0% found this document useful (0 votes)
163 views9 pages

Activity 9 - CDI 9

The document provides instructions for a mock exam on cybercrime and environmental law topics. It includes 100 multiple choice questions covering subjects like types of hackers, computer viruses, malware, cybersecurity tools, and Philippine environmental laws.

Uploaded by

Melody Saipen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
163 views9 pages

Activity 9 - CDI 9

The document provides instructions for a mock exam on cybercrime and environmental law topics. It includes 100 multiple choice questions covering subjects like types of hackers, computer viruses, malware, cybersecurity tools, and Philippine environmental laws.

Uploaded by

Melody Saipen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Republic of the Philippines

MOUNTAIN PROVINCE STATE POLYTECHNIC COLLEGE


Bontoc Campus
Bontoc, Mountain province

CRIMINAL DETECTION AND INVESTIGATION


Introduction To Cybercrime and Environmental Law
Mockboard Examination

GENERAL INSTRUCTION:
❖ Write your SCHEDULE, SUBJECT, DATE and OTHER NECESSARY INFORMATION in the spaces
provided for you.
❖ MISSPELLED ANSWERS, ALTERATION, OBLITERATION, ERASURES and OTHER FORMS are
considered wrong.
❖ In writing your name start with your LAST NAME, followed by FIRST NAME them MIDDLE INITIAL
❖ Make use of PERMANENT INKS in answering, DO NOT USE PENCILS.
❖ Write your answers on the ANSWER SHEET provided for you.
❖ READ AND SCRUTINIZE the question before answering.
❖ CHEATING and similar forms are PROHIBITED.
❖ Keep your papers NEAT AND CLEAN.
❖ Write in READABLE MANNER.

THE ONLY WAY NECESSARY FOR EVIL TO PREVAIL IS WHEN GOOD MEN DO NOTHING
-Edmund Burke

Test 1. Multiple-choice: Choose the correct answer in each item and place your answers on the answer
sheet that is provided for you. (100 items, 100 pts.)

1. What term, originally coined by hackers, refers to individuals violating secure systems for illicit
purposes rather than fun?
A. White hat hacker C. Red hat hacker
B. Blue hat hacker D. Malicious Insider

2. Hackers hired by government agencies to find vulnerabilities in security systems, particularly


targeting black hat hackers, are known as:
A. White hat hacker C. Red hat hacker
B. Blue hat hacker D. Malicious Insider

3. What term is used for the highest skilled hackers in the world of cybercriminals, often the first
to discover cutting-edge attack methods?
A. Elite hacker C. Hacktivist
B. Cryptojacker D. Botnets

4. Malware coders who create bots to perform high-volume attacks on devices like routers and
cameras are known as:
A. Elite hacker C. Hacktivist
B. Cryptojacker D. Botnets

5. What type of malware is used to extort money by holding the victim’s data or device to ransom?
A. Ransomware C. Phishing
B. Malware attack D. Ransomware

6. What does URL stand for?


A. Uniform resources locating C. Uniform resource locator
B. Uniform resource location D. Uniform resources locator

7. According to Philippine Environmental Laws, which law is violated when unsegregated garbage
is thrown on a damsite?
A. Philippine Clean Air Act of 1999
B. Philippine Clean Water Act of 2004
C. Ecological Solid Waste Management Act of 2000
D. Toxic Substance, Hazardous and Nuclear Waste Control Act of 1990

8. Is Hari Ruke liable for any environmental crime during his road trip with black smoke-emitting
vehicle?
A. Yes B. No
C. Maybe D. Partially No

9. Which law did Hari Ruke violate in the mentioned statement?


A. Pollution Control Law C. Clean Air Act of 1999
B. Anti-smoke belching law D. Clean Water Act of 2004

10. What are the 3 R’s to conserve natural resources?


A. Reuse, Reduce, Recycle C. Reuse, Recycle, Reduce
B. Reduce, Recycle, Reuse D. Reduce, Reuse, Recycle

11. What is a system software that must be installed first on a computer for programs and
computers to be recognized and usable?
A. Operating systems C. Device system
B. Device drivers D. Operating drivers

12. Which virus is considered the first computer virus?


A. I love you C. Sasser
B. Blaster D. Creeper

13. MCAfee is an example of:


A. Photo editing software C. Virus
B. Quick heal D. Antivirus

14. What term is used for programs created to avoid antivirus detection, usually by encryption?
A. Antivirus C. Firewall
B. Droppers D. Encryption

15. To protect a computer from a virus, what should be installed?


A. Backup wizard C. Antivirus
B. Disk cleanup D. Disk defragmenter

16. What does VIRUS stand for?


A. Very Intelligent Result Unit Source C. Vital Information Resource Under Slege
B. Very Interchanged Research Under Search D. Viral Important User Search

17. Which of the following is not an Antivirus software?


A. AVG C. Code red
B. Avast D. McAfee

18. What is short for malicious software, designed to disrupt computer operation, gather sensitive
information, or gain unauthorized access to computer systems?
A. Malware C. Malisoft
B. Moleculeware D. Malairsoft

19. What are threats for electronic payment systems?


A. Computer worms C. Trojan horse
B. Computer virus D. All of the above

20. Which virus overtakes a computer system when it boots and destroys information?
A. System infectors C. Boot infectors
B. Trojan D. Stealth virus

21. What is a key logger?


A. Firmware C. Spyware
B. Antivirus D. All of the above

22. To protect yourself from computer hackers, what should you turn on?
A. Script C. VLC
B. Firewall D. Antivirus

23. Firewalls are used to protect against:


A. Data-driven attacks B. Fire attacks
C. Virus attacks D. Unauthorized access

24. Which is least likely a symptom of a virus?


A. The web browser opens to an unusual home page
B. Odd messages or images are displayed on the screen
C. Existing program files and icons disappear
D. The CD–ROM stops functioning

25. What is Code Red?


A. Word processing Software C. Virus
B. Antivirus D. Photo editing software

26. What software is installed onto your computer to scan and remove known viruses?
A. Firmware C. Keylogger
B. Adware D. Antivirus

27. What describes programs that can run independently, travel from system to system, and
disrupt computer communication?
A. Virus C. Droppers
B. Trojan D. Worm

28. What is a computer program that can replicate itself and spread from one computer to
another?
A. Antivirus C. Mouse
B. PenDrive D. Computer virus

29. What is authentication?


A. Modification
B. Insertion
C. Hard to assure the identity of the user on a remote system
D. None of the above

30. What describes attempts to obtain confidential information by falsifying identity?


A. Computer viruses C. Phishing trips
B. Phishing scams D. Spyware scams

31. A virus that migrates freely within a large population of unauthorized email users is called:
A. Flame ware C. Macro
B. Worm D. Plagiarism

32. What are often delivered to a PC through an email attachment and are designed to do harm?
A. Spam C. Portals
B. Email D. Virus

33. What involves altering data so that it is not usable unless the changes are undone?
A. Ergonomics C. Biometrics
B. Compression D. Encryption

34. When a logic bomb is activated by a time-related event, it is known as:


A. Virus C. Time-related bomb sequence
B. Trojan horse D. Time bomb

35. What is a computer program that can invade computers and perform various functions from
annoying to dangerous?
A. MS Word C. Antivirus
B. MS Access D. Computer virus

36. The internet is simply known as:


A. NAT C. NOT
B. NET D. NFT
37. What widely available hardware connects to desktop and portable computers via USB or
PCMCIA interface?
A. Scanner C. Biometrics
B. Fingerprint scanners D. Forensic scanner

38. What are programs created to avoid antivirus detection, usually by encryption?
A. Antivirus C. Firewall
B. Droppers D. Encryption

39. What includes offenses committed against individuals or groups with a criminal motive to harm
reputation or cause harm using modern telecommunication networks?
A. Cybercrime C. Computer crime
B. Cyberspace crime D. Net crime

40. Attacks against networks or computers that prevent proper data handling are known as:
A. Denial-of-service C. Cyber-stalking
B. Cyber squatting D. Phishing

41. What is defined as a deliberate, politically or religiously motivated attack against data,
computer programs, and/or information systems to disrupt and/or deny service?
A. Cyber squatting C. Cyberpunk
B. Cyber-terrorism D. Cyberlaundering

42. What involves using the Internet to hide the origins of money obtained through illegal means?
A. Cyber squatting C. Cyberpunk
B. Cyber-terrorism D. Cyberlaundering

43. What is the willful engagement in lascivious exhibition of sexual organs or sexual activity,
aided by a computer system, for favor or consideration?
A. Cybersecurity C. Cybercriminals
B. Cybersex D. Cyberextortion

44. What is the use or threat of use of technological means to cause harm to the physical being,
reputation, or property of an individual, organization, or company?
A. Cybersecurity C. Cybercriminals
B. Cybersex D. Cyberextortion

45. Offenses committed against individuals or groups with a criminal motive to intentionally harm
reputation or cause harm using modern telecommunication networks are known as:
A. Cybercrime C. Computer crime
B. Cyberspace crime D. Net crime

46. What are groups comprised of criminally minded individuals who have used the Internet to
communicate, collaborate, and facilitate cybercrime?
A. Organized criminals C. Cyber criminal organizations
B. Cyber organized criminals D. Computer criminals

47. Conducting military operations according to information-related principles, disrupting or


destroying information and communications systems, and gaining knowledge about an
adversary while preventing them from knowing much about oneself is known as:
A. Cybercrime C. Cybercontrabands
B. Cyber war D. Cyber fraud

48. What is the term for malicious software designed to disrupt computer operation, gather
sensitive information, or gain unauthorized access to computer systems?
A. Malware C. Malisoft
B. Moleculeware D. Malairsoft

49. Individuals who target valuable data, such as trade secrets or proprietary information, or data
that can be used for other criminal activities are referred to as:
A. Criminal hacker C. Cyber fraud
B. Cyber criminal D. Cyber squatting
50. What refers to a computer or computer network, the electronic medium where online
communication takes place?
A. Internet C. Cyberspace
B. Computer D. Cyber

51. How is the indefinite place where individuals transact and communicate, the place between
places, defined?
A. Internet C. Cyberspace
B. Computer D. Cyber

52. The act of creating a fraudulent document and falsifying a document, including signatures,
with criminal intent, has become easier with advances in high-level graphics software and
hardware. What is this act called?
A. Counterfeiting C. Crapflooding
B. Cracker D. Cookies

53. What are small pieces of information that an HTTP server sends to the individual browser upon
the initial connection?
A. Counterfeiting C. Crapflooding
B. Cracker D. Cookies

54. What term, originally coined by hackers, usually refers to individuals violating secure systems
for illicit purposes rather than fun?
A. Counterfeiting C. Crapflooding
B. Cracker D. Cookies

55. The practice of disrupting online media such as discussion websites or Usenet newsgroups
with nonsensical, inane, and/or repetitive postings to make it difficult for other users to read is
known as:
A. Counterfeiting C. Crapflooding
B. Cracker D. Cookies

56. What is a computer program that can copy itself and infect a computer without permission or
knowledge of the user, often erroneously referred to as a virus?
A. Computer worm C. Worm
B. Computer virus D. Virus

57. Who is known as the father of the computer for designing the Analytical Engine, laying the
basic framework for today's computers?
A. Charles Babbage C. Cliford Berry
B. Dr. John V. Atanasof D. Cesare Lombroso

58. Offenses committed against individuals or groups with a criminal motive to harm reputation or
cause harm through modern telecommunication networks are known as:
A. Cyber-crimes C. Computer crime
B. Cyberbullying D. Net crime

59. Criminal activity involving a computer is referred to as:


A. Cyber-crimes C. Computer crime
B. Cyberbullying D. Net crime

60. Criminal use of the internet is known as:


A. Cyber-crimes C. Computer crime
B. Cyberbullying D. Net crime

61. What is a criminal activity targeting or using a computer, computer network, or networked
device with the aim to damage computers for reasons other than profit?
A. Cyber space crimes C. Computer crime
B. Cyber crime D. Net crime

62. Crime committed against nature, either illegal or immoral, is known as:
A. Environmental laws C. Green crimes
B. Environmental crimes D. Environmental green laws crimes

63. Interpol regards it as the third-largest illegal business globally, posing a serious threat to
biodiversity survival. What is it?
A. Illegal logging C. Finning
B. Wild animal traffic D. Waste disposal

64. What is the act of capturing sharks, cutting their fins alive, and throwing them back into the
sea?
A. Illegal logging C. Finning
B. Wild animal traffic D. Waste disposal

65. What is the main cause of deforestation, involving the harvesting of timber against the laws
and regulations of the country?
A. Illegal logging C. Finning
B. Wild animal traffic D. Waste disposal

66. Unauthorized access or interference with computer systems is known as:


A. Hacking C. Virus
B. Denial-of-service D. Web defacement

67. Which law aims to achieve and maintain clean air in the Philippines, meeting National Air
Quality guidelines?
A. Pollution Control Law C. Philippine Clean Air Act of 1999
B. Climate Change Act of 2009 D. Environmental Impact Statement of 1978

68. What is the "Food Safety Act of 2013" officially known as?
A. RA 10611 C. RA 6969
B. RA 9729 D. RA 8749

69. The "Philippine Clean Air Act of 1999" is officially known as:
A. RA 6969 C. RA 1181
B. RA 8749 D. RA 9003

70. Which law aims to adopt a systematic, comprehensive, and ecological solid waste management
program?
A. Ecological Solid Waste Management Act of 2000
B. Climate Change Act of 2009
C. Pollution Control Law
D. Clean Air Act of 1999

71. What law declares the policy of the state to protect the climate system for the benefit of
humankind?
A. Ecological Solid Waste Management Act of 2000
B. Climate Change Act of 2009
C. Pollution Control Law
D. Clean Air Act of 1999

72. The prevention of air pollution from motor vehicles is the purpose of which decree?
A. Ecological Solid Waste Management Act of 2000
B. Climate Change Act of 2009
C. Pollution Control Law
D. Clean Air Act of 1999

73. Is stealing Benito Barbina's wallets and purses, containing identification cards and bank
information, necessary to commit identity theft?
A. Yes C. Maybe
B. No D. Sometimes

74. What is an electronic medium used to facilitate online communication?


A. Facebook B. Twitter
C. Computer D. Cyberspace

75. Antivirus, antispyware programs, firewalls, and VPNs are examples of:
A. Cybercrime C. Cybersecurity
B. Cyberspace D. Net Crime

76. What crime is committed by Kenneth Ey, who used a computer as an instrument for criminal
purposes?
A. Computer crime C. Cyberspace crime
B. Net crime D. Cybercrime

77. Mr. Jay Brown used a computer as an instrument to further illegal ends. What type of crime
did he commit?
A. Cybercrime C. Net crime
B. Computer crime D. Nota

78. What are the categories of computer use as a target and computer use as a tool?
A. Cybercrime C. Net crime
B. Computer crime D. Nota

79. When the individual is the main target of cybercrime, the computer can be considered as:
A. Tool C. Target
B. Instrument D. Nota

80. What type of cybercrime does Blak Jeyk commit by using a fake email account to get
information from internet users?
A. Phishing C. Online hacking
B. Identity theft D. Web jacking

81. What type of cybercrime does Uhm Fillado commit by using personal information for identity
theft?
A. Phishing C. Online hacking
B. Identity theft D. Web jacking

82. Which act defines cybercrime, provides for its prevention, investigation, suppression, and the
imposition of penalties?
A. RA 10715 C. RA 9995
B. RA 10175 D. RA 8792

83. This Republic Act is geared towards protecting the privacy, honor, dignity, and integrity of a
person.
A. Cybercrime Prevention Act of 2012
B. Access Device Act
C. Electronic Commerce Act
D. Anti-Photo and Video Voyeurism Act of 2009

84. What is defined as special-purpose computers (or software packages) that handle the
connection between two or more networks?
A. Internet C. Server
B. Routers D. Byte

85. What is the input, alteration, erasure, or suppression of computer data or programs, or other
interference with computer systems, intending to hinder their functioning?
A. Cyber hacking C. Computer worm
B. Computer sabotage D. Computer-related crimes

86. What is the input, alteration, or deletion of any computer data without right, resulting in
inauthentic data with the intent that it be considered or acted upon for legal purposes as if it
were authentic?
A. Computer-related crimes C. Computer-related fraud
B. Computer-related forgery D. Computer-related identity theft
87. What is a system that can process a collection of inputs and produce a set of outputs, a
combination of hardware and software?
A. Computer C. Computer system
B. Computer networking D. Information Technology

88. What is the collection of interconnected devices that process, store, and input data and
information?
A. Computer C. Computer system
B. Computer networking D. Information Technology

89. What is the information-processing technology in physical form?


A. Computer C. Computer software
B. Computer hardware D. Telecommunication
E.

90. What is an electronic device that can be programmed to take user input, process it, and output
data?
A. Computer C. Mainframe computer
B. Supercomputer D. Microcomputer
E.

91. What is a computer with a high level of performance compared to a general-purpose computer?
A. Computer C. Mainframe computer
B. Supercomputer D. Microcomputer

92. What is the most powerful and largest computer available in the world?
A. Computer C. Mainframe computer
B. Supercomputer D. Microcomputer

93. The entire collection of programs, procedures, and routines involved with the operation of a
computer system is referred to as:
A. Computer hardware C. System software
B. Computer software D. Application software

94. Who was the Filipino science student who created the "I Love You" virus?
A. Onel De Guzman C. Jeremy Bentham
B. David Smith D. Robert Morris
E.

95. Who was the sole creator of the Melissa Virus?


A. Onel De Guzman C. Jeremy Bentham
B. David Smith D. Robert Morris

96. What type of cyber hacker breaks into computer systems with malicious or criminal intent?
A. White hat hacker C. Gray hat hacker
B. Black hat hacker D. Green hat hacker

97. What is someone new to hacking focused on increasing their cyberattack skills and eventually
evolving into a full-fledged hacker?
A. White hat hacker C. Gray hat hacker
B. Black hat hacker D. Green hat hacker

98. What type of hacker engages in hacking activities for the enjoyment of finding gaps in
computer systems, even if not always ethical?
A. White hat hacker C. Gray hat hacker
B. Black hat hacker D. Green hat hacker

99. What is another term for "just for fun" hackers?


A. White hat hacker C. Green hat hacker
B. Gray hat hacker D. Amateur hacker
100. Malware coders who create bots to perform high-volume attacks on devices like routers and
cameras are known as:
A. Elite hacker
B. Cryptojacker
C. Hacktivist
D. Botnets

End of Examination

You might also like