Republic of the Philippines
MOUNTAIN PROVINCE STATE POLYTECHNIC COLLEGE
Bontoc Campus
Bontoc, Mountain province
CRIMINAL DETECTION AND INVESTIGATION
Introduction To Cybercrime and Environmental Law
Mockboard Examination
GENERAL INSTRUCTION:
❖ Write your SCHEDULE, SUBJECT, DATE and OTHER NECESSARY INFORMATION in the spaces
provided for you.
❖ MISSPELLED ANSWERS, ALTERATION, OBLITERATION, ERASURES and OTHER FORMS are
considered wrong.
❖ In writing your name start with your LAST NAME, followed by FIRST NAME them MIDDLE INITIAL
❖ Make use of PERMANENT INKS in answering, DO NOT USE PENCILS.
❖ Write your answers on the ANSWER SHEET provided for you.
❖ READ AND SCRUTINIZE the question before answering.
❖ CHEATING and similar forms are PROHIBITED.
❖ Keep your papers NEAT AND CLEAN.
❖ Write in READABLE MANNER.
THE ONLY WAY NECESSARY FOR EVIL TO PREVAIL IS WHEN GOOD MEN DO NOTHING
-Edmund Burke
Test 1. Multiple-choice: Choose the correct answer in each item and place your answers on the answer
sheet that is provided for you. (100 items, 100 pts.)
1. What term, originally coined by hackers, refers to individuals violating secure systems for illicit
purposes rather than fun?
A. White hat hacker C. Red hat hacker
B. Blue hat hacker D. Malicious Insider
2. Hackers hired by government agencies to find vulnerabilities in security systems, particularly
targeting black hat hackers, are known as:
A. White hat hacker C. Red hat hacker
B. Blue hat hacker D. Malicious Insider
3. What term is used for the highest skilled hackers in the world of cybercriminals, often the first
to discover cutting-edge attack methods?
A. Elite hacker C. Hacktivist
B. Cryptojacker D. Botnets
4. Malware coders who create bots to perform high-volume attacks on devices like routers and
cameras are known as:
A. Elite hacker C. Hacktivist
B. Cryptojacker D. Botnets
5. What type of malware is used to extort money by holding the victim’s data or device to ransom?
A. Ransomware C. Phishing
B. Malware attack D. Ransomware
6. What does URL stand for?
A. Uniform resources locating C. Uniform resource locator
B. Uniform resource location D. Uniform resources locator
7. According to Philippine Environmental Laws, which law is violated when unsegregated garbage
is thrown on a damsite?
A. Philippine Clean Air Act of 1999
B. Philippine Clean Water Act of 2004
C. Ecological Solid Waste Management Act of 2000
D. Toxic Substance, Hazardous and Nuclear Waste Control Act of 1990
8. Is Hari Ruke liable for any environmental crime during his road trip with black smoke-emitting
vehicle?
A. Yes B. No
C. Maybe D. Partially No
9. Which law did Hari Ruke violate in the mentioned statement?
A. Pollution Control Law C. Clean Air Act of 1999
B. Anti-smoke belching law D. Clean Water Act of 2004
10. What are the 3 R’s to conserve natural resources?
A. Reuse, Reduce, Recycle C. Reuse, Recycle, Reduce
B. Reduce, Recycle, Reuse D. Reduce, Reuse, Recycle
11. What is a system software that must be installed first on a computer for programs and
computers to be recognized and usable?
A. Operating systems C. Device system
B. Device drivers D. Operating drivers
12. Which virus is considered the first computer virus?
A. I love you C. Sasser
B. Blaster D. Creeper
13. MCAfee is an example of:
A. Photo editing software C. Virus
B. Quick heal D. Antivirus
14. What term is used for programs created to avoid antivirus detection, usually by encryption?
A. Antivirus C. Firewall
B. Droppers D. Encryption
15. To protect a computer from a virus, what should be installed?
A. Backup wizard C. Antivirus
B. Disk cleanup D. Disk defragmenter
16. What does VIRUS stand for?
A. Very Intelligent Result Unit Source C. Vital Information Resource Under Slege
B. Very Interchanged Research Under Search D. Viral Important User Search
17. Which of the following is not an Antivirus software?
A. AVG C. Code red
B. Avast D. McAfee
18. What is short for malicious software, designed to disrupt computer operation, gather sensitive
information, or gain unauthorized access to computer systems?
A. Malware C. Malisoft
B. Moleculeware D. Malairsoft
19. What are threats for electronic payment systems?
A. Computer worms C. Trojan horse
B. Computer virus D. All of the above
20. Which virus overtakes a computer system when it boots and destroys information?
A. System infectors C. Boot infectors
B. Trojan D. Stealth virus
21. What is a key logger?
A. Firmware C. Spyware
B. Antivirus D. All of the above
22. To protect yourself from computer hackers, what should you turn on?
A. Script C. VLC
B. Firewall D. Antivirus
23. Firewalls are used to protect against:
A. Data-driven attacks B. Fire attacks
C. Virus attacks D. Unauthorized access
24. Which is least likely a symptom of a virus?
A. The web browser opens to an unusual home page
B. Odd messages or images are displayed on the screen
C. Existing program files and icons disappear
D. The CD–ROM stops functioning
25. What is Code Red?
A. Word processing Software C. Virus
B. Antivirus D. Photo editing software
26. What software is installed onto your computer to scan and remove known viruses?
A. Firmware C. Keylogger
B. Adware D. Antivirus
27. What describes programs that can run independently, travel from system to system, and
disrupt computer communication?
A. Virus C. Droppers
B. Trojan D. Worm
28. What is a computer program that can replicate itself and spread from one computer to
another?
A. Antivirus C. Mouse
B. PenDrive D. Computer virus
29. What is authentication?
A. Modification
B. Insertion
C. Hard to assure the identity of the user on a remote system
D. None of the above
30. What describes attempts to obtain confidential information by falsifying identity?
A. Computer viruses C. Phishing trips
B. Phishing scams D. Spyware scams
31. A virus that migrates freely within a large population of unauthorized email users is called:
A. Flame ware C. Macro
B. Worm D. Plagiarism
32. What are often delivered to a PC through an email attachment and are designed to do harm?
A. Spam C. Portals
B. Email D. Virus
33. What involves altering data so that it is not usable unless the changes are undone?
A. Ergonomics C. Biometrics
B. Compression D. Encryption
34. When a logic bomb is activated by a time-related event, it is known as:
A. Virus C. Time-related bomb sequence
B. Trojan horse D. Time bomb
35. What is a computer program that can invade computers and perform various functions from
annoying to dangerous?
A. MS Word C. Antivirus
B. MS Access D. Computer virus
36. The internet is simply known as:
A. NAT C. NOT
B. NET D. NFT
37. What widely available hardware connects to desktop and portable computers via USB or
PCMCIA interface?
A. Scanner C. Biometrics
B. Fingerprint scanners D. Forensic scanner
38. What are programs created to avoid antivirus detection, usually by encryption?
A. Antivirus C. Firewall
B. Droppers D. Encryption
39. What includes offenses committed against individuals or groups with a criminal motive to harm
reputation or cause harm using modern telecommunication networks?
A. Cybercrime C. Computer crime
B. Cyberspace crime D. Net crime
40. Attacks against networks or computers that prevent proper data handling are known as:
A. Denial-of-service C. Cyber-stalking
B. Cyber squatting D. Phishing
41. What is defined as a deliberate, politically or religiously motivated attack against data,
computer programs, and/or information systems to disrupt and/or deny service?
A. Cyber squatting C. Cyberpunk
B. Cyber-terrorism D. Cyberlaundering
42. What involves using the Internet to hide the origins of money obtained through illegal means?
A. Cyber squatting C. Cyberpunk
B. Cyber-terrorism D. Cyberlaundering
43. What is the willful engagement in lascivious exhibition of sexual organs or sexual activity,
aided by a computer system, for favor or consideration?
A. Cybersecurity C. Cybercriminals
B. Cybersex D. Cyberextortion
44. What is the use or threat of use of technological means to cause harm to the physical being,
reputation, or property of an individual, organization, or company?
A. Cybersecurity C. Cybercriminals
B. Cybersex D. Cyberextortion
45. Offenses committed against individuals or groups with a criminal motive to intentionally harm
reputation or cause harm using modern telecommunication networks are known as:
A. Cybercrime C. Computer crime
B. Cyberspace crime D. Net crime
46. What are groups comprised of criminally minded individuals who have used the Internet to
communicate, collaborate, and facilitate cybercrime?
A. Organized criminals C. Cyber criminal organizations
B. Cyber organized criminals D. Computer criminals
47. Conducting military operations according to information-related principles, disrupting or
destroying information and communications systems, and gaining knowledge about an
adversary while preventing them from knowing much about oneself is known as:
A. Cybercrime C. Cybercontrabands
B. Cyber war D. Cyber fraud
48. What is the term for malicious software designed to disrupt computer operation, gather
sensitive information, or gain unauthorized access to computer systems?
A. Malware C. Malisoft
B. Moleculeware D. Malairsoft
49. Individuals who target valuable data, such as trade secrets or proprietary information, or data
that can be used for other criminal activities are referred to as:
A. Criminal hacker C. Cyber fraud
B. Cyber criminal D. Cyber squatting
50. What refers to a computer or computer network, the electronic medium where online
communication takes place?
A. Internet C. Cyberspace
B. Computer D. Cyber
51. How is the indefinite place where individuals transact and communicate, the place between
places, defined?
A. Internet C. Cyberspace
B. Computer D. Cyber
52. The act of creating a fraudulent document and falsifying a document, including signatures,
with criminal intent, has become easier with advances in high-level graphics software and
hardware. What is this act called?
A. Counterfeiting C. Crapflooding
B. Cracker D. Cookies
53. What are small pieces of information that an HTTP server sends to the individual browser upon
the initial connection?
A. Counterfeiting C. Crapflooding
B. Cracker D. Cookies
54. What term, originally coined by hackers, usually refers to individuals violating secure systems
for illicit purposes rather than fun?
A. Counterfeiting C. Crapflooding
B. Cracker D. Cookies
55. The practice of disrupting online media such as discussion websites or Usenet newsgroups
with nonsensical, inane, and/or repetitive postings to make it difficult for other users to read is
known as:
A. Counterfeiting C. Crapflooding
B. Cracker D. Cookies
56. What is a computer program that can copy itself and infect a computer without permission or
knowledge of the user, often erroneously referred to as a virus?
A. Computer worm C. Worm
B. Computer virus D. Virus
57. Who is known as the father of the computer for designing the Analytical Engine, laying the
basic framework for today's computers?
A. Charles Babbage C. Cliford Berry
B. Dr. John V. Atanasof D. Cesare Lombroso
58. Offenses committed against individuals or groups with a criminal motive to harm reputation or
cause harm through modern telecommunication networks are known as:
A. Cyber-crimes C. Computer crime
B. Cyberbullying D. Net crime
59. Criminal activity involving a computer is referred to as:
A. Cyber-crimes C. Computer crime
B. Cyberbullying D. Net crime
60. Criminal use of the internet is known as:
A. Cyber-crimes C. Computer crime
B. Cyberbullying D. Net crime
61. What is a criminal activity targeting or using a computer, computer network, or networked
device with the aim to damage computers for reasons other than profit?
A. Cyber space crimes C. Computer crime
B. Cyber crime D. Net crime
62. Crime committed against nature, either illegal or immoral, is known as:
A. Environmental laws C. Green crimes
B. Environmental crimes D. Environmental green laws crimes
63. Interpol regards it as the third-largest illegal business globally, posing a serious threat to
biodiversity survival. What is it?
A. Illegal logging C. Finning
B. Wild animal traffic D. Waste disposal
64. What is the act of capturing sharks, cutting their fins alive, and throwing them back into the
sea?
A. Illegal logging C. Finning
B. Wild animal traffic D. Waste disposal
65. What is the main cause of deforestation, involving the harvesting of timber against the laws
and regulations of the country?
A. Illegal logging C. Finning
B. Wild animal traffic D. Waste disposal
66. Unauthorized access or interference with computer systems is known as:
A. Hacking C. Virus
B. Denial-of-service D. Web defacement
67. Which law aims to achieve and maintain clean air in the Philippines, meeting National Air
Quality guidelines?
A. Pollution Control Law C. Philippine Clean Air Act of 1999
B. Climate Change Act of 2009 D. Environmental Impact Statement of 1978
68. What is the "Food Safety Act of 2013" officially known as?
A. RA 10611 C. RA 6969
B. RA 9729 D. RA 8749
69. The "Philippine Clean Air Act of 1999" is officially known as:
A. RA 6969 C. RA 1181
B. RA 8749 D. RA 9003
70. Which law aims to adopt a systematic, comprehensive, and ecological solid waste management
program?
A. Ecological Solid Waste Management Act of 2000
B. Climate Change Act of 2009
C. Pollution Control Law
D. Clean Air Act of 1999
71. What law declares the policy of the state to protect the climate system for the benefit of
humankind?
A. Ecological Solid Waste Management Act of 2000
B. Climate Change Act of 2009
C. Pollution Control Law
D. Clean Air Act of 1999
72. The prevention of air pollution from motor vehicles is the purpose of which decree?
A. Ecological Solid Waste Management Act of 2000
B. Climate Change Act of 2009
C. Pollution Control Law
D. Clean Air Act of 1999
73. Is stealing Benito Barbina's wallets and purses, containing identification cards and bank
information, necessary to commit identity theft?
A. Yes C. Maybe
B. No D. Sometimes
74. What is an electronic medium used to facilitate online communication?
A. Facebook B. Twitter
C. Computer D. Cyberspace
75. Antivirus, antispyware programs, firewalls, and VPNs are examples of:
A. Cybercrime C. Cybersecurity
B. Cyberspace D. Net Crime
76. What crime is committed by Kenneth Ey, who used a computer as an instrument for criminal
purposes?
A. Computer crime C. Cyberspace crime
B. Net crime D. Cybercrime
77. Mr. Jay Brown used a computer as an instrument to further illegal ends. What type of crime
did he commit?
A. Cybercrime C. Net crime
B. Computer crime D. Nota
78. What are the categories of computer use as a target and computer use as a tool?
A. Cybercrime C. Net crime
B. Computer crime D. Nota
79. When the individual is the main target of cybercrime, the computer can be considered as:
A. Tool C. Target
B. Instrument D. Nota
80. What type of cybercrime does Blak Jeyk commit by using a fake email account to get
information from internet users?
A. Phishing C. Online hacking
B. Identity theft D. Web jacking
81. What type of cybercrime does Uhm Fillado commit by using personal information for identity
theft?
A. Phishing C. Online hacking
B. Identity theft D. Web jacking
82. Which act defines cybercrime, provides for its prevention, investigation, suppression, and the
imposition of penalties?
A. RA 10715 C. RA 9995
B. RA 10175 D. RA 8792
83. This Republic Act is geared towards protecting the privacy, honor, dignity, and integrity of a
person.
A. Cybercrime Prevention Act of 2012
B. Access Device Act
C. Electronic Commerce Act
D. Anti-Photo and Video Voyeurism Act of 2009
84. What is defined as special-purpose computers (or software packages) that handle the
connection between two or more networks?
A. Internet C. Server
B. Routers D. Byte
85. What is the input, alteration, erasure, or suppression of computer data or programs, or other
interference with computer systems, intending to hinder their functioning?
A. Cyber hacking C. Computer worm
B. Computer sabotage D. Computer-related crimes
86. What is the input, alteration, or deletion of any computer data without right, resulting in
inauthentic data with the intent that it be considered or acted upon for legal purposes as if it
were authentic?
A. Computer-related crimes C. Computer-related fraud
B. Computer-related forgery D. Computer-related identity theft
87. What is a system that can process a collection of inputs and produce a set of outputs, a
combination of hardware and software?
A. Computer C. Computer system
B. Computer networking D. Information Technology
88. What is the collection of interconnected devices that process, store, and input data and
information?
A. Computer C. Computer system
B. Computer networking D. Information Technology
89. What is the information-processing technology in physical form?
A. Computer C. Computer software
B. Computer hardware D. Telecommunication
E.
90. What is an electronic device that can be programmed to take user input, process it, and output
data?
A. Computer C. Mainframe computer
B. Supercomputer D. Microcomputer
E.
91. What is a computer with a high level of performance compared to a general-purpose computer?
A. Computer C. Mainframe computer
B. Supercomputer D. Microcomputer
92. What is the most powerful and largest computer available in the world?
A. Computer C. Mainframe computer
B. Supercomputer D. Microcomputer
93. The entire collection of programs, procedures, and routines involved with the operation of a
computer system is referred to as:
A. Computer hardware C. System software
B. Computer software D. Application software
94. Who was the Filipino science student who created the "I Love You" virus?
A. Onel De Guzman C. Jeremy Bentham
B. David Smith D. Robert Morris
E.
95. Who was the sole creator of the Melissa Virus?
A. Onel De Guzman C. Jeremy Bentham
B. David Smith D. Robert Morris
96. What type of cyber hacker breaks into computer systems with malicious or criminal intent?
A. White hat hacker C. Gray hat hacker
B. Black hat hacker D. Green hat hacker
97. What is someone new to hacking focused on increasing their cyberattack skills and eventually
evolving into a full-fledged hacker?
A. White hat hacker C. Gray hat hacker
B. Black hat hacker D. Green hat hacker
98. What type of hacker engages in hacking activities for the enjoyment of finding gaps in
computer systems, even if not always ethical?
A. White hat hacker C. Gray hat hacker
B. Black hat hacker D. Green hat hacker
99. What is another term for "just for fun" hackers?
A. White hat hacker C. Green hat hacker
B. Gray hat hacker D. Amateur hacker
100. Malware coders who create bots to perform high-volume attacks on devices like routers and
cameras are known as:
A. Elite hacker
B. Cryptojacker
C. Hacktivist
D. Botnets
End of Examination