Intro To Cybercrime FC

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 21

INTRODUCTION TO CYBERCRIME WITH ENVIRONMENTAL LAWS AND PROTECTION FINAL

COACHING
Prepared by: Prof Karolina Erika A. Buted. RCrim CCS

1. acts as digital fingerprints since they are unique to the original data they reference.
A. Hash Algorithm
B. Message Digest 5
C. Hash Values

PNO ANTI-CYBERCRIME GROUP MODEL


1. identification  stage in cf  computer forensic investigation  investigator
explains and documents the origin of the evidence and its significance
2, DATA Acquisition  first step in the forensic process
 Acquisition  process of evidence retrieval in cf investigations
 Imaging  process of getting the exact copy of the original drive into a
new digital storage device
 Verification  final step in preservation process of digital evidence
o Hash algorithm  set of calculation that takes any amount of
data
3. EXAMINATION/ANALYSIS -> INTREPRETATION AND RECONSTRUCTION OF THE DIGITAL CRIME
SCENE
4. REPORTING/ DOCUMENTATION  FINALIZATION OF REPORT
5. COURT PRESTATION --. COMPUTER FORENSIC INVESTIGATOR  MUST PREPAPRED TO
TESTIFY IN COURT (EXPERT WITNESS)

2. the first step in the forensic process and is critical to ensure the integrity of the
evidence.
A. Identification
B. Data Acquisition
C. Examination
D. Reporting

3. it authorized law enforcement officers to carry out any or all of the following activities:
listen, record, monitor surveillance of the content of communications.
A. Warrant to Disclose Computer Data  REQUIRES ANY PERSON / SERVICE
PROVIDER  DISCLOSE SUBCRIBER’S INFORMATION, RELEVANT DATA  W/IN
72 HRS FROM THE RECEIPT OF THIS ORDER
B. Warrant to Intercept Computer Data
C. Warrant to Search, Seizure, and Examination of Computer Data  PARANG
SEARCH WARRANT  ISSEARCH COMPUTER DATA
D. Warrant to Examine Computer Data  WHEN A COMPUTER DEVICE OR SYSTEM
IS PREVIOUSLY SEIZED BY ANOTHER

4. requires any person or service provided to disclose subscriber`s information, traffic


data, or relevant data in his/her or its possession or control within 72 hours from
receipt of the order.
A. Warrant to Disclose Computer Data
B. Warrant to Intercept Computer Data
C. Warrant to Search, Seizure, and Examination of Computer Data
D. Warrant to Examine Computer Data

5. Who has the power to formulate a national cyber security plan and extend immediate
assistance for the suppression of real-time commission of cybercrime offenses
A. CERT
B. CICC SEC 23 RA 10175  CYBERCRIME INVESTIGATION AND COORDINATING
CENTER
C. NBI
D. PNP

6. Who shall head the CICC?


A. Director of the NBI
B. Chief of the PNP
C. Executive Director of ICTO-DOST  INFORMATION AND COMMUNICATIONS
TECHNOLOGY OFFICE – DEPARTMNET OF SCIENCE AND TECHNOLOGY
D. Head of the DOJ
VICE CHAIRPERSON  NBI DIRECTOR
HEAD OF THE DOJ OFFICE OF CYBERCRIME
1 REP FROM THE PRIVAT SECTOR AND ACADEME

7. A representative from the private sector and academe should also be a part of the CICC.
A. True
B. False
C. Partly True
D. Partly False

8. Thereby created an Office of Cybercrime within the ______ designated as the central
authority in all matters related to international mutual assistance and extradition an
inter-agency body known as the CICC
A. NBI
B. PNP
C. DOJ
D. Office of the President

9. Any person who willfully abets or aids in the commission of any of the offenses
enumerated in this Act (10175)shall be held liable.
A. Frustrated in the Commission of Cybercrime
B. Attempt in the Commission of Cybercrime
C. Aiding or Abetting in the Commission of Cybercrime
D. None of the Above

10. Any person who willfully attempts to commit any of the offenses enumerated in this Act
shall be held liable.
A. Attempt in the Commission of Cybercrime
B. Frustrated in the Commission of Cybercrime
C. Aiding or Abetting in the Commission of Cybercrime
D. None of the Above

1 degree lower than the prescribed penalty

11. The transmission of commercial electronic communication with the use of computer
system which seek to advertise, sell or offer for sale products and services are
prohibited.
A. Cybersex
B. Virtual sex
C. Unsolicited Commercial Communications  hindi na ito prohibited act under RA
10175
D. Child Pornography

Ra 10173  data privacy act

12. It is the willful engagement, maintenance, control, or operation, directly or indirectly of


any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer
system, for favor or consideration.
A. Child Pornography  RA 9775  committed under computer system  impose
 1 degree higher
B. Cybersex
C. Unsolicited Commercial Communications
D. Virtual sex
13. The input, alteration, or deletion of any computer data without right resulting in
inauthentic data with the intent that it be considered or acted upon for legal purposes
as if it were authentic, regardless whether or not the data is directly readable and
intelligible
A. Computer-Related Forgery
B. Computer-Related Fraud  unauthorized input, alteration, deletion  fraudulent
intent
C. Computer-Related Identity Theft  intentional acquisition, use misuse, transfer
of possession of information belonging to another person
D. Misuse of Devices  use, production sale, procurement,
importation ,distribution, or otherwise making available without right

14. The acquisition of a domain name over the internet in bad faith to profit, mislead,
destroy reputation, an deprive others from registering the same.
A. Cybersquatting
B. Misuse of Devices
C. Computer-Related Forgery
D. Computer-Related Fraud

15. The intentional alteration on reckless hindering or interference with the functioning of a
computer or computer network by inputting, transmitting, damaging, deleting,
deteriorating, altering or suppressing computer data or program, electronic document,
or electronic data message, without right or authority including the introduction or
transmission of viruses.
A. Cybersquatting
B. Data Interference
C. System Interference
D. Illegal Interference  illegal interception lang

DDOS/ DOS
DENIAL OF SERVICE ATTACK
Botnets  infected computers  DDOS
16. The use, production, sale, procurement, importation, distribution, or otherwise making
available, without right.
A. Illegal Access
B. Cybersquatting
C. Data Interference
D. Misuse of Devices

17. The intentional or reckless alteration, damaging, deletion or deterioration of computer


data, electronic document, or electronic data message, without right, including the
introduction or transmission of viruses.
A. Illegal Access
B. Data Interference
C. Data Interception
D. Illegal Access

18. Made by technical means without the right of any non-public transmission of computer
data to, from, or within a computer system including electromagnetic emissions from a
computer system carrying such computer.
A. Illegal Interception
B. Illegal Access
C. Data Interference
D. Data Interception

19. Any means of account access that can be used to obtain money, good, services, or any
other thing of value or to initiate a transfer of funds.
A. Access Device  RA 8484
B. Accessible Device
C. Access Gadget
D. Accessible Gadget

20. Designated the DOJ as the central authority in all matters that relates to Mutual Legal
Assistance Treaty (MLAT) and extradition for cybercrime and cybercrime related
offenses.
A. RA 4200
B. RA 8484
C. RA 10185
D. RA 10175  cybercrime prevention act of 2012
21. International cooperation and prosecution of cybercrime.
A. Group 8
B. Budapest Convention (2001)
C. Budapest Convention (2002)
D. Group 7

GROUP 8 (G8)  russia


G8  FUCUJIG
FRANCE, US, CANADA, UK, JAPAN. ITALY, GERANY

22. A type of scam in which criminals attempt to obtain someone's personal information by
pretending to be a legitimate business, neighbor or some other innocent party.
A. Spoofing
B. Scamming
C. Pharming  ADVANCE FORM PHISING  REDIRECTS THE CONNECTION
BETWEEN THE IP (INTERNET PROTOCOL) ADDRESS AND ITS TARGET SERVER
D. Phishing  SOLICITATION OF INFORMATION VIA EMAIL OR FAKE WEBSITES

23. A type of malware that enables the remote monitoring of a computer user`s activities
or information on an individual’s computer when this software has been installed.
A. Keyloggers  RECORDS EVERY KEYSTROKE OF THE USER
B. Sniffers  COLLECTS INDIVDUAL’S USERNAME, PASSWORDS, OTHER PERSONAL
INFORMATION
C. Spyware
D. Malicious Software/MALWARE  CODES THAT CAUSE DAMAGE TO THE
COMPUTER SYSTEM

24. A type of software that is used to monitor and analyze networks, but can also be used to
collect individual’s` usernames and passwords and other personal information.
A. Keyloggers
B. Eavesdroppers
C. Spy
D. Sniffers
25. A malware which is hidden inside what appears to be legitimate software or download.
A. Worm  SPREAD AUTONOMOUSLY
B. Bundlers
C. Backdoor  USED TO GET UNAUTHORIZED ACCESS TO WEBSITE
D. Trojan Horses  MALWARE TRICKS USER THINKS THAT IT IS LEGITIMATE

26. A type of malware that tricks the computer user into thinking that it is a legitimate
software but actually contains hidden functions.
A. Trojan Horses
B. Dark Horses
C. Backdoor
D. Virus  SPREAD ITSELF TO OTHER COMPUTERS

27. A hacking technique where the attacker can buy advertising spaces on the websites and
when a user clicks on the ad, he might get directed to a page that's infected with
malware.
A. Cookie Theft (COOKIE  PERSONAL DATA SUCH BROWSING HISTORY,
USERNAME, PASSWORDS)
B. Virus
C. Bait and Switch
D. ClickJacking  UI redress

28. Illegal Copyright Infringement is referred to as ____


A. War
B. Source
C. Fraud
D. Warez

29. In the past decades, groups of individuals have been working together to illegally obtain
software and then "crack" or "rip" its copyright protections before posting it on the
internet.
A. Illegal Copyright Infringement
B. Denial of Service Attack
C. Distributing Illegal Sexual Material
D. Internet Securities Fraud
30. Some internet criminals threaten to or actually flood an internet site with millions of
bogus messages and/ or orders so that site services will be tied up and unable to
perform as promised.
A. Internet Securities Fraud
B. Illegal Copyright Infringement
C. Distributing Illegal Sexual Material
D. Denial of Service Attack

31. It refers to the technologies that facilitate the transmission of data across the network.
A. Computer
B. Laptop
C. Internet
D. Electronics

32. It is the fraudulent attempt to obtain sensitive information such as usernames,


passwords and credit card details by disguising oneself as a trustworthy entity in an
electronic communication.
A. Fishing
B. Spamming
C. Cyberstalking
D. Phishing

33. It is also known as identity fraud, is a crime in which an imposter obtains key pieces of
personally identifiable information, such as Social Security or driver's license numbers,
in order to impersonate someone else.
A. Carding
B. Bank fraud
C. Extortion
D. Identity theft

34. In computer related crimes, it is the use of potentially illegal means to obtain money,
assets, or other property owned or held by a financial institution, or to obtain money
from depositors by fraudulently posing as a bank or other financial institution.
A. Bank fraud
B. Financial crimes
C. Computer fraud
D. Internet fraud
35. When was the year that the first recorded cybercrime took place?
A. 1866
B. 1890
C. 1843
D. 1820

36. It is the manipulation of telecommunications carriers to gain knowledge


telecommunications, and or theft of applicable service.
A. Hacking --. Modification of technology
B. Crackers/hackers  hacking/cracking
C. Phreaking
D. Kicking
Hacker 
Crackers

37. Who developed and demonstrated the television system?


A. Vladimir Zworyki
B. Ben Armstrong
C. Alexander Bell
D. Emile Bandot

38. He developed the electric telegraph in which letters of the English alphabet are
represented by a sequence of dots and dashes.(morse code)
A. Samuel Morse
B. Alessandro Morse
C. Graham Bell
D. Gugliermo Marconi

39. What are the earliest inventions of great significance to communication by Alessadro
Volta?
A. computer and calculator
B. Laptop and telephone
C. Telegraph and camera
D. Telephone and telegraph
40. There are two modes of committing cybercrime, except?
A. Through the means of Digital Devices, ICT Devices, Computer
B. Both A and C
C. The Computer, Network itself is the target of the attack
D. The cords, electrical wires are the target of the attack

Committing cybercrime
Computer victim (DOS)
COMPUTER MEANS  PORNOGRAPHY/ CYBERSEX

41. It is defined as offenses that are committed against individuals or groups of individuals
with a criminal motive to intentionally harm, using modern telecommunication
networks.
A. Cyber offense
B. Cyber libel
C. Cybercrime
D. Crime

42. A type of spyware that records every keystroke of the user and report this information
back to its source.
A. Spyware
B. Keyloggers
C. sniffers
D. Spoofing

43. Are compromised computers attached to the internet which are often used to remotely
perform malicious or criminal tasks.
A. Bots
B. Botnets
C. Zombies
D. All of the above
44. It is a group of hackers from around the world who meet on online message boards and
social networking forums encouraging civil disobedience and/or unrest via denial-of-
service attacks, publishing victim’s personal information online, as well as defacing and
defaming websites.
A. Anonymous
B. Jonathan James  FIRST JUVENILE -> CYBERCRIME 16 YO  HACKING (SUICIDE)
C. Andrian Lamo
D. Kevin Mitnick

ONEL DE GUZMAN  I LOVE YOU VIRUS / LOVE BUG


ITO YUNG NAGTULAK SA CREATIOM N  RA 8792  ELECTRONIC COMMERCE ACT
RA 8792  JJ MARIA GINER

45. Hackers target the most accessed physical location to attack the victim like a coffee
shop, a cafeteria, etc. and they might create a fake Wi-Fi access point and modify your
most visited website to redirect them to you to get your personal information.
A. Eavesdropping (Passive Attacks)
B. Waterhole attacks
C. Virus, Trojan etc.
D. Phishing

46. In this attack, the hacker hides the actual UI where the victim is supposed to click.
A. Bait and switch
B. Cookie theft
C. Fake WAP
D. ClickJacking Attacks

47. A person who gains unauthorized access to computer files or networks in order to
further social or political ends.
A. Cybercriminal  PERSON WHO COMMITS CYBERCRIME
B. Hacker
C. Cracker
D. Hacktivist

48. They have the knowledge of black hats but decided to be on the right side of the law.
They work doing penetration, hired to attempt to break into the company's networks to
find and report on security vulnerabilities.
A. Black-hat  MALICIOUS INTENT
B. Gray-hat  JUST FOR FUN
C. White-hat
D. Green-hat

49. Individuals whose intent is wreaking havoc via internet, this category includes
vandalism, destructive programs, and general mischief for no economic gain.
A. Script Kiddie  LOWEST FORM OF CYBERCRIMINAL
B. Cyberpunks
C. Hackers
D. Crackers

50. It is used to refer to the spaces within computers and the spaces between computers
(across networks) where people interact with information and with each other.
A. Cyber security
B. cyberspace  William Gibson
C. cybercrime
D. computer space

51. It occurs when a person uses the internet to steal someone's identity and/ or
impersonate them to open a new credit card account or conduct some financial
transactions.
A. Computer forgery
B. Ponzi scheme
C. Identity theft
D. Ponzi scheme
Ponzi/Pyramid Schemes - these are investment schemes in which investors are
promised abnormally high profits on their investments. No investments are actually
made. Early investors are paid returns with the investment money received from the
later investors.
Non-delivery of goods - this involves the non-delivery of goods and services that were
purchased or contracted remotely through the Internet. Online-auction sites are a fertile
ground for fraud. Goods may never be sent or, if they are, they may be damaged,
counterfeit or stolen.

52. This is a global array of computers connected by a high-speed reliable network. it


connects millions of computers, allowing for the rapid exchange of information,
education, military, criminal justice system and business professionals as well as
researchers using the system to send and retrieve information.
A. Internet
B. WIFI
C. Website
D. Cyber security
53. Its focus on intercepting data such as password, usernames, email messages, and even
secret data using sniffing software.
A. Counter-attack
B. Active attack  attempt to cause harm to computer systems by explaining
system faults and vulnerabilities
C. Passive attack
D. Negative attack

54. A practice to protect a subject against cybercrime.


A. Cyber protect
B. Cyber law
C. Anti-virus
D. Cyber security

55. The first ransomware virus created in the year 1989 by Joseph L. Popp.
A. “AIDS Information – Introductory Diskettes”
B. denial of service attack
C. Love Bug
D. Malwares

56. In 1976, first spam email took place when it was sent out over the __________.
A. Internet
B. ARPANET  Advanced Research Projects Agency Network
C. web
D. computer

Robert Morris Jr. 1988 – released the “first internet worm” through ARPANET
- it is the Internet`s first “denial of service attack” (DOS)

57. This crime occurs when individuals make securities recommendations and fail to
disclose that they are being paid to disseminate their favorable opinions.
A. Market Manipulation
B. Embezzlement
C. Illegal Touting
D. Fraudulent Offering of Securities

58. They have the knowledge of black hats but decided to be on the right side of the law.
A. Black Hats  malicious intent
B. Hackers
C. Gray Hat  just for fun
D. White Hat
59. These are malicious software programs which get installed into the victim’s system and
keep sending the victims data to the hacker.
A. Virus, Trojan, etc.
B. Cookie Theft
C. DoS/DDoS
D. Fake WAP

60. He was convicted of a number of criminal computer crimes after evading authorities for
two and a half years. Once one of the FBI's Most Wanted for hacking into networks of
40 high-profile corporation.
A. Anonymous
B. Kevin Mitnick
C. Adrian Lamo –> He hacked into the systems of several organizations, including
The New York Times, Microsoft and Yahoo to exploit their security flaws
D. Jonathan James

61. An advance form of phishing which redirects the connection between an IP Address and
its target server.
A. Spoofing
B. Redirectors
C. Pharming
D. Floating Windows –> phishers may place floating windows over the address bars to
in Web browsers.

62. The process of making an exact copy of the original drive onto a new digital storage
device.
A. WDCD
B. WICD
C. WECD
D. WDCD

1. Warrant to Disclose Computer Data – A WDCD requires any person or service


provided to disclose subscriber`s information, traffic data, or relevant data in his/her or
its possession or control within 72 hours from receipt of the order
2. Warrant to Intercept Computer Data – it authorized law enforcement officers to
carry out any or all of the following activities: listen, record, monitor surveillance of the
content of communications.
3. Warrant to Search, Seizure, and Examination of Computer Data - A WSSECD is
like a search warrant, except the subject matter of a WSSECD is computer data.
4. Warrant to Examine Computer Data – A WECD is a warrant issued when a
computer device or system is previously seized by another lawful method such as
warrantless arrest.
63. It is the process of making an exact copy of the original drive onto a new digital storage
device
A. Identification
B. Acquisition
C. Examination
D. Imaging

64. Known as “Data Privacy Act of 2012”


A. Republic Act 8792
B. Republic Act 10173
C. Republic Act 9995
D. Republic Act 10175

65. It is a hacking technique using which a hacker replicates the most-accessed sites and
traps the victim by sending that spoofed link.
A. Bait and Switch
B. Cookie Theft
C. Phishing
D. Eavesdropping

66. It is generally used to describe a person with these skills who decides to apply them
toward a damaging or illegal purpose.
A. Hacker
B. Hacking
C. Cracking
D. Hacktivist

67. It is the lowest life form of cybercriminal, they are generally not capable of writing their
own programs.
A. Script Kiddie
B. Hacker or Crackers
C. Cybercriminal organizations
D. Cyberpunks

68. An approach to prevent any cyber-attacks.


A.Computer Incident Response
B.Computer Forensics
C. Cybercrime Prevention Act
D. Computer Security Incident
Computer Incident Response - This is an organized approach to addressing and managing the
aftermath of a security breach or cyberattack.
Computer Forensics - Technically, the term computer forensics refers to the investigation of
computers

69. RA 10175
A.Cybercrime Preventative Act of 2011
B.Cybercrime Prevention Act of 2012
C. Cybercrime Preventative Act of 2012
D.Cybercrime Prevention Act of 2011

70. An organized approach to addressing and managing the aftermath of a security breach
or cyberattack
A. Computer Security Incident
B. Computer Forensics
C. Computer Incident Response
D. Digital Forensic

71. Crime that leaves digital tracks


A. Computer Worm
B. Trojan Horse
C. DoS Attack
D. Embezzlement

72. Large enough in scale and magnitude in which a significant impact can be felt in both
regarding cost and human emotion
A. Cybercrime
B. Cyber Terrorism
C. Cyber Threats
D. Cyber-attacks

73. It is the discipline that combines the elements of law and computer science to collect
and analyze data from computer systems, networks, wireless communications, and
storage devices in a way that is admissible as evidence in a court of law.
A. Computer Forensics
B. Computer Incident Response
C. Digital Forensics
D. Computer Security Incident

74. Known as Anti-Child Pornography Act of 2009


A. RA 9262
B. RA 9775
C. RA 9372
D. RA 8792

75. An example of computer used to commit a crime


A. E-mail Spam
B. DoS Attack
C. Scanning a System
D. Malicious Code

76. The following are definitions of “Forensics” except


A. short term of Forensic Science
B. use of science in administration of justice
C. not a plural of Forensic
D. came from the Latin word “forensis”

77. Use of gear method that destroys coral reefs, seagrass beds, and other fishery marine
life habitat.
A. Illegal fishing
B. Muro-Ami
C. Use of fish mesh net
D. Use of superlights

78. It is an act to control toxic substances and hazardous and nuclear wastes, providing
penalties for violations thereof, and for other purposes.
a. RA 4850 laguna lake development authority
b. RA 6969
c. RA 3751 ilocos norte educational and cultural asso
d. RA 7076  small scale mining program

79. This decree is known as Marine Pollution Decree of 1976.


a. PD 979
b. PD 1067 water code
c. PD 1151 ph environmental policy
d. PD 1433 plant quarantine law

80. It is the rapid loss of trees and vegetation, as well as the underlying habits that make up
forests.
A. Illegal logging
B. Deforestation
C. Global warming
D. Illegal cutting
81. It is a dense layer of ozone gas. It protects us form the dangerous ultraviolet rays of the
sun.
A. Clouds
B. Ozone layer
C. Biodiversity
D. Solar System

82. It is the law the was enacted that penalized the crime of photo and video voyeurism.
A. RA 4200
B. RA 8484
C. RA 10175
D. RA 9995

83. The law the prohibits unlawful listening private conversations.


A. RA 4200
B. RA 8484
C. RA 10175
D. RA 9995

84. An offense committed when the accused have access to the whole or any part of a
computer system without right.
A. Illegal Access
B. Illegal Interception
C. Data Interference
D. System Interference

85. Can be described as a software program that is designed to spread itself to other
computers and to damage or disrupt a computer such as interrupting communications.
A. Virus
B. Backdoor
C. Trojan horses
D. Computer worm

86. A type of malware that enables the remote monitoring of a computer user’s activities or
information on an individual’s computer when this software has been installed
A. Spyware
B. Trojan horses
C. Virus
D. Computer worms
87. The goal of ___ is to determine and uncover evidence that verifies or denies a
suspension and support a legal proceeding
A. Digital Forensics
B. Cybersecurity
C. Cybercrime
D. Digital Security

88. The part of the computer where all other computer components are connected.
A. Motherboard
B. RAM
C. Processor
D. Circuit Board

89. The ______ is the process of using mathematical algorithm against data to produce a
numeric value that is representative of that data.
A. Imaging
B. Cloning
C. Hashing
D. Computing

90. He is considered as the creator of the 1st internet worm in 1988.


A. Robert Morris Jr.
B. Kevin Poulsen
C. Kevin Mitnick  most notorious hacker
D. David Smith  released Melissa Worm

91. Immediate physical and social setting in which people live or in which something
happens or develops
A. Built Environment
B. Manmade Environment
C. Social Environment
D. Natural Environment

1. Built environment – human made surroundings providing setting for human activity
2. Natural Environment – all living and non-living things occurring naturally on Earth
3. Social Environment – immediate physical and social setting in which people live or in which
something happens or develops

92. Shall refer to waste generated from planting or harvesting of crops, trimming or pruning
of plants and wastes or run-off materials from farms or fields
A. Agricultural Waste
B. Bulky Waste
C. Municipal Waste
D. Consumer Electronics

93. Shall refer to the controlled decomposition of organic matter by micro-organisms,


mainly bacteria and fungi, into a humus-like product
A. Buy-back Center
B. Composting
C. Controlled Dump
D. Agricultural Waste

94. Shall refer to solid waste or combination of solid waste which because of its quantity,
concentration, or physical, chemical or infectious characteristics.
A. Hazardous Waste
B. Generation
C. Leachate
D. Controlled Dump

95. Shall refer to household hazardous wastes such as paints, thinners, household batteries,
lead-acid batteries, spray canisters and the like.
A. Solid Waste
B. Special Waste
C. White Goods
D. Yard Waste

96. Shall refer to the liquid produced when waste undergo decomposition, and when water
percolate through solid waste undergoing decomposition.
A. Municipal Waste
B. Post-Consumer Material
C. Leachate
D. Special Wastes

97. Shall refer to a solid waste management practice of separating different materials found
in solid waste in order to promote recycling and re-use of resources and to reduce the
volume of waste for collection and disposal.
A. Re-use
B. Segregation
C. Composting
D. Recycle

98. Shall refer to a disposal area wherein the solid wastes are indiscriminately thrown or
disposed of without due planning and consideration for environmental and health
standards.
A. Open Dump
B. Municipal Waste
C. Materials Recovery Facility
D. Controlled Dump

99. Shall refer to the act or process of producing solid waste.


A. Composting
B. Materials Recovery Facility
C. Segregation
D. Generation

100. shall refer to a recycling center that purchases or otherwise accepts recyclable
materials from the public for the purpose of recycling such materials.
A. Materials Recovery Facility
B. Municipal Waste
C. Buy-back Center
D. Controlled Dump

You might also like