- 1. Sending numerous emails to the victim which shall result to a system or server crash/faifure is known as Email Bombing
A) Maybe B) True C) False
- 2. Shawarma attack is prevalent in the financial institutions or intended for the purpose of financial crimes
A) Maybe B) True C) False
- 3. Hacking includes information stored in computer hard disks, removable storage media etc. Theft may be by appropriating the data physically or by tampering through a virtual medium
A) True B) Maybe C) False
- 4. Who is the Father of Computer
A) Charles Xavier B) Charles Bobbage C) King Charles III D) Charles Darwin
- 5. Form that a computer may be used for Illegal Activities
A) Homicide B) Sale of Illegal Articles C) Robbery D) Rerckless Imprudence
- 6. The first person ever to be convicted for committing a cybercrime. He is also known as Captain Zap
A) lan Tayao B) Adrian Farley C) Allen Scherr D) Jan Murphy
- 7. He created the first computer virus also known as the Creeper Virus
A) Duke Tomas B) Bob Thomas C) Charles Bobbage D) Tim Thomas
- 8. These countries are known as the top scamming countries in the world
A) India, Nigeria, Philippines B) United Kingdom, United States, Malaysia C) None of These D) Canada, Mexico, Greenland
- 9. This evolution in Cybercrime is best understood through the lens of changing..____. (TTPs)
A) Technics, Tactics and Procedures B) Timeliness, Technicality and Profitability C) Technical, Tacticality, Procedural D) Timebound, Testing, Procedural
- 10. He launched a cyber-attack against the MIT computer networks, stealing passwords from their database via punch card.
A) None of these B) Alan Sanders C) Bill Gates D) Allen L Scherr
- 11. Altering raw data just before a computer processes it and changing it back after the process has been completed.
A) Data Didding B) E-mail Bombing C) Theft of Information Contained in Electronic Form D) Salami Attack
- 12. What year did the First Cyber Attack happen in France?
A) None of these B) 1734 C) 1934 D) 1834
- 13. The offense normally referred as "Hacking" in a generic sense.
A) Theft of Information Contained in Electronic Form B) Data Didding C) Hacking D) E-mail Bombing
- 14. Theft of sensitive customer data, leading to identity theft, financial fraud, and regulatory fines
A) Phishing Scams B) Ransomware Attacks C) Data Breach D) Malware Infections
- 15. The Cybercrime Industry is worth
A) 1.5 Billion B) P1.5 Million C) P1.5 Trillion D) 1.5 Trillion
- 16. The CIA Triad refers to:
A) Availability B) Confidentiality C) All of these D) Integrity
- 17. This is the National Support Unit (NSU) of the Philippine National Police (PNP) that handles Cybercrime related incidents and reports.
A) PNP Anti-Cybercrime Group B) Puerto Princesa City Police Office C) PNP Criminal Investigation and Detection Group D) PNP Maritime Group
|