Professional Documents
Culture Documents
Cdi 9 - To Cybercrime AND Environmenta L Laws: Multiple Choice
Cdi 9 - To Cybercrime AND Environmenta L Laws: Multiple Choice
Cdi 9 - To Cybercrime AND Environmenta L Laws: Multiple Choice
INTRODUCTION
TO CYBERCRIME
AND
ENVIRONMENTA
L LAWS
hermark.navor@student.dmmmsu.edu.ph
Switch account
Draft saved
* Required
MULTIPLE CHOICE
100 ITEMS
process a
collection of inputs
and produce a set
of outputs. A
combination of
software and
hardware is used
to do this *
computer networking
computer system
computerization
information
technology
A. Very Intelligent
Result Until Source
B. Very Interchanged
Resource Under
Search
C. Vital Information
Resource Under Slege
D. Viral Important
Record User Searched
information-
processing
technology in
physical form *
computerization
computer software
telecommunications
computer hardware
a) Vulnerability
b) Attack
c) Threat
d) Exploit
a) Exploit
b) Attack
c) Threat
d) Vulnerability
following is defined
as an attempt to
harm, damage or
cause threat to a
system or
network? *
a) Digital crime
b) Threats
c) System hijacking
d) Cyber Attack
The amateur or 1 point
a) Sponsored Hackers
b) Hactivists
c) Script Kiddies
d) Whistle Blowers
a) MiTM attack
b) Phishing attack
c) Website attack
d) DoS attack
Which of the 1 point
following is not a
cybercrime? *
a) Denial of Service
c) Malware
d) AES
following is not an
email-related
hacking tool? *
a) Mail Password
c) Mail PassView
d) Sendinc
Fitness Trackers
Headsets
Smartphones
Smart Watches
________ 1 point
automates an
action or attack so
that repetitive
tasks are done at a
faster rate. *
a) Auto-bots
b) Cookie-bots
c) Robots
d) Bots
a) Cloud Security
b) Network Security
c) Application Security
a) Threat
b) Vulnerability
c) Exploit
d) Attack
existence of
weakness in a
system or network
is known as? *
a) Attack
b) Exploit
c) Vulnerability
d) Threat
Refers to a civil 1 point
wrong of
defamation
involving spoken
statements *
Infringement
Libel
Slander
a) ip tracker
b) emails
c) websites
d) web pages
These are the most 1 point
powerful and
largest computer
available *
supercomputer
computer
mainframe computer
microcomputer
a) Compliance
b) Defense against
internal threats
c) Threat Prevention
c) Login using ID
d) Relay chats
b) Instant messaging
a) Browsing data
A. Computer viruses
B. Phishing scams
C. Phishing trips
D. Spyware scams
A. Viruses
B. Trojans
C. Droppers
D. Worm
Which of the 1 point
following term
refers to a group of
hackers who are
both white and
black hat? *
d) White-Black Hat
Hackers
a) August Kerckhoffs
b) Bob Thomas
c) Robert
d) Charles
a) banner
b) software
c) malware
d) shareware
a) WPA3
b) WPA2
c) WPA
d) WEP
c) detects and
prevents cyber attacks
and threats to
organization
d) does penetration
testing on different
web applications
are often delivered 1 point
to a PC through an
email attachment
and are often
designed to do
harm. *
Portals
Virus
Spam
A. Firmmware
B. Adware
C. Keylogger
D. Antivirus
Which of the 1 point
following is/are
threats for
electronic payment
systems? *
A. Computer worms
B. Computer virus
C. Trojan horse
a) Cyber Security
provides security
against malware
b) Cyber Security
provides security
against cyber-
terrorists
c) Cyber Security
protects a system
from cyber attacks
d) All of the
mentioned
These types of 1 point
hackers are the
most skilled
hackers in the
hackers’
community. Who
are “they” referred
to? *
b) Elite Hackers
c) Licensed
Penetration Testers
A. AVG
B. Avast
C. Code Red
D. MCAfee
A. Firmware
B. Antivirus
C. Spyware
D. All of the above
MCAfee is an 1 point
example of *
A. Photo Editing
Software
B. Quick Heal
C. Virus
D. Antivirus
encryption
biometrics
ergonomics
compression
Someone (from 1 point
outside) who tests
security issues for
bugs before
launching a system
or application, and
who is not a part of
that organization
or company are
______ *
b) External
penetration tester
a) Ethical Hackers
b) Chief Technical
Officer
c) IT Security
Engineers
d) Security Architect
They are nefarious 1 point
c) Hactivists
________ is an 1 point
attack technique
occurs when
excess data gets
written to a
memory block. *
a) Over buffering
b) Buffering
c) Buffer overflow
d) Memory full
To protect a 1 point
computer from
virus, you should
install -------- in
your computer. *
A. backup wizard
B. disk cleanup
C. antivirus
D. disk defragmenter
a) Richard Stallman
b) William Gibson
c) Andrew
Tannenbaum
d) Scott Fahlman
a) MIT
c) Harvard University
d) Bell’s Lab
Whaling is the 1 point
technique used to
take deep and
_________
information about
any individual. *
a) sensitive
b) powerful
c) useless
d) casual
a) Steganography
b) Chorography
c) Cryptography
d) Authentication
Finding & 1 point
publishing any
user’s identity with
the help of
different personal
details is called
________ *
a) Doxing
b) Data breaching
c) Personal data
copying
d) Secure File
Transferring Protocol
a) Threat
b) Vulnerability
c) Exploit
d) Attack
A cyber-criminal or 1 point
penetration tester
uses the additional
data that stores
certain special
instructions in the
memory for
activities to break
the system in
which of the
following attack? *
a) Clickjacking
b) Buffer-overflow
c) Phishing
d) MiTM
The Cybercrime 1 point
Prevention Act
officially recorded
as
__________________
__________ is a law
in the Philippines
that aims to
address legal
issues concerning
online interaction. *
following is not a
step followed by
cyber-criminals in
data breaching? *
a) Exfiltration
individuals who
work for terrorist
organizations and
steal information of
nations and other
secret intelligence
are _________ *
a) State sponsored
hackers
c) Cyber Terrorists
It is an electronic 1 point
device that can be
programmed to
take user input,
process it and
output data *
mainframe computer
supercomputer
computer
microcomputer
A -------- is a 1 point
computer program
that can replicate
itself and spread
from one
computer to
another. *
A. Antivurs
B. PenDrive
C. Mouse
D. Computer Virus
migrates freely
within a large
population of
unauthorized email
user is called a ----
--- *
A. flame war
B. worm
C. macro
D. plagiarism
Code red is a(n) --- 1 point
------- *
A. Word Processing
Software
B. Antivirus
C. Virus
D. Photo Editing
Software
individuals who
maintain and
handles IT security
in any firm or
organization. *
a) IT Security Engineer
b) Cyber Security
Interns
c) Software Security
Specialist
d) Security Auditor
Which of the 1 point
following is the
hacking approach
where cyber-
criminals design
fake websites or
pages for tricking
or gaining
additional traffic? *
a) Pharming
b) Website-Duplication
c) Mimicking
d) Spamming
collection of
programs,
procedures, and
routines involved
with the operation
of computer
system is referred
to as: *
computer hardware
system software
computer software
application software
When any IT 1 point
product, system or
network is in need
for testing for
security reasons,
then the term used
is called _________
*
a) Threat
b) Vulnerability
c) Target of Evaluation
d) Attack
c) Hactivists
A. modification
B. insertion
C. hard to assure
identity of user on a
remote system
firm or
organization is
maintained and
handled by
__________________
__ *
a) Software Security
Specialist
b) CEO of the
organization
c) Security Auditor
d) IT Security Engineer
Which of the 1 point
following is not an
advantage of cyber
security? *
b) Minimizes
computer freezing and
crashes
c) Gives privacy to
users
d) Protects system
against viruses
following is known
as Malicious
software? *
A. illegalware
B. badware
C. malware
D. maliciousware
Which of the 1 point
following is defined
as an attempt to
steal, spy, damage
or destroy
computer systems,
networks, or their
associated
information? *
a) Cyber attack
b) Computer security
c) Cryptography
d) Digital hacking
cybercrimes are
committed by
impersonating
trusted and
popular brands
creating fake social
media profiles and
rogue websites to
lure users into
them. *
cybersex
identity theft
phishing scam
internet fraud
In which year has 1 point
hacking become a
practical crime and
a matter of
concern in the field
of cyber
technology? *
a) 1991
b) 1983
c) 1970
d) 1964
B. fire attacks
C. virus attacks
D. unauthorised
access
What is short for 1 point
malicious software
(is software
designed to disrupt
computer
operation, gather
sensitive
information, or
gain unauthorized
access to
computer
systems)? *
A. Malware
B. Moleculewar
C. Malisoft
D. Malairasoft
In IP address, IP is 1 point
abbreviated as
__________ *
a) Internet Program
b) Internet Protocol
c) Intuition Programs
d) Internet Pathway
_________ is an act 1 point
of hacking by the
means of which a
political or social
message is
conveyed. *
a) Hacktivism
b) Whistle-blowing
c) Surveillance
d) Pseudonymization
the video-sharing
website. *
Tumblr
youtube
internet
_______ is the 1 point
method of
developing or
creating a
structurally similar
yet unauthentic
and illegitimate
data of any firm or
company. *
a) Data copying
b) Data masking
c) Data breaching
d) Data duplicating
a) Sponsored hackers
b) Crackers
c) Hactivist
d) Whistleblowers
d) Whistleblowers
piracy
internet fraud
phishing scam
identity theft
Which is the legal 1 point
form of hacking
based on which
jobs are provided
in IT industries and
firms? *
a) Cracking
b) Non ethical
Hacking
c) Ethical hacking
d) Hactivism
from computer
hacker, you should
turn on a *
A. Script
B. Firewall
C. VLC
D. Antivirus
Governments hired 1 point
a) Nation / State
sponsored hackers
b) CIA triad
c) Special Hackers
d) Government
Hackers
following is an
objective of
network security? *
a) Confidentiality
b) Integrity
c) Availability
following ethical
hacking technique
is used for
determining which
operating system
(OS) is running on
a remote
computer? *
a) Operating System
fingerprinting
b) Operating System
penetration testing
c) Digital-printing
d) Machine printing
Media
Technology
Communication
Information
________ are the 1 point
combination of
both white as well
as black hat
hackers *
following DDoS in
mobile systems
wait for the owner
to trigger the
cyber attack? *
a) botnets
b) programs
c) virus
d) worms
Suicide Hackers 1 point
are those _________
*
b) individuals with no
knowledge of codes
but an expert in using
hacking tools
A. Ms Word
B. Ms Access
C. Antivirus
D. Computer Virus
A collection of 1 point
interconnected
devices that
process, store, and
input data and
information *
computer networking
computer system
computerization
information system
Which of the 1 point
following is a type
of cyber attack? *
a) Phishing
b) SQL Injections
c) Password Attack
following is a
Stuxnet? *
a) Trojan
b) Antivirus
c) Worm
d) Virus
following is a
component of
cyber security? *
a) Internet Of Things
b) AI
c) Database
d) Attacks
Backdoors are also 1 point
known as
____________ *
a) Trap doors
b) Front doors
c) Cover doors
d) Back entry
is activated by a
time related event,
it is known as -----
-- *
A. virus
B. trojan horse
D. time bomb
Hackers who help 1 point
in finding bugs and
vulnerabilities in a
system & don’t
intend to crack a
system are termed
as ________ *
also known as
_________ *
a) Data obfuscation
b) Data copying
c) Data breaching
d) Data duplicating
Which of the 1 point
following would
most likely not be a
symptom of a
virus? *
B. Odd message or
images are displayed
on the screen
C. Existing program
files and icons
disappear
communication
practiced in
corporate
meetings,
conferences,
academic
seminars,political
sessions and
juridical
proceedings. *
Informal
Communication
Non-Verbal
Communication
Formal
Communication
Verbal
Verbal
Communication
Malwares to a
system or
network? *
a) Criminal
organizations, Black
hat hackers, malware
developers, cyber-
terrorists
b) Criminal
organizations, White
hat hackers, malware
developers, cyber-
terrorists
c) Criminal
organizations, Black
hat hackers, software
developers, cyber-
terrorists
d) Criminal
organizations, gray
hat hackers, Malware
developers,
Penetration testers
security protect? *
a) Cyber security
protects criminals
b) Cyber security
protects internet-
connected systems
c) Cyber security
protects hackers
d) None of the
mentioned
Which of the 1 point
following virus
overtake computer
system, when it
boots and destroy
information? *
A. System infectors
B. Trojan
C. Boot infectors
D. Stealth virus
a) MiTM
b) Injecting Trojans to
a target victim
d) Phishing
The first computer 1 point
virus is -------- *
A. I Love You
B. Blaster
C. Sasser
D. Creeper
Back Next
Clear form
Forms