Cdi 9 - To Cybercrime AND Environmenta L Laws: Multiple Choice

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 49

CDI 9 -

INTRODUCTION
TO CYBERCRIME
AND
ENVIRONMENTA
L LAWS
hermark.navor@student.dmmmsu.edu.ph
Switch account

Draft saved

Your email will be recorded


when you submit this form

* Required

MULTIPLE CHOICE

100 ITEMS

A system that can 1 point

process a
collection of inputs
and produce a set
of outputs. A
combination of
software and
hardware is used
to do this *

computer networking

computer system

computerization

information
technology

VIRUS stands for * 1 point

A. Very Intelligent
Result Until Source

B. Very Interchanged
Resource Under
Search

C. Vital Information
Resource Under Slege

D. Viral Important
Record User Searched

This is the 1 point

information-
processing
technology in
physical form *

computerization

computer software

telecommunications

computer hardware

Which of the 1 point


following actions
compromise cyber
security? *

a) Vulnerability

b) Attack

c) Threat
d) Exploit

Which of the 1 point


following act
violates cyber
security? *

a) Exploit

b) Attack

c) Threat

d) Vulnerability

Which of the 1 point

following is defined
as an attempt to
harm, damage or
cause threat to a
system or
network? *

a) Digital crime

b) Threats

c) System hijacking

d) Cyber Attack
The amateur or 1 point

newbie in the field


of hacking who
don’t have many
skills about coding
and in-depth
working of security
and hacking tools
are called ________
*

a) Sponsored Hackers

b) Hactivists

c) Script Kiddies

d) Whistle Blowers

Which of the 1 point


following is an
internet scam done
by cyber-criminals
where the user is
convinced digitally
to provide
confidential
information. *

a) MiTM attack

b) Phishing attack

c) Website attack

d) DoS attack
Which of the 1 point
following is not a
cybercrime? *

a) Denial of Service

b) Man in the Middle

c) Malware

d) AES

Which of the 1 point

following is not an
email-related
hacking tool? *

a) Mail Password

b) Email Finder Pro

c) Mail PassView

d) Sendinc

Which of the 1 point


following is not an
example of
modern wearable
technology? *

Fitness Trackers

Headsets

Smartphones

Smart Watches
________ 1 point

automates an
action or attack so
that repetitive
tasks are done at a
faster rate. *

a) Auto-bots

b) Cookie-bots

c) Robots

d) Bots

Which of the 1 point


following is a type
of cyber security?
*

a) Cloud Security

b) Network Security

c) Application Security

d) All of the above


________ is a way to 1 point

breach the security


by using the
vulnerability of that
system. *

a) Threat

b) Vulnerability

c) Exploit

d) Attack

What is the 1 point

existence of
weakness in a
system or network
is known as? *

a) Attack

b) Exploit

c) Vulnerability

d) Threat
Refers to a civil 1 point
wrong of
defamation
involving spoken
statements *

Infringement

Libel

Slander

None of the above

Which of the 1 point


following do Cyber
attackers
commonly target
for fetching IP
address of a target
or victim user? *

a) ip tracker

b) emails

c) websites

d) web pages
These are the most 1 point
powerful and
largest computer
available *

supercomputer

computer

mainframe computer

microcomputer

What are the 1 point


features of cyber
security? *

a) Compliance

b) Defense against
internal threats

c) Threat Prevention

d) All of the above

Which of the 1 point


following online
service’s privacy
cannot be
protected using
Tor? *

c) Login using ID

d) Relay chats

b) Instant messaging
a) Browsing data

-------- are 1 point


attempts by
individuals to
obtain confidential
information from
you to falsifying
their identity. *

A. Computer viruses

B. Phishing scams

C. Phishing trips

D. Spyware scams

Which of the 1 point


following describes
programs that can
run independently
travel from system
to system and
disrupt computer
communication? *

A. Viruses

B. Trojans

C. Droppers

D. Worm
Which of the 1 point
following term
refers to a group of
hackers who are
both white and
black hat? *

a) Yellow Hat hackers

b) Grey Hat hackers

c) Red Hat Hackers

d) White-Black Hat
Hackers

Who is the father 1 point


of computer
security? *

a) August Kerckhoffs

b) Bob Thomas

c) Robert

d) Charles

Adware are pre- 1 point


chosen _______
developed to
display ads. *

a) banner

b) software

c) malware
d) shareware

Which of the 1 point


following is the
least strong
security
encryption
standard? *

a) WPA3

b) WPA2

c) WPA

d) WEP

Role of security 1 point


auditor is to
____________ *

a) secure the network

b) probe for safety


and security of
organization’s security
components and
systems

c) detects and
prevents cyber attacks
and threats to
organization

d) does penetration
testing on different
web applications
are often delivered 1 point
to a PC through an
email attachment
and are often
designed to do
harm. *

Email

Portals

Virus

Spam

------- software 1 point

are programs that


are installed onto
your computer and
can scan and
remove known
viruses which you
may have
contracted. *

A. Firmmware

B. Adware

C. Keylogger

D. Antivirus
Which of the 1 point
following is/are
threats for
electronic payment
systems? *

A. Computer worms

B. Computer virus

C. Trojan horse

D. All of the above

What is Cyber 1 point


Security? *

a) Cyber Security
provides security
against malware

b) Cyber Security
provides security
against cyber-
terrorists

c) Cyber Security
protects a system
from cyber attacks

d) All of the
mentioned
These types of 1 point
hackers are the
most skilled
hackers in the
hackers’
community. Who
are “they” referred
to? *

a) White hat Hackers

b) Elite Hackers

c) Licensed
Penetration Testers

d) Red Hat Hackers

Which of the 1 point


following is not an
antivirus software?
*

A. AVG

B. Avast

C. Code Red

D. MCAfee

Key logger is a * 1 point

A. Firmware

B. Antivirus

C. Spyware
D. All of the above

MCAfee is an 1 point
example of *

A. Photo Editing
Software

B. Quick Heal

C. Virus

D. Antivirus

The altering of data 1 point


so that it is not
usable unless the
changes are
undone is *

encryption

biometrics

ergonomics

compression
Someone (from 1 point
outside) who tests
security issues for
bugs before
launching a system
or application, and
who is not a part of
that organization
or company are
______ *

a) Black Hat hacker

b) External
penetration tester

c) Blue Hat hacker

d) White Hat Hacker

________ are senior 1 point


level corporate
employees who
have the role and
responsibilities of
creating and
designing secured
network or
security structures.
*

a) Ethical Hackers

b) Chief Technical
Officer

c) IT Security
Engineers

d) Security Architect
They are nefarious 1 point

hackers, and their


main motive is to
gain financial profit
by doing cyber
crimes. Who are
“they” referred to
here? *

a) White Hat Hackers

b) Black Hat Hackers

c) Hactivists

d) Gray Hat Hackers

________ is an 1 point
attack technique
occurs when
excess data gets
written to a
memory block. *

a) Over buffering

b) Buffering

c) Buffer overflow

d) Memory full
To protect a 1 point
computer from
virus, you should
install -------- in
your computer. *

A. backup wizard

B. disk cleanup

C. antivirus

D. disk defragmenter

“Cyberspace” was 1 point


coined by
_________ *

a) Richard Stallman

b) William Gibson

c) Andrew
Tannenbaum

d) Scott Fahlman

Where did the term 1 point


“hacker” originate?
*

a) MIT

b) New York University

c) Harvard University

d) Bell’s Lab
Whaling is the 1 point
technique used to
take deep and
_________
information about
any individual. *

a) sensitive

b) powerful

c) useless

d) casual

Which of the 1 point


following can
diminish the
chance of data
leakage? *

a) Steganography

b) Chorography

c) Cryptography

d) Authentication
Finding & 1 point
publishing any
user’s identity with
the help of
different personal
details is called
________ *

a) Doxing

b) Data breaching

c) Personal data
copying

d) Secure File
Transferring Protocol

________ is any 1 point


action that might
compromise
cyber-security. *

a) Threat

b) Vulnerability

c) Exploit

d) Attack
A cyber-criminal or 1 point

penetration tester
uses the additional
data that stores
certain special
instructions in the
memory for
activities to break
the system in
which of the
following attack? *

a) Clickjacking

b) Buffer-overflow

c) Phishing

d) MiTM
The Cybercrime 1 point

Prevention Act
officially recorded
as
__________________
__________ is a law
in the Philippines
that aims to
address legal
issues concerning
online interaction. *

Republic Act No. 2012

Republic Act No. 2018

Republic Act No.


10175

Republic Act No.


17102

Which of the 1 point

following is not a
step followed by
cyber-criminals in
data breaching? *

a) Exfiltration

b) Research and info-


gathering

c) Attack the system

d) Fixing the bugs


Criminal minded 1 point

individuals who
work for terrorist
organizations and
steal information of
nations and other
secret intelligence
are _________ *

a) State sponsored
hackers

b) Blue Hat Hackers

c) Cyber Terrorists

d) Red Hat Hackers

It is an electronic 1 point
device that can be
programmed to
take user input,
process it and
output data *

mainframe computer

supercomputer

computer

microcomputer
A -------- is a 1 point
computer program
that can replicate
itself and spread
from one
computer to
another. *

A. Antivurs

B. PenDrive

C. Mouse

D. Computer Virus

A virus that 1 point

migrates freely
within a large
population of
unauthorized email
user is called a ----
--- *

A. flame war

B. worm

C. macro

D. plagiarism
Code red is a(n) --- 1 point
------- *

A. Word Processing
Software

B. Antivirus

C. Virus

D. Photo Editing
Software

_________ are those 1 point

individuals who
maintain and
handles IT security
in any firm or
organization. *

a) IT Security Engineer

b) Cyber Security
Interns

c) Software Security
Specialist

d) Security Auditor
Which of the 1 point
following is the
hacking approach
where cyber-
criminals design
fake websites or
pages for tricking
or gaining
additional traffic? *

a) Pharming

b) Website-Duplication

c) Mimicking

d) Spamming

The entire 1 point

collection of
programs,
procedures, and
routines involved
with the operation
of computer
system is referred
to as: *

computer hardware

system software

computer software

application software
When any IT 1 point

product, system or
network is in need
for testing for
security reasons,
then the term used
is called _________
*

a) Threat

b) Vulnerability

c) Target of Evaluation

d) Attack

They are nefarious 1 point

hackers, and their


main motive is to
gain financial profit
by doing cyber
crimes. Who are
“they” referred to
here? *

a) Gray Hat Hackers

b) White Hat Hackers

c) Hactivists

d) Black Hat Hackers


Authentication is * 1 point

A. modification

B. insertion

C. hard to assure
identity of user on a
remote system

D. none of the above

IT security in any 1 point

firm or
organization is
maintained and
handled by
__________________
__ *

a) Software Security
Specialist

b) CEO of the
organization

c) Security Auditor

d) IT Security Engineer
Which of the 1 point
following is not an
advantage of cyber
security? *

a) Makes the system


slower

b) Minimizes
computer freezing and
crashes

c) Gives privacy to
users

d) Protects system
against viruses

Which of the 1 point

following is known
as Malicious
software? *

A. illegalware

B. badware

C. malware

D. maliciousware
Which of the 1 point
following is defined
as an attempt to
steal, spy, damage
or destroy
computer systems,
networks, or their
associated
information? *

a) Cyber attack

b) Computer security

c) Cryptography

d) Digital hacking

Usually, these 1 point

cybercrimes are
committed by
impersonating
trusted and
popular brands
creating fake social
media profiles and
rogue websites to
lure users into
them. *

cybersex

identity theft

phishing scam

internet fraud
In which year has 1 point
hacking become a
practical crime and
a matter of
concern in the field
of cyber
technology? *

a) 1991

b) 1983

c) 1970

d) 1964

Firewalls are used 1 point


to protect against -
------- *

A. data driven attacks

B. fire attacks

C. virus attacks

D. unauthorised
access
What is short for 1 point

malicious software
(is software
designed to disrupt
computer
operation, gather
sensitive
information, or
gain unauthorized
access to
computer
systems)? *

A. Malware

B. Moleculewar

C. Malisoft

D. Malairasoft

In IP address, IP is 1 point
abbreviated as
__________ *

a) Internet Program

b) Internet Protocol

c) Intuition Programs

d) Internet Pathway
_________ is an act 1 point

of hacking by the
means of which a
political or social
message is
conveyed. *

a) Hacktivism

b) Whistle-blowing

c) Surveillance

d) Pseudonymization

Popularly known as 1 point

the video-sharing
website. *

twitter

Tumblr

youtube

internet
_______ is the 1 point

method of
developing or
creating a
structurally similar
yet unauthentic
and illegitimate
data of any firm or
company. *

a) Data copying

b) Data masking

c) Data breaching

d) Data duplicating

One who disclose 1 point


information to
public of a
company,
organization, firm,
government and
private agency and
he/she is the
member or
employee of that
organization; such
individuals are
termed as
___________ *

a) Sponsored hackers

b) Crackers

c) Hactivist

d) Whistleblowers
d) Whistleblowers

*These forms are 1 point


impersonation as
the lesser evil if
only personal
information or
accounts without
payment methods
saved were stolen.
However it can be
much worse if
credit card
information or
accounts
containing it was
stolen since the
cybercriminal can
make purchases
charged to your
account. *

piracy

internet fraud

phishing scam

identity theft
Which is the legal 1 point
form of hacking
based on which
jobs are provided
in IT industries and
firms? *

a) Cracking

b) Non ethical
Hacking

c) Ethical hacking

d) Hactivism

To protect yourself 1 point

from computer
hacker, you should
turn on a *

A. Script

B. Firewall

C. VLC

D. Antivirus
Governments hired 1 point

some highly skilled


hackers for
providing cyber
security for the
country or state.
These types of
hackers are termed
as _____ *

a) Nation / State
sponsored hackers

b) CIA triad

c) Special Hackers

d) Government
Hackers

Which of the 1 point

following is an
objective of
network security? *

a) Confidentiality

b) Integrity

c) Availability

d) All of the above


Which of the 1 point

following ethical
hacking technique
is used for
determining which
operating system
(OS) is running on
a remote
computer? *

a) Operating System
fingerprinting

b) Operating System
penetration testing

c) Digital-printing

d) Machine printing

Broadly defined as 1 point


data, knowledge,
or instructions
through signals or
symbols. *

Media

Technology

Communication

Information
________ are the 1 point

combination of
both white as well
as black hat
hackers *

a) Grey Hat hackers

b) Green Hat hackers

c) Blue Hat Hackers

d) Red Hat Hackers

Which of the 1 point

following DDoS in
mobile systems
wait for the owner
to trigger the
cyber attack? *

a) botnets

b) programs

c) virus

d) worms
Suicide Hackers 1 point
are those _________
*

a) who break a system


for some specific
purpose with or
without keeping in
mind that they may
suffer long term
imprisonment due to
their malicious activity

b) individuals with no
knowledge of codes
but an expert in using
hacking tools

c) who know the


consequences of their
hacking activities and
hence try to prevent
them by erasing their
digital footprints

d) who are employed


in an organization to
do malicious activities
on other firms
A ------- is a 1 point
computer program
that can invade
computer and
perform a variety
of functions
ranging from
annoying(e.g.
popping up
messages as a
joke) to dangerous
(e.g. deleting files
or destroying your
hard disk). *

A. Ms Word

B. Ms Access

C. Antivirus

D. Computer Virus

A collection of 1 point

interconnected
devices that
process, store, and
input data and
information *

computer networking

computer system

computerization

information system
Which of the 1 point
following is a type
of cyber attack? *

a) Phishing

b) SQL Injections

c) Password Attack

d) All of the above

Which of the 1 point

following is a
Stuxnet? *

a) Trojan

b) Antivirus

c) Worm

d) Virus

Which of the 1 point

following is a
component of
cyber security? *

a) Internet Of Things

b) AI

c) Database

d) Attacks
Backdoors are also 1 point
known as
____________ *

a) Trap doors

b) Front doors

c) Cover doors

d) Back entry

When a logic bomb 1 point

is activated by a
time related event,
it is known as -----
-- *

A. virus

B. trojan horse

C. time related bomb


sequence

D. time bomb
Hackers who help 1 point
in finding bugs and
vulnerabilities in a
system & don’t
intend to crack a
system are termed
as ________ *

a) Black Hat hackers

b) White Hat Hackers

c) Grey Hat Hackers

d) Red Hat Hackers

Data masking is 1 point

also known as
_________ *

a) Data obfuscation

b) Data copying

c) Data breaching

d) Data duplicating
Which of the 1 point

following would
most likely not be a
symptom of a
virus? *

A. The web browser


opens to an unusual
home page

B. Odd message or
images are displayed
on the screen

C. Existing program
files and icons
disappear

D. The CD–ROM stops


functioning

This is the type of 1 point

communication
practiced in
corporate
meetings,
conferences,
academic
seminars,political
sessions and
juridical
proceedings. *

Informal
Communication

Non-Verbal
Communication

Formal
Communication

Verbal
Verbal
Communication

Who deploy 1 point

Malwares to a
system or
network? *

a) Criminal
organizations, Black
hat hackers, malware
developers, cyber-
terrorists

b) Criminal
organizations, White
hat hackers, malware
developers, cyber-
terrorists

c) Criminal
organizations, Black
hat hackers, software
developers, cyber-
terrorists

d) Criminal
organizations, gray
hat hackers, Malware
developers,
Penetration testers

What does cyber 1 point

security protect? *

a) Cyber security
protects criminals

b) Cyber security
protects internet-
connected systems

c) Cyber security
protects hackers

d) None of the
mentioned
Which of the 1 point

following virus
overtake computer
system, when it
boots and destroy
information? *

A. System infectors

B. Trojan

C. Boot infectors

D. Stealth virus

Which of the 1 point


following is not a
type of peer-to-
peer cyber-crime?
*

a) MiTM

b) Injecting Trojans to
a target victim

c) Credit card details


leak in the deep web

d) Phishing
The first computer 1 point

virus is -------- *

A. I Love You

B. Blaster

C. Sasser

D. Creeper

Back Next

Clear form

Never submit passwords through Google


Forms.

This form was created inside of Don


Mariano Marcos Memorial State
University. Report Abuse

 Forms

You might also like