- 1. A type of hacker that fall somewhere between white hat hackers and black hat hackers.
A) Gray hat hacker B) Black hat hacker C) any of these D) White hat hacker
- 2. Sato was hired by the City Mayor of Palawan to fixed the anomalies inside the cybergroup of his administration. Sato has been good and fixed easily the problem but little they didn't know she was did another thing there while fixing just to get more income as hacker. What kind of motives that Sato has?
A) Gray hat hacker B) Greed C) Revenge D) White hacker
- 3. What piece of software that runs user applications and provides interface to the hardware?
A) Operating Systems B) Operator C) Boot sequence instructions D) Application Software
- 4. What is the virtual computer world which is used to form a global computer networks to facilitate online communication
A) Cybercrime B) Cybersecurity C) Cyberspace D) Cyber criminal
- 5. All cybercrime are committed in the virtual world or space.
A) FALSE B) PARTIALLY TRUE C) TRUE D) PARTIALLY FALSE
- 6. A type of email that you did not request and do not want to receive from unknown individuals or organizations not in your mailing list
A) phishing B) none of these C) spam D) spoofing
- 7. It is the use of electronic messaging systems like e-mails and other digital delivery systems and broadcast media to send unwanted bulk messages indiscriminately.
A) Hacking B) Attacking C) Loading D) Spamming
- 8. is a part of the deep web. It is specifically designed to be anonymous and inaccessible through normal means.
A) surface web B) any of these C) dark web D) deep web
- 9. This occurs when defamation takes place with the help of computers and/or the Internet. E.g. someone publishes defamatory matter about another on a website.
A) Cyber Pornography B) Cyber Sex C) Cyber Defamation D) Cyber Staking
- 10. This kind of crime is normally prevalent in the financial institutions or for the purpose of committing financial crimes. An important feature of this type of offense is that alteration is so small that it would normally unnoticed.
A) Hacking B) Salami Attack C) Logic bomb D) Theft of Information Contained in Electronic Form
- 11. It refers to the market that are used to buy and sell recreational drugs online.
A) Public market B) Night Market C) Warehouse D) Dark web
- 12. What did the ?I LOVE YOU? virus demonstrate about computer-related crimes?
A) There is a potential for remote attacks causing widespread damage B) There is a need for international cybersecurity treaties. C) It revealed the vulnerability of government institutions. D) The importance of firewalls and antivirus software.
- 13. It is an activity done using computers and internet.
A) Cybercrime B) Cybergroup C) Cyberacts D) Cybersecurity
- 14. Hacking designed to cause terror.
A) Cyber libel B) Cyber defamation C) Cyber Terrosim D) Cyber pornography
- 15. Gina, a bank employee inserts a program, into the bank's servers, that deducts a small amount of from the account of every customer. This unauthorized debt is likely to go unnoticed by an accountholder.
Gina's act refers to what types of cybercrime?
A) DOS attack B) Virus C) Salami attack D) Worm
- 16. It is is when a perpetrator singles out a specific person and causes the person emotional distress and causes the individual to fear for his or her life, safety, or safety of others.
A) Hacking B) Stalking C) Talking D) Wanting
- 17. How did the I LOVE YOU virus spread?
A) By encrypting the computer?s hard drive B) By erasing system files C) By replicating and sending itself to email contacts D) Through encrypted emails
- 18. A hacking technique where the attacker can buy advertising spaces on the websites and when a user clicks on the ad, he might get directed to a page that's infected with malware.
A) virus B) Bait and Switch C) Clickjacking D) Cookie theft
- 19. What is the act of stealing creative expressions, patents, or trademarks from individuals or companies?
A) Phishing B) Identity-based attack C) Hacking D) Intellectual property theft
- 20. It refers to a content may be offensive in a nonspecific way, harassment directs obscenities and derogatory comments at specific individuals focusing for example on gender, race, religion, nationality, sexual orientation.
A) Cyeber stalking B) Online Degrading C) Online Stalking D) Online Harassment
A) The valuable skills for computer programmers and technicians. B) Computer Programming C) Professional Technician D) The use of the Internet or other electronic means to stalk or harass an individual, group, or organization
- 22. It is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
A) Scamming B) Cyberstalking C) Spoofing D) Phishing
- 23. It refers to protecting the government and corporate networks, seeking to make it difficult for hackers to find and exploit vulnerabilities.
A) Cyberspace B) Cybersecurity C) Cybercrime D) Cyberacts
- 24. An utilizes hacking to cause violence against persons or property, or at least cause enough harm to generate fear.
A) Cyber terrorism B) Cyber Attack C) Salami attack D) Cyber defamation
- 25. Which offense is characterized by causing annoyance or irritation without falling under specific criminal offenses?
A) Cyber libel B) Unjust vexation C) Photo and video voyeurism D) Cyber threats
- 26. These attacks are often used in committing financial crime and are based on the idea that an alteration, so insignificant, would go completely unnoticed in a single case
A) Email spoofing B) Email bombing C) Salami attack D) Trojan attack
- 27. It is also known as Hacking. Involves gaining access illegally to a computer system or network and in some cases making unauthorized use of this access.
A) IP address B) Unauthorized Access C) Identity theft D) Spoofing
- 28. What is encompassed by data interference?
A) Unauthorized alteration of computer data B) Intentional deletion of electronic documents C) All of the above D) Introduction of computer viruses
- 29. Sato was hired by the City Mayor of Palawan to fixed the anomalies inside the cybergroup of his administration. Sato has been good and fixed easily the problem but little they didn't know she was did another thing there while fixing just to get more income as hacker. What kind of hacker is she?
A) Anomalies hacker B) Black hat hacker C) White hat hacker D) Gray hat hacker
- 30. Those are the responsible for the provision of services relating to a computer system.
A) Traffic data B) Service Provider C) Compuer network D) PLDT
- 31. It is also known as identity fraud, is a crime in which an imposter obtain key pieces of personally identifiable information, such as Social Security or driver's license numbers, in order to impersonate someone else.
A) Identity theft B) Carding C) Bank fraud D) Extortion
- 32. The is part of the internet that is accessible through search engines like google.
A) dark net web B) dark web C) surface web D) deep web
- 33. Some internet criminals threaten to or actually flood an internet site with millions of bogus messages and/or orders so that site services will be tied up and unable to perform as promised.
A) Denial of Service attack B) Distributing Illegal Infringement C) Illegal Copyright Infringement D) Internet Securities Fraud
- 34. A type of scam in which criminals attempt to obtain someone's personal information by pretending to be a legitimate business, neighbor or some other innocent party.
A) Spoofing B) Pharming C) Phishing D) Scamming
- 35. A hacker who also known as ethical hackers, strive to operate in the public's best interest, rather than to create turmoil.
A) Black hat hacker B) Gray hat hacker C) White hat hacker D) any of these
|