be convicted for committing a cybercrime. He is also known as Captain Zap
A) Jan Murphy B) Allen Scherr C) lan Tayao D) Adrian Farley
- 7. He created the first computer virus also known as the Creeper Virus
A) Bob Thomas B) Tim Thomas C) Charles Bobbage D) Duke Tomas
- 8. These countries are known as the top scamming countries in the world
A) Canada, Mexico, Greenland B) None of These C) India, Nigeria, Philippines D) United Kingdom, United States, Malaysia
- 9. This evolution in Cybercrime is best understood through the lens of changing..____. (TTPs)
A) Technics, Tactics and Procedures B) Timeliness, Technicality and Profitability C) Timebound, Testing, Procedural D) Technical, Tacticality, Procedural
- 10. He launched a cyber-attack against the MIT computer networks, stealing passwords from their database via punch card.
A) Allen L Scherr B) Bill Gates C) None of these D) Alan Sanders
- 11. Altering raw data just before a computer processes it and changing it back after the process has been completed.
A) Theft of Information Contained in Electronic Form B) E-mail Bombing C) Salami Attack D) Data Didding
- 12. What year did the First Cyber Attack happen in France?
A) 1734 B) 1834 C) 1934 D) None of these
- 13. The offense normally referred as "Hacking" in a generic sense.
A) Theft of Information Contained in Electronic Form B) E-mail Bombing C) Data Didding D) Hacking
- 14. Theft of sensitive customer data, leading to identity theft, financial fraud, and regulatory fines
A) Malware Infections B) Data Breach C) Phishing Scams D) Ransomware Attacks
- 15. The Cybercrime Industry is worth
A) P1.5 Trillion B) P1.5 Million C) 1.5 Billion D) 1.5 Trillion
- 16. The CIA Triad refers to:
A) Integrity B) All of these C) Availability D) Confidentiality
- 17. This is the National Support Unit (NSU) of the Philippine National Police (PNP) that handles Cybercrime related incidents and reports.
A) Puerto Princesa City Police Office B) PNP Maritime Group C) PNP Anti-Cybercrime Group D) PNP Criminal Investigation and Detection Group
|