Intro To Cybercrime FC
Intro To Cybercrime FC
Intro To Cybercrime FC
COACHING
Prepared by: Prof Karolina Erika A. Buted. RCrim CCS
1. acts as digital fingerprints since they are unique to the original data they reference.
A. Hash Algorithm
B. Message Digest 5
C. Hash Values
2. the first step in the forensic process and is critical to ensure the integrity of the
evidence.
A. Identification
B. Data Acquisition
C. Examination
D. Reporting
3. it authorized law enforcement officers to carry out any or all of the following activities:
listen, record, monitor surveillance of the content of communications.
A. Warrant to Disclose Computer Data REQUIRES ANY PERSON / SERVICE
PROVIDER DISCLOSE SUBCRIBER’S INFORMATION, RELEVANT DATA W/IN
72 HRS FROM THE RECEIPT OF THIS ORDER
B. Warrant to Intercept Computer Data
C. Warrant to Search, Seizure, and Examination of Computer Data PARANG
SEARCH WARRANT ISSEARCH COMPUTER DATA
D. Warrant to Examine Computer Data WHEN A COMPUTER DEVICE OR SYSTEM
IS PREVIOUSLY SEIZED BY ANOTHER
5. Who has the power to formulate a national cyber security plan and extend immediate
assistance for the suppression of real-time commission of cybercrime offenses
A. CERT
B. CICC SEC 23 RA 10175 CYBERCRIME INVESTIGATION AND COORDINATING
CENTER
C. NBI
D. PNP
7. A representative from the private sector and academe should also be a part of the CICC.
A. True
B. False
C. Partly True
D. Partly False
8. Thereby created an Office of Cybercrime within the ______ designated as the central
authority in all matters related to international mutual assistance and extradition an
inter-agency body known as the CICC
A. NBI
B. PNP
C. DOJ
D. Office of the President
9. Any person who willfully abets or aids in the commission of any of the offenses
enumerated in this Act (10175)shall be held liable.
A. Frustrated in the Commission of Cybercrime
B. Attempt in the Commission of Cybercrime
C. Aiding or Abetting in the Commission of Cybercrime
D. None of the Above
10. Any person who willfully attempts to commit any of the offenses enumerated in this Act
shall be held liable.
A. Attempt in the Commission of Cybercrime
B. Frustrated in the Commission of Cybercrime
C. Aiding or Abetting in the Commission of Cybercrime
D. None of the Above
11. The transmission of commercial electronic communication with the use of computer
system which seek to advertise, sell or offer for sale products and services are
prohibited.
A. Cybersex
B. Virtual sex
C. Unsolicited Commercial Communications hindi na ito prohibited act under RA
10175
D. Child Pornography
14. The acquisition of a domain name over the internet in bad faith to profit, mislead,
destroy reputation, an deprive others from registering the same.
A. Cybersquatting
B. Misuse of Devices
C. Computer-Related Forgery
D. Computer-Related Fraud
15. The intentional alteration on reckless hindering or interference with the functioning of a
computer or computer network by inputting, transmitting, damaging, deleting,
deteriorating, altering or suppressing computer data or program, electronic document,
or electronic data message, without right or authority including the introduction or
transmission of viruses.
A. Cybersquatting
B. Data Interference
C. System Interference
D. Illegal Interference illegal interception lang
DDOS/ DOS
DENIAL OF SERVICE ATTACK
Botnets infected computers DDOS
16. The use, production, sale, procurement, importation, distribution, or otherwise making
available, without right.
A. Illegal Access
B. Cybersquatting
C. Data Interference
D. Misuse of Devices
18. Made by technical means without the right of any non-public transmission of computer
data to, from, or within a computer system including electromagnetic emissions from a
computer system carrying such computer.
A. Illegal Interception
B. Illegal Access
C. Data Interference
D. Data Interception
19. Any means of account access that can be used to obtain money, good, services, or any
other thing of value or to initiate a transfer of funds.
A. Access Device RA 8484
B. Accessible Device
C. Access Gadget
D. Accessible Gadget
20. Designated the DOJ as the central authority in all matters that relates to Mutual Legal
Assistance Treaty (MLAT) and extradition for cybercrime and cybercrime related
offenses.
A. RA 4200
B. RA 8484
C. RA 10185
D. RA 10175 cybercrime prevention act of 2012
21. International cooperation and prosecution of cybercrime.
A. Group 8
B. Budapest Convention (2001)
C. Budapest Convention (2002)
D. Group 7
22. A type of scam in which criminals attempt to obtain someone's personal information by
pretending to be a legitimate business, neighbor or some other innocent party.
A. Spoofing
B. Scamming
C. Pharming ADVANCE FORM PHISING REDIRECTS THE CONNECTION
BETWEEN THE IP (INTERNET PROTOCOL) ADDRESS AND ITS TARGET SERVER
D. Phishing SOLICITATION OF INFORMATION VIA EMAIL OR FAKE WEBSITES
23. A type of malware that enables the remote monitoring of a computer user`s activities
or information on an individual’s computer when this software has been installed.
A. Keyloggers RECORDS EVERY KEYSTROKE OF THE USER
B. Sniffers COLLECTS INDIVDUAL’S USERNAME, PASSWORDS, OTHER PERSONAL
INFORMATION
C. Spyware
D. Malicious Software/MALWARE CODES THAT CAUSE DAMAGE TO THE
COMPUTER SYSTEM
24. A type of software that is used to monitor and analyze networks, but can also be used to
collect individual’s` usernames and passwords and other personal information.
A. Keyloggers
B. Eavesdroppers
C. Spy
D. Sniffers
25. A malware which is hidden inside what appears to be legitimate software or download.
A. Worm SPREAD AUTONOMOUSLY
B. Bundlers
C. Backdoor USED TO GET UNAUTHORIZED ACCESS TO WEBSITE
D. Trojan Horses MALWARE TRICKS USER THINKS THAT IT IS LEGITIMATE
26. A type of malware that tricks the computer user into thinking that it is a legitimate
software but actually contains hidden functions.
A. Trojan Horses
B. Dark Horses
C. Backdoor
D. Virus SPREAD ITSELF TO OTHER COMPUTERS
27. A hacking technique where the attacker can buy advertising spaces on the websites and
when a user clicks on the ad, he might get directed to a page that's infected with
malware.
A. Cookie Theft (COOKIE PERSONAL DATA SUCH BROWSING HISTORY,
USERNAME, PASSWORDS)
B. Virus
C. Bait and Switch
D. ClickJacking UI redress
29. In the past decades, groups of individuals have been working together to illegally obtain
software and then "crack" or "rip" its copyright protections before posting it on the
internet.
A. Illegal Copyright Infringement
B. Denial of Service Attack
C. Distributing Illegal Sexual Material
D. Internet Securities Fraud
30. Some internet criminals threaten to or actually flood an internet site with millions of
bogus messages and/ or orders so that site services will be tied up and unable to
perform as promised.
A. Internet Securities Fraud
B. Illegal Copyright Infringement
C. Distributing Illegal Sexual Material
D. Denial of Service Attack
31. It refers to the technologies that facilitate the transmission of data across the network.
A. Computer
B. Laptop
C. Internet
D. Electronics
33. It is also known as identity fraud, is a crime in which an imposter obtains key pieces of
personally identifiable information, such as Social Security or driver's license numbers,
in order to impersonate someone else.
A. Carding
B. Bank fraud
C. Extortion
D. Identity theft
34. In computer related crimes, it is the use of potentially illegal means to obtain money,
assets, or other property owned or held by a financial institution, or to obtain money
from depositors by fraudulently posing as a bank or other financial institution.
A. Bank fraud
B. Financial crimes
C. Computer fraud
D. Internet fraud
35. When was the year that the first recorded cybercrime took place?
A. 1866
B. 1890
C. 1843
D. 1820
38. He developed the electric telegraph in which letters of the English alphabet are
represented by a sequence of dots and dashes.(morse code)
A. Samuel Morse
B. Alessandro Morse
C. Graham Bell
D. Gugliermo Marconi
39. What are the earliest inventions of great significance to communication by Alessadro
Volta?
A. computer and calculator
B. Laptop and telephone
C. Telegraph and camera
D. Telephone and telegraph
40. There are two modes of committing cybercrime, except?
A. Through the means of Digital Devices, ICT Devices, Computer
B. Both A and C
C. The Computer, Network itself is the target of the attack
D. The cords, electrical wires are the target of the attack
Committing cybercrime
Computer victim (DOS)
COMPUTER MEANS PORNOGRAPHY/ CYBERSEX
41. It is defined as offenses that are committed against individuals or groups of individuals
with a criminal motive to intentionally harm, using modern telecommunication
networks.
A. Cyber offense
B. Cyber libel
C. Cybercrime
D. Crime
42. A type of spyware that records every keystroke of the user and report this information
back to its source.
A. Spyware
B. Keyloggers
C. sniffers
D. Spoofing
43. Are compromised computers attached to the internet which are often used to remotely
perform malicious or criminal tasks.
A. Bots
B. Botnets
C. Zombies
D. All of the above
44. It is a group of hackers from around the world who meet on online message boards and
social networking forums encouraging civil disobedience and/or unrest via denial-of-
service attacks, publishing victim’s personal information online, as well as defacing and
defaming websites.
A. Anonymous
B. Jonathan James FIRST JUVENILE -> CYBERCRIME 16 YO HACKING (SUICIDE)
C. Andrian Lamo
D. Kevin Mitnick
45. Hackers target the most accessed physical location to attack the victim like a coffee
shop, a cafeteria, etc. and they might create a fake Wi-Fi access point and modify your
most visited website to redirect them to you to get your personal information.
A. Eavesdropping (Passive Attacks)
B. Waterhole attacks
C. Virus, Trojan etc.
D. Phishing
46. In this attack, the hacker hides the actual UI where the victim is supposed to click.
A. Bait and switch
B. Cookie theft
C. Fake WAP
D. ClickJacking Attacks
47. A person who gains unauthorized access to computer files or networks in order to
further social or political ends.
A. Cybercriminal PERSON WHO COMMITS CYBERCRIME
B. Hacker
C. Cracker
D. Hacktivist
48. They have the knowledge of black hats but decided to be on the right side of the law.
They work doing penetration, hired to attempt to break into the company's networks to
find and report on security vulnerabilities.
A. Black-hat MALICIOUS INTENT
B. Gray-hat JUST FOR FUN
C. White-hat
D. Green-hat
49. Individuals whose intent is wreaking havoc via internet, this category includes
vandalism, destructive programs, and general mischief for no economic gain.
A. Script Kiddie LOWEST FORM OF CYBERCRIMINAL
B. Cyberpunks
C. Hackers
D. Crackers
50. It is used to refer to the spaces within computers and the spaces between computers
(across networks) where people interact with information and with each other.
A. Cyber security
B. cyberspace William Gibson
C. cybercrime
D. computer space
51. It occurs when a person uses the internet to steal someone's identity and/ or
impersonate them to open a new credit card account or conduct some financial
transactions.
A. Computer forgery
B. Ponzi scheme
C. Identity theft
D. Ponzi scheme
Ponzi/Pyramid Schemes - these are investment schemes in which investors are
promised abnormally high profits on their investments. No investments are actually
made. Early investors are paid returns with the investment money received from the
later investors.
Non-delivery of goods - this involves the non-delivery of goods and services that were
purchased or contracted remotely through the Internet. Online-auction sites are a fertile
ground for fraud. Goods may never be sent or, if they are, they may be damaged,
counterfeit or stolen.
55. The first ransomware virus created in the year 1989 by Joseph L. Popp.
A. “AIDS Information – Introductory Diskettes”
B. denial of service attack
C. Love Bug
D. Malwares
56. In 1976, first spam email took place when it was sent out over the __________.
A. Internet
B. ARPANET Advanced Research Projects Agency Network
C. web
D. computer
Robert Morris Jr. 1988 – released the “first internet worm” through ARPANET
- it is the Internet`s first “denial of service attack” (DOS)
57. This crime occurs when individuals make securities recommendations and fail to
disclose that they are being paid to disseminate their favorable opinions.
A. Market Manipulation
B. Embezzlement
C. Illegal Touting
D. Fraudulent Offering of Securities
58. They have the knowledge of black hats but decided to be on the right side of the law.
A. Black Hats malicious intent
B. Hackers
C. Gray Hat just for fun
D. White Hat
59. These are malicious software programs which get installed into the victim’s system and
keep sending the victims data to the hacker.
A. Virus, Trojan, etc.
B. Cookie Theft
C. DoS/DDoS
D. Fake WAP
60. He was convicted of a number of criminal computer crimes after evading authorities for
two and a half years. Once one of the FBI's Most Wanted for hacking into networks of
40 high-profile corporation.
A. Anonymous
B. Kevin Mitnick
C. Adrian Lamo –> He hacked into the systems of several organizations, including
The New York Times, Microsoft and Yahoo to exploit their security flaws
D. Jonathan James
61. An advance form of phishing which redirects the connection between an IP Address and
its target server.
A. Spoofing
B. Redirectors
C. Pharming
D. Floating Windows –> phishers may place floating windows over the address bars to
in Web browsers.
62. The process of making an exact copy of the original drive onto a new digital storage
device.
A. WDCD
B. WICD
C. WECD
D. WDCD
65. It is a hacking technique using which a hacker replicates the most-accessed sites and
traps the victim by sending that spoofed link.
A. Bait and Switch
B. Cookie Theft
C. Phishing
D. Eavesdropping
66. It is generally used to describe a person with these skills who decides to apply them
toward a damaging or illegal purpose.
A. Hacker
B. Hacking
C. Cracking
D. Hacktivist
67. It is the lowest life form of cybercriminal, they are generally not capable of writing their
own programs.
A. Script Kiddie
B. Hacker or Crackers
C. Cybercriminal organizations
D. Cyberpunks
69. RA 10175
A.Cybercrime Preventative Act of 2011
B.Cybercrime Prevention Act of 2012
C. Cybercrime Preventative Act of 2012
D.Cybercrime Prevention Act of 2011
70. An organized approach to addressing and managing the aftermath of a security breach
or cyberattack
A. Computer Security Incident
B. Computer Forensics
C. Computer Incident Response
D. Digital Forensic
72. Large enough in scale and magnitude in which a significant impact can be felt in both
regarding cost and human emotion
A. Cybercrime
B. Cyber Terrorism
C. Cyber Threats
D. Cyber-attacks
73. It is the discipline that combines the elements of law and computer science to collect
and analyze data from computer systems, networks, wireless communications, and
storage devices in a way that is admissible as evidence in a court of law.
A. Computer Forensics
B. Computer Incident Response
C. Digital Forensics
D. Computer Security Incident
77. Use of gear method that destroys coral reefs, seagrass beds, and other fishery marine
life habitat.
A. Illegal fishing
B. Muro-Ami
C. Use of fish mesh net
D. Use of superlights
78. It is an act to control toxic substances and hazardous and nuclear wastes, providing
penalties for violations thereof, and for other purposes.
a. RA 4850 laguna lake development authority
b. RA 6969
c. RA 3751 ilocos norte educational and cultural asso
d. RA 7076 small scale mining program
80. It is the rapid loss of trees and vegetation, as well as the underlying habits that make up
forests.
A. Illegal logging
B. Deforestation
C. Global warming
D. Illegal cutting
81. It is a dense layer of ozone gas. It protects us form the dangerous ultraviolet rays of the
sun.
A. Clouds
B. Ozone layer
C. Biodiversity
D. Solar System
82. It is the law the was enacted that penalized the crime of photo and video voyeurism.
A. RA 4200
B. RA 8484
C. RA 10175
D. RA 9995
84. An offense committed when the accused have access to the whole or any part of a
computer system without right.
A. Illegal Access
B. Illegal Interception
C. Data Interference
D. System Interference
85. Can be described as a software program that is designed to spread itself to other
computers and to damage or disrupt a computer such as interrupting communications.
A. Virus
B. Backdoor
C. Trojan horses
D. Computer worm
86. A type of malware that enables the remote monitoring of a computer user’s activities or
information on an individual’s computer when this software has been installed
A. Spyware
B. Trojan horses
C. Virus
D. Computer worms
87. The goal of ___ is to determine and uncover evidence that verifies or denies a
suspension and support a legal proceeding
A. Digital Forensics
B. Cybersecurity
C. Cybercrime
D. Digital Security
88. The part of the computer where all other computer components are connected.
A. Motherboard
B. RAM
C. Processor
D. Circuit Board
89. The ______ is the process of using mathematical algorithm against data to produce a
numeric value that is representative of that data.
A. Imaging
B. Cloning
C. Hashing
D. Computing
91. Immediate physical and social setting in which people live or in which something
happens or develops
A. Built Environment
B. Manmade Environment
C. Social Environment
D. Natural Environment
1. Built environment – human made surroundings providing setting for human activity
2. Natural Environment – all living and non-living things occurring naturally on Earth
3. Social Environment – immediate physical and social setting in which people live or in which
something happens or develops
92. Shall refer to waste generated from planting or harvesting of crops, trimming or pruning
of plants and wastes or run-off materials from farms or fields
A. Agricultural Waste
B. Bulky Waste
C. Municipal Waste
D. Consumer Electronics
94. Shall refer to solid waste or combination of solid waste which because of its quantity,
concentration, or physical, chemical or infectious characteristics.
A. Hazardous Waste
B. Generation
C. Leachate
D. Controlled Dump
95. Shall refer to household hazardous wastes such as paints, thinners, household batteries,
lead-acid batteries, spray canisters and the like.
A. Solid Waste
B. Special Waste
C. White Goods
D. Yard Waste
96. Shall refer to the liquid produced when waste undergo decomposition, and when water
percolate through solid waste undergoing decomposition.
A. Municipal Waste
B. Post-Consumer Material
C. Leachate
D. Special Wastes
97. Shall refer to a solid waste management practice of separating different materials found
in solid waste in order to promote recycling and re-use of resources and to reduce the
volume of waste for collection and disposal.
A. Re-use
B. Segregation
C. Composting
D. Recycle
98. Shall refer to a disposal area wherein the solid wastes are indiscriminately thrown or
disposed of without due planning and consideration for environmental and health
standards.
A. Open Dump
B. Municipal Waste
C. Materials Recovery Facility
D. Controlled Dump
100. shall refer to a recycling center that purchases or otherwise accepts recyclable
materials from the public for the purpose of recycling such materials.
A. Materials Recovery Facility
B. Municipal Waste
C. Buy-back Center
D. Controlled Dump