Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

EVALUATION A company's confidential data has been

Question 1: leaked online. Analyze the possible


What is the potential legal consequence of cybercrime category that best fits this
unauthorized access to a computer system scenario:
under RA 10175? a. Cyberespionage
a. Fine and imprisonment b. Identity theft
b. Community service c. Cyberbullying
c. Warning letter d. Cyberstalking
d. Monetary compensation Correct Answer: a. Cyberespionage
Correct Answer: a. Fine and imprisonment
Question 3:
Question 2: An individual intentionally spreads false and
Which action would be classified as a damaging information about another person
cybercrime offense under RA 10175? online, tarnishing their reputation. Identify
a. Sending a friendly email to a friend the cybercrime involved:
b. Unauthorized interception of electronic a. Defamation
communications b. Denial-of-service attack
c. Sharing publicly available information c. Spoofing
d. Changing personal account settings d. Phishing
Correct Answer: b. Unauthorized Correct Answer: a. Defamation
interception of electronic communications
Question 4:
Question 3: A hacker gains unauthorized access to a
What type of cybercrime involves altering, government database and alters important
damaging, or deleting data without records. Analyze the specific cybercrime
authorization? committed in this scenario:
a. Phishing a. Unauthorized access
b. Cyberbullying b. Identity theft
c. Hacking c. Denial-of-service attack
d. Spoofing d. Ransomware attack
Correct Answer: c. Hacking Correct Answer: a. Unauthorized access

Question 4:
Which government agency is primarily
responsible for the enforcement of RA
10175 in the Philippines?
a. Department of Justice (DOJ)
b. Department of Education (DepEd)
c. Department of Health (DOH)
d. Department of Transportation (DOTr)
Correct Answer: a. Department of Justice
(DOJ)

ANALYSIS
Question 1:
You have discovered a suspicious email with
a link that claims to be from a reputable
bank, asking for your account details.
Analyze the potential cybercrime involved:
a. Phishing
b. Hacking
c. Cyberbullying
d. Malware attack
Correct Answer: a. Phishing

Question 2:

You might also like