ThatQuiz Test Library Take this test now
CYBERCRIME(MIDTERM)— FOR ACADEMIC PURPOSES ONLY. kaya wag OA te.
Contributed by: Talorong
  • 1. 1. Refers to laws or regulations that are overly broad, ambiguous, or unclear, making it difficult for individuals, organizations, or law enforcement to understand what specific online activities are prohibited or regulated?
A) Vague provisions
B) Technical Limitation
C) All of the above
D) Both a & b
E) Cybercrime
  • 2. 2. Example of Specialized Units: They Investigate and prevent cyber-related crimes like hacking, identity theft, and online fraud.
A) Cybercrime Units
B) Forensic Units
C) Maritime Units
D) None of the above
E) Aviation Unit
  • 3. 3. In Privacy and Surveillance Concern: Is the unauthorized access to personal information, such as names, addresses, financial details, or social security numbers, leading to identity theft or other forms of harm.
A) None of the above
B) Data Breaches and Identity Theft
C) Maritesing
D) Scamming
E) Phishing
  • 4. 4. Is a restriction or constraint that arises due to the tools, systems, or technology used in a project. These limitations can affect performance, quality, or the feasibility of achieving certain goals?
A) Technical Limitation
B) All of the above
C) Jurisdictional Challenges
D) Vague Provision
E) Lack of Special Units
  • 5. 5. Example of Specialized Units: They are the responsible in Collection and analysis of evidence from crime scenes, using specialized equipment and techniques.
A) Patroller
B) Jailer
C) Investigator
D) Forensic Units
E) Desk Ofiicer
  • 6. 6. A PNP Unit that is mandated to implement and enforce pertinent laws on cyber related crimes?
A) PNP-CGA
B) PNP-GAC
C) PNP-PCG
D) PNP-ACG
E) PNP-AGC
  • 7. 7. What is the meaning of the word "Vague"?
A) Positive
B) Unlawful or illegal
C) Uncertain or unclear
D) None of these
E) Heart broken
  • 8. 8. Is the dispute over whether a court, tribunal, or regulatory body has the authority to hear a case or enforce laws. These challenges can be based on different factors, such as the type of case, the parties involved, or the location of the dispute?
A) None of the above
B) Vague Provision
C) Jurisdictional Challenges
D) Lack of specialized Unit
E) Technical Limitation
  • 9. 9. A person who threatens another with the infliction of harm upon the person, honor, or property of the latter or of his family or any wrong amounting to a crime is prohibited from doing so. In the event that the Threat committed online.
A) Sec 9 of RA 10175
B) Sec 7 of RA 10175
C) Sec 8 of RA 10175
D) Sec 6 of RA 10175
E) None of the above
  • 10. 10. Can be defined as: "Offenses that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim, mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet and through the use of ICT.
A) Felony
B) Crime
C) Cybercrimes
D) Cyber
E) None of these
  • 11. 11. The main means of mass communication (broadcasting, publishing, and the Internet), regarded collectively.
A) Media
B) None of the above
C) Press
D) Showbiz Balita
E) Newspaper
  • 12. 12. It is the public imputation/accusation of a discreditable act or condition to another conveyed with a malice underpinning by means of a computer device or internet technology.
A) Cyber Sextortion
B) None of the above
C) Cyber Cyber
D) Cyber Libel
E) Cyber Fraud
  • 13. 13. The Anti-Photo and Video Voyeurism Act of 2009.
A) RA 9995
B) RA 175
C) RA 9165
D) RA 5999
E) Both a & b
  • 14. 14. Committed with unfaithfulness or abuse of confidence, by means of false pretenses of fraudulent means.
A) Digital Forensic
B) Hacking
C) None of the above
D) Estafa or Swindling
E) Cyber Warrant
  • 15. 15. The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another.
A) Hacking
B) None of the above
C) Identity Theft
D) Illegal Access
E) Scamming
  • 16. 16. An order to disclosed and accordingly require any person or service provider to disclose or submit subscriber's information.
A) Warrant of Arrest
B) Cybercrime Warrants
C) None of the above
D) Court Order
E) Search Warrant
  • 17. 17. The anti-Child Pornography Act of 2009.
A) RA 9577
B) None of the above
C) RA 9775
D) RA 5779
E) RA 7759
  • 18. 18. Refers to involving activities in which people spend time talking each other and or enjoying things together.
A) Social Media
B) None of the Above
C) Facebook
D) Online Platform
E) World Wide Wed
  • 19. 19. On Need for Specialization: Cybercrime is often international, making jurisdiction enforcement difficult, cooperation between global law enforcement agencies.
A) Digital Forensic
B) Cybersecurity Fundamentals
C) None of the above
D) Cross-Border Jurisdiction Issues
E) Legal & Policy Frameworks
  • 20. 20. On Rapid Evolution of Technology: Cybercriminals exploit cutting-edge technologies such as artificial intelligence, encryption, and the dark web to commit crimes while remaining anonymous.
A) Legal & Policy Frameworks
B) Cybersecurity Fundamentals
C) Digital Forensic
D) Increased Complexity of Cybercrime
E) None of these
  • 21. 21. On Need for Specialization: Gaining insights into how hackers operate to prevent attacks
A) None of the above
B) Digital Forensic
C) Cybersecurity Fundamentals
D) Legal & Policy Frameworks
E) Ethical Hacking & Penetration Testing
  • 22. 22. On Need for Specialization: Understanding cyber laws and international.
A) Digital Forensic
B) Cybersecurity Fundamentals
C) Legal & Policy Frameworks
D) Ethical Hacking & Penetration Testing
E) None of the above
  • 23. 23. On Need for Specialization: Understanding how to collect and analyze electronic evidence.
A) Legal & Policy Frameworks
B) Cybersecurity Fundamentals
C) Ethical Hacking & Penetration Testing
D) Digital Forensic
E) None of the above
  • 24. 24. On Harm Centric Approach: Organizations using a harm-centric approach are transparent about their practices and are accountable for any harm caused by their technology.
A) Transparency and Accountability
B) User Centered Designed
C) Al
D) None of the above
E) Prioritizing Harm
  • 25. 25. On Harm Centric Approach: It emphasizes taking proactive steps to anticipate and address potential harms before they occur.
A) Transparency and Accountability
B) Proactive Measures
C) Both a & b
D) Prioritizing Harm
E) None of the above
  • 26. 26. On Harm Centric Approach: It requires constant evaluation and adaptation as technology evolves and new risks emerge.
A) Transparency and Accountability
B) Proactive Measures
C) None of the above
D) Continuous Learning and Adaptation
E) Prioritizing Harm
  • 27. 27. On Harm Centric Approach: Designing technology with a strong focus on user safety and well-being is crucial. This includes considering vulnerable groups and mitigating potential risks.
A) Prioritizing Harm
B) Transparency and Accountability
C) Proactive Measures
D) User-Centered Design
E) None of the above
  • 28. 28. On Harm Centric Approach: It prevents and minimize harm as the primary goal above other considerations like maximizing profit or convenience.
A) Prioritizing Harm
B) Transparency and Accountability
C) None of the Above
D) User Centered Designed
E) Proactive Measures
  • 29. 29. is a type of online fraud that involves tricking victims into revealing sensitive information such as passwords, credit card numbers, or personal identifiable information.
A) Data Breaches
B) Phishing
C) Social Engineering
D) Synthetic Identity Theft
E) None of the above
  • 30. 30. On Types of Data Breaches: Misconfigured databases, weak passwords, or improper disposal of data.
A) None of these
B) Third Party Breaches
C) Third-Party Breaches
D) Unintentional Exposure
E) Insider Threat
  • 31. 31. Refers to the psychological manipulation of individuals into divulging confidential or personal information that can be used for malicious purposes. Rather than relying on technical vulnerabilities, social engineering exploits human behavior, trust, and emotions to gain unauthorized access to systems, data, or physical locations.
A) Third-Party Breaches
B) None of the above
C) Third Party Breaches
D) Insider Threat
E) Social Engineering
  • 32. 32. On Types of Fishing Attacks: Employees or contractors intentionally or accidentally expose data.
A) Physical Theft Loss
B) Insider Threat
C) None of the above
D) Phishing
E) Scamming
  • 33. 33. On Risk of Using Public Wi-fi: Hackers use tools to eavesdrop on unsecured data transmissions, capturing unencrypted usernames, passwords, and other sensitive information.
A) None of the above
B) Man-in-the-Middle Attack
C) Evil Twin Attack
D) Malware Distribution
E) Packet Sniffing
  • 34. 34. On Types of Phishing; Scammers target specific individuals or groups with tailored emails that appear to be from a trusted source.
A) Email Phishing
B) Spear Phishing
C) Evil Twin Attack
D) Man-in-the-Middle Attack
E) None of the above
  • 35. 35. Unlike traditional identity theft-where a criminal steals and uses someone's full identity-synthetic identity theft creates a new, fake identity that doesn't directly belong to any real person.
A) Data Breaches
B) Social Engineering
C) None of the above
D) Synthetic Identity Theft
E) Both a & b
  • 36. 36. On Types of Fishing Attacks: Scammers use voice calls to trick victims into revealing sensitive information.
A) Smishing
B) Vishing
C) None of the above
D) Email Phishing
E) Whaling
  • 37. 37. On Types of Data Breaches: The attackers targeted the vendors, partners, or service providers who have access to a company's data. To exploit a path of least resistance.
A) Physical Theft or Loss
B) None of the above
C) Insider Threat
D) Unintentional Exposure
E) Third-Party Breaches
  • 38. 38. On Risk of Using Public Wi-fi: Cybercriminals set up fake Wi-Fi networks with similar names to legitimate ones (e.g., "Free Airport Wi-Fi") to trick users into connecting. Once connected, the attacker can monitor and steal your data.
A) Man in the Middle Attacks
B) Evil Twin Attacks
C) None of the Above
D) Packet Sniffing
E) Malware Distribution
  • 39. 39. Is the advanced data analysis, cybercriminals can automate processes like identifying vulnerabilities, crafting personalized phishing attacks, and executing social engineering tactics with greater precision.
A) Targeting and Sophistication
B) Sophistication and Targeting
C) Phishing
D) None of the above
E) Password Cracking
  • 40. 40. This enables attackers to crack passwords faster than manual methods, significantly increasing the chances of success in breaking into accounts.
A) Password Cracking
B) Cracking Password
C) Hacking
D) None of the above
E) Key logger
  • 41. 41. It is a branch of Computer Science that pursues creating the computers or machines as intelligent as human beings. It is the science and engineering of making intelligent machines, especially intelligent computer programs.
A) None of the above
B) Cybercrime
C) Artificial Intelligence
D) Payment Gateway Fraud
E) Deep Fakes and Impersonation
  • 42. 42. It is an Al-generated video, image, or audio file that is meant to deceive people commonly appear on the internet for no other purpose than to entertain and confuse. However, they can also be used more maliciously as part of disinformation campaigns, "fake news," smear campaigns of high-profile individuals, or cyberattacks.
A) Deep Fakes and Impersonation
B) Password Cracking
C) Payment Gateway Fraud
D) None of the above
E) Global Reach
  • 43. 43. It enables the rapid, large-scale execution of attacks with minimal human intervention. Through Al-powered tools.
A) Password Cracking
B) Automation and Scalability
C) Payment Gateway Fraud
D) None of the Above
E) Deep Fakes and Impersonation
  • 44. 44. Criminal activities carried out by means of computers or the internet, that either targets or uses a computer, a computer network or a networked device?
A) Computer Crime
B) Identity Theft
C) Computer Fraud
D) Cybercrime
E) All of the above
  • 45. 45. Characteristics of Cybercrime - Cybercrime is a global problem that affects businesses and individuals, the use of computers and digital devices to commit a wide range of illegal activities?
A) Global Reach
B) Portability
C) Social Media
D) WWW
  • 46. 46. The first cyber-attack was in France, when attackers stole information from the telegraph system. Question what year is the said attacked?
A) 1843
B) 1834
C) 1853
D) 1855
  • 47. 47. Defined as the scientific study of crime, criminals, and the justice system.
A) Penology
B) Criminalistics
C) Criminology
D) Dactyloscopy
  • 48. 48. Criminal activities carried out by means of computers or the internet, that either targets or uses a computer, a computer network or a networked device.
A) Computer Fraud
B) Cybercrime
C) Identity Theft
D) Phising
  • 49. 49. Is the science of the motion of projectile and the condition that affects its motion.
A) Criminalistics
B) Fingerprint
C) None of the above
D) Ballistics
  • 50. 50. Is a rule of conduct compulsory and obligatory to all.
A) Court decision
B) Ordinance
C) Law
D) Executive order
  • 51. 51. An impression design by the ridges used for identifying individuals from the unique pattern of whorl and lines.
A) Fingerprint
B) Forensic medicine
C) Questioned documents
D) Ballistics
  • 52. 52. He was an Italian doctor, sociologist and physician and known as the father of criminology.
A) Cesar Montano
B) Herman Welker
C) Cesare Lombroso
D) Jeremy Bentham
  • 53. 53. Is that branch of public law that defines crimes, threat of its nature and provide for punishment.
A) Supreme court
B) Civil Law
C) Katarungang pangbarangay
D) Criminal law
  • 54. 52. Miranda rights
A) RA 4783
B) RA 9165
C) RA 8353
D) RA 7438
  • 55. 53. As an aspiring police officer, always bear in mind to follow lawful instruction.
A) Always follow the instruction
B) Follow order
C) Bonus
D) Read the instruction
Created with That Quiz — the math test generation site with resources for other subject areas.