Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

CDI 4 ORGANIZED CRIME INVESTIGATION

1. It is the maximum imprisonment for violations of e commerce act of 2000 C 6 years


2. The members of the Chines Triad is known as? In Chines: CHOR KWUN B triad head
3. These groups were established by Chinese immigrants, initially consisted primarily of former
soldiers of china. C triad
4. It is an illegal smuggling of alcoholic beverages A bottlegging
5. Piracy as violation of E-commerce act of 2000 has mandatory imprisonment of C 6 months to 3
yrs
6. Under RA 9160, the initial stage of money laundering is A placement
7. What is the key to gaining an inside information a terrorist group? A knowledge of the person
and organization
8. These are Italian Organize Crime, except? C cali cartel
9. it is a center created by Executive Order no. 62 to establish a shared data base among
concerned agencies for information on criminals, methodologies, arrest and convictions on
transnational crime? A Philippines Center on Transnational Crime PCTC
10. The term cyberspace was coined by A William Gibson
11. The following are examples of cybercrime as violation of E commerce act of 2000 C B,C and E
12. Republic act 9208 is also known as C anti-trafficking in persons act of 2003
13. The first important step to take in combating trafficking in women from the human rights
perspective would be: D all of these
14. It is a crime whereby the proceeds of unlawful activity are transacted or attempted to be
transacted, to make them appear to have originated from legitimate source: C money
laundering
15. It is the attribute of organized crime having a vertical power structure with a least three
permanent ranks-not just leader and followers each with authority over the level beneath A
hierarchical
16. This theory refers to those processes by which the community influence its members towards
conformity with established norms and behavior B anomie
17. In what terrorist group does Abu Sayyaf is formerly included: B MNLF
18. In Arabic, abu sayyaf means C father of swordman
19. The most brutal killer in history who terrified US who assaulted and murdered numerous young
women and girl in his era? A Ted Bundy
20. This is the country which is believed to be origin of Mafia and Cosa Nostra C Italy
21. Referred to as the “The System” by insider, has it’s branches all over the world. It is a mafia like
criminal investigation, or secret society, originating in the region of Campania and its capital
Naples in Italy. B camora
22. A mafia like criminal organization from Apulia region in southern Italy, and is especially active in
the areas of Brindisi, Lecce and Taranto. C Sacra Corona Unita
23. Nicknamed Yaponchik “little Japanese” was from shortly after his arrival in the united states in
1992 until his arrest by the FBI in 1995 a mysterious and even mythical figure. A vyacheslav
ivankov
24. Florida is the home of this crime family, a small family named for its two most notable former
bosses, Santo Trafficante, Sr. and Santo Trafficante, Jr. Although once a major power in the
national mafia. B trafficante family
25. It was founded in New York City at Joe the Boss “Masseria and Charlie “lucky” luciano named
afte Vito Genovese in 1892. It is operating in various neighborhoods in New York City and
throughout the USA. C Genovese Family
26. It was founded in NY by Salvatore “TOTO” D Aquila in 196 B Gambino Family
27. A crime family formed in NYC in 1928 founded by Joseph Profaci C Colombo Family
28. Members refer to themselves as, a half century old boast playing off the saying that 1% of
trouble makers give a bad name of 99% of receptacle bikers. C one percenter’s
29. Participating is some club activities, but not having voting privileges, while he is evaluated for
the suitability as a full member. B prospect
30. Stealing the identity of others in the form of their credit card numbers, drives license numbers,
Social Security Numbers, or other personal identification. This is the emerging crimes done by
new faces of organized crime groups. B Identity theft
31. A public officials, law enforcement officers or anybody who not a member of organization who
can help the organization. D Corruptee
32. What type of OCG which is manned by semi-organized individual with the end view of attaining
psychological gratification such as adolescent gang. A In-Group Oriented Organized Crime
33. A continuing illegal activity of group of person which is primarily concerned with the generation
of profits, irrespective of national boundaries as a result of globalization. A Transnational
Organized Crime
34. What category of terrorist group which is dedicated to overthrow an established order and
replacing it with a new political or social structure? C revolutionary
35. ICT in electronic commerce act of 2000 stands for B Information Communication Technology
36. Economic crime is known as: C white collar crime
37. T is the Latin term meaning of frighten B terrere
38. It refers to the code of silence and secrecy that forbids Mafioso from betraying their comrades C
omerta
39. It was an event said to be the origin conflict in Mindanao and for the establishment of Moro
National Liberation Front MILF D Jabbida massacre
40. Terrorist who used to be the most wanted terrorist in the world who issued a “fatwa” that calls
all muslim around the world to slay Americans and their allies D Osma Bin Laden
41. An asian organized crime that represents mythical symbol in the form of an equilateral triangle
representing the heaven, earth and human. A yakuza
42. An event how political ideologies terrorize the world wherein many youth pro-democracy
protesters were killed by the People’s Liberation Army under the orders of Denx Xiaoping. C
Tiannamen massacre
43. Chain of custody should be observed by the investigating team of cybercrime A the statement is
wrong
44. Under e commerce Act of 2000, internet cafes and cyber cafes, where majority of cybercrime
are perpetuated, are legally required to have permanent logs and records of their clients C the
statement is false
45. The e-commerce Act of 2000 provide the telecommunication companies are legally bound to
cooperated with law enforcement agencies in the course of their investigation A the statement
is absolutely correct
46. It is the maximum imprisonment for violation of e-commerce act of 2000 C 6 years
47. The crime of human trafficking shall qualified when: D all of the above
48. This refers to any distinctive mark, characteristic and or sound in electronic form, representing
the identity of person and attacked to or logically associated with the electronic data message. B
electronic signature
49. Only a computer science expert should search for any evidence contained in the computer
hardware. A the statement is absolutely correct
50. It refers to an act sending fraudulent e-mails or website pop-ups, to get victims to divulge
sensitive financial problem information such as credit card numbers or social security numbers.
A Phishing.

You might also like