Cybercrime
Cybercrime
Performance of forensic
analysis of mobile phones
d. Conducting a video forensic
1. The one who guides, supervise and exam
monitor the ACG of the PNP, including 7. The following are capabilities of PNP
tactical and strategic movements. C ACG, except; B
a. Chief of Staff a. Cyber Security
b. Deputy Director b. Cyber Fraud
c. Director c. Cyber Response
d. Secretary d. Digital Forensic
2. The one who assist the PNP ACG 8. He is the one who advise and supports
Director in monitoring, directing, and the PNP ACG Director in implementing
organizing the activities of the PNP ACG the Group’s policies and programs. B
in the management and operations of a. Secretary
the group. C b. Deputy Director
a. Director c. Director
b. Secretary d. Chief of Staff
c. Deputy Director 9. The one who advise the Director, PNP
d. Chief of Staff ACG on staff and service matters. A
3. The one who performs other duties in a. ARMD (Administrative &
the PNP ACG as second in command, or Resource Management
act in the absence of latter. A Division)
a. Deputy Director b. IMD (Investigation
b. Director Management Division)
c. Chief of Staff c. CSU (Cyber Security Unit)
d. Secretary d. GCSIRT (Government
4. The one who perform other duties as Information Security Incident
directed by the PNP ACG Director. B Response Team)
a. Director 10. The one who formulates and executes
b. Chief of Staff plans and programs relating to
c. Deputy Director personnel matters, and organization,
d. Secretary financial, maintenance, and other
5. The following are the capabilities of administrative needs. D
PNP ACG in terms of Cyber Response, a. GCSIRT (Government
except; D Information Security Incident
a. Investigating Cybercrime Response Team)
b. Cybercriminal Arrest b. CSU (Cyber Security Unit)
c. Seizure of Digital evidence c. IMD (Investigation
d. Post bulletins on Cybersecurity Management Division)
6. The following are the capabilities of d. ARMD (Administrative &
PNP ACG in terms of Digital Forensic, Resource Management
except; A Division)
a. Carrying out penetration testing
b. Computer forensic exam output
11. The one who creates and maintains the b. GCSIRT (Government
PNP ACG database, including data from Information Security Incident
evidence. C Response Team)
a. ARMD (Administrative & c. PNP ACG Field Units
Resource Management d. CSU (Cyber Security Unit)
Division) 15. They perform advanced training and
b. CSU (Cyber Security Unit) workshops on cybercrime activities (in
c. IMD (Investigation conjunction with the PNP Training
Management Division) Service). B
d. GCSIRT (Government a. CSU (Cyber Security Unit)
Information Security Incident b. IMD (Investigation
Response Team) Management Division)
12. This unit conducts analysis and research c. PNP ACG Field Units
to strengthen PNP ACG's ability to d. ARMD (Administrative &
proactively address cybercrimes and Resource Management
cyber threats. D Division)
a. ARMD (Administrative & 16. They carry out information, programs,
Resource Management operations, and inquiries in the AOR
Division) against cybercrime and cyber security. C
b. IMD (Investigation a. CSU (Cyber Security Unit)
Management Division) b. IMD (Investigation
c. GCSIRT (Government Management Division)
Information Security Incident c. PNP ACG Field Units
Response Team) d. ARMD (Administrative &
d. CSU (Cyber Security Unit) Resource Management
13. They collaborate with other regional- Division)
level agencies to discuss issues of 17. The following are some notable anti-
cybercrime and cyber security in the cybercrime operations, except; B
region. C a. ATM/Credit Card Fraud
a. IMD (Investigation Syndicate
Management Division) b. Human Trafficking
b. CSU (Cyber Security Unit) c. Illegal Internet Pharmacy
c. PNP ACG Field Units Operation
d. GCSIRT (Government d. Corporate Illegal System
Information Security Incident Hacking
Response Team) 18. This group conceptualized and believed
14. They supervise, prepares, and that there must be a synergy between
coordinates the group's administrative the following components in order to
functions. A combat cybercrime and to improve
a. ARMD (Administrative & cyber security. B
Resource Management a. DOJ
Division) b. PNP ACG
c. PNP DDA
d. DOH
19. It is one of their function to undertake c. Roy Girasa
the specific roles and responsibilities of d. Gottenbarn
the DOJ related to cybercrime under 25. He is involved in the research of
the Implementing Rules and Regulation computer crime and security from the
of Republic Act No. 9775 or the "Anti- early 1970. D
Child Pornography Act of 2009". A a. Gottenbarn
a. PNP ACG b. Roy Girasa
b. DOJ c. Forester and Momson
c. DOH d. Donn B. Parker
d. PNP DDA 26. WWW stands for? B
20. The Office of Cybercrime (OOC) was a. World Wide Wholesome
established by the Republic and their b. World Wide Web
Functions within what department? B c. Wide World Web
a. PNP ACG d. Whole World Wide
b. DOJ 27. It is said that Cybercrime is a criminal
c. DOH act t in which a computer is used as a
d. PNP DDA principal tool. C
21. It is an unlawful act wherein the a. Donn B. Parker
computer either as a tool or target or b. Gottenbarn
both. C c. Forester and Momson
a. Cyber Response d. Roy Girasa
b. Cyber Security 28. On this year, personal computers
c. Cyber Crime became more and more popular. C
d. Cyber Space a. 1960
22. How many elements does Computer b. 1970
Crime have? B c. 1980
a. One d. 1990
b. Two 29. The first email took place in B
c. Three a. 1975
d. None b. 1976
23. According to him, cybercrime is a c. 1978
generic term covering the multiplicity of d. 1979
crimes found in penal codes or in 30. The first cybercrime took place in A
legislation having the use of computers a. 1820
as a center component. D b. 1830
a. Gottenbarn c. 1840
b. Forester and Momson d. 1850
c. Donn B. Parker 31. It is a crime that involves the use of a
d. Roy Girasa computer and a network. C
24. He is considered as the founder and a. Cyber Response
father of the knowledge of computer b. Cyber Security
crimes. A c. Cyber Crime
a. Donn B. Parker d. Cyber Space
b. Forester and Momson
32. It is the collection of of tools, policies, discoveries and the job that was
security concepts, security safeguards, completed. A
guidelines, risk management a. Reporting
approaches, actions, training, best b. Clearing Tracks
practices, assurance and technologies c. Maintaining Access
that can be used to protect the cyber d. Gaining Access
environment and organization and 37. This is a morally reprehensible
user's assets. C procedure. it has to do with the
a. Delay in Software Updates removal of all logs of all events that
b. Cyber Security and Cyber Crime occur during the hacking process. B
c. Bringing Your Own Device a. Reporting
(BYOD) Policy b. Clearing Tracks
d. Cyber Security – Privacy Policy c. Maintaining Access
33. This incident is prevalent that most d. Scanning
companies are unaware of the looming 38. It is when a hacker has already obtained
dangers and defer program upgrades access to a device, this is the method.
for a variety of reasons, including a lack After obtaining entry, the hacker sets
of time, additional costs, or simple up some back doors to allow him access
indifference, leaving the organization's to the device in the future if he wants it.
computer vulnerable to attack. A C
a. Delay in Software Updates a. Reporting
b. Cyber Security and Cyber Crime b. Clearing Tracks
c. Bringing Your Own Device c. Maintaining Access
(BYOD) Policy d. Scanning
d. Cyber Security – Privacy Policy 39. The vulnerability is discovered during
34. Employees access company data using this operation. The attacker tries to use
personal devices such as cellphones, it to gain access to the device. D
smartphones, and notebook computers a. Scanning
to stay connected and available at all b. Reconnaissance
times, posing a security risk. C c. Maintaining Access
a. Delay in Software Updates d. Gaining Access
b. Cyber Security – Privacy Policy 40. During this process, the attacker
c. Bringing Your Own Device deliberately probes a target computer
(BYOD) Policy or network for exploitable
d. Cyber Security and Cyber Crime vulnerabilities. B
35. How many phases does cyber security a. Gaining Access
attack have? B b. Scanning
a. Five c. Maintaining Access
b. Six d. Recoinnaisance
c. Seven 41. The attacker gathers information about
d. Eight a goal by active or passive means during
36. This is the last move in the ethical this process. A
hacking procedure. The ethical hacker a. Reconnaissance
compiles a paper detailing his/her b. Maintaining Access
c. Gaining Access d. Trojan Horses
d. Scanning 48. Someone who do things out of scientific
42. According to Global Information curiosity and see how they can get
Security Survey 2018- 2019, it is the access to information systems and how
most successful cybercrime. A far they can go. A
a. Phishing a. Hackers
b. Natural Disaster b. Crackers
c. Spam c. Malicious Insiders
d. Freud d. Industrial Spiers
43. It refers to sending a large number of 49. People who conducts conducts a
emails to the victim resulting in the computer-based assault against other
victim’s email account or mail servers computers or networks in an effort to
crashing. C intimidate or coerce a nation. They
a. Salami Attacks employ tactics to destroy or networks in
b. Theft order to inflict damage rather than
c. Email Bombing gather information. D
d. Virus a. Crackers
44. Also known as Hacking. Involves gaining b. Industrial Spiers
access illegally to a computer system or c. Cyber Criminals
network mail servers crashing. D d. Cyber Terrorists
a. Email Bombing 50. These attacks are often used in
b. Theft committing financial crime and are
c. Virus based on the idea that an alteration, so
d. Unauthorized Access insignificant, would go completely
45. It’s an event dependent programs unnoticed in a single case. A
where programs kick into action only a. Salami Attacks
when a certain event occurs. A b. Trojan Attacks
a. Logic Bombs c. Online Gambling
b. Online Gambling d. Email Bombing
c. Salami Attacks 51. It occurs when a website, e-mail server,
d. Trojan Attacks or computer system is subjected to or
46. It is an unauthorized program which threatened with repeated denial of
functions from inside what seems to be service or other attacks by malicious
an authorized program, thereby hackers. B
concealing what it is actually doing. B a. Cyber Warfare
a. Web Jacking b. Cyber Extortion
b. Trojan Attacks c. Cyber Terrorism
c. Cyber Terrorism d. Cyber Security
d. Logic Bombs 52. This involves the actions by a nation or
47. It means trying to trick or scam international organization to attack and
someone else using the Internet. B attempt another nation's computer
a. Financial Fraud Crimes network through viruses. A
b. Internet Fraud a. Cyber Warfare
c. Computer Fraud b. Cyber Extortion
c. Cyber Terrorism b. Egomania and Morbidly
d. Cyber Security Infatuated
53. It is a security device that keeps c. Intimacy Seeker
unauthorized intruders out of a d. Predatory Seeker
computer system or network while 58. This stalker usually has inadequate
allowing secure contact between social skills. They want a relationship
devices and users on the inside. D with the victim but do not have the
a. Exploit Kit ability to realize he or she is not meant
b. Clone Phishing to be with the victim. B
c. Exploit a. Intimacy Stalker
d. Firewall b. Incompetent Suitor
54. It is when a perpetrator singles out a c. Egomania and Morbidly
specific person and causes the person Infatuated
emotional distress and causes the d. Predatory Seeker
individual to fear for his or her life, 59. It is sometimes referred to as ‘cyber
safety, or safety of others. D harassment’ usually pertains to
a. Stalker threatening or harassing emails, instant
b. Predator messages, or website entries. B
c. Seeker a. Online Class
d. Stalking b. Online Harrassment
55. It is the use of electronic means, such as c. Online Webinar
the internet or cellphones, to stalk d. Online Crime
victims. C 60. It is also known as an IT incident,
a. Cyber Warfare computer incident or security incident.
b. Cyber Extortion B
c. Cyber Stalking a. Cyber Response
d. Cyber Fraud b. Incidents Response
56. This type of stalker becomes upset c. Cyber Security
when the friendship or romantic d. Incidents Security
relationship has ended. The rejected 61. It is available for free, as the name
stalker is not only self-centered and implies. It is available for free download
jealous but also over-dependent and and use on the Internet. This app, on
persistent. A the other hand, would not encourage
a. Rejected Stalker you to change it or charge a fee for
b. Resentful Stalker distributing it. Examples of this app
c. Predatory Stalker include Adobe Reader and Skype. C
d. Intimacy Seeker a. Shareware
57. This type of stalker victim loves them b. Open Source
even though they may not have any c. Freeware
contact with victim. The stalker is d. Closed Source
usually paranoid, prefers suitors in a 62. This type of program comes with the
higher social class, and will repeatedly source code, allowing you to tweak it
approach the victim. B and even add new functionality. These
a. Incompetent Suitor may be offered for free or for a fee. Any
examples include Moodle and Apache Windows media player are two
Web Server. B common examples. C
a. Shareware a. Web Browsers
b. Open Source b. Education and Reference
c. Freeware Software
d. Closed Source c. Multimedia Software
63. It is a system software kernel that must d. Graphics Software
be installed first on a computer in order 68. You may use graphics tools to modify or
for programs and computers to be alter visual data or photographs. It
recognized and usable. A includes tools for drawing and editing
a. Operating System pictures. Graphics tools includes Adobe
b. Device Drivers Photoshop and PaintShop Pro, to name
c. Application Software a few. D
d. System Software a. Web Browsers
64. A type of computer that possesses most b. Education and Reference
of the features and capabilities of a Software
large computer but is smaller in physical c. Multimedia Software
size. C d. Graphics Software
a. Microcomputer 69. It is a virtual network infrastructure that
b. Mainframe Computer links all of the world's computers. It is
c. Minicomputer usually connected via WAN and LAN. D
d. Supercomputer a. Instant Messaging
65. It is a device based on a single-chip b. Intranet
microprocessor. Common c. Extranet
microcomputers include laptops and d. Internet
desktops. A 70. It is an online service that allows one to
a. Microcomputer connect or communicate with one
b. Mainframe Computer another. C
c. Minicomputer a. Extranet
d. Supercomputer b. Intranet
66. It is a computer program that performs c. Instant Messaging
a particular purpose, whether d. Internet
educational, personal, or business- 71. It is a protocol that is used to transmit
related, is known as application voice over an IP network. It also allows
software. B people to make phone calls over the
a. Operating System internet. C
b. Application Software a. World Wide Web
c. Device Drivers b. Instant Messaging
d. System Software c. Voice over Internet Protocol
67. You may use this to make or capture d. Really Simple Syndication
images, as well as audio and video files. 72. VOIP stands for A
This program is widely used in the fields a. Voice over Internet Protocol
of animation, graphics, image, and b. Voice out Internet Protocol
video editing. VLC media player and c. Voice over Intranet Protocol
d. Vice over Internet Protocol 79. DSL stands for B
73. It is any physical or mental a. Digital Super Line
mistreatment or lack of care caused by b. Digital Subscriber Line
the use of an electronic communication c. Digital Sub Line
system that causes damage to or pain d. Down Subscriber Line
to others. B 80. The mechanical components that read
a. Cyberbullying and write data on a disk are referred to
b. Cyber Abuses as drives. C
c. Cyber Stalking a. Volumes
d. Cyber Stalker b. Disks
74. This is an abusive behavior, which c. Drive
includes the use of electronic media is a d. Data
type of cyber harassment. A 81. It improves efficiency by distributing
a. Cyber Harassment data across many disks and allowing
b. Cyber Stalking input/output (I/O) operations to
c. Cyber Abuses overlap in a balanced manner. D
d. Cyberbullying a. Internal Hard Disks
75. It is a method of transferring saved data b. External Hard Drives
from a device to an Internet server. C c. Optical Disks
a. Download d. Raid
b. Sideload 82. It is a collection of inter connected
c. Upload devices that process, store and input
d. Node data and information. A
76. It is a high-speed data transfer that a. Computer System
transports a variety of signals and traffic b. Computer Hardware
modes. B c. Computer Device
a. Node d. Computer Software
b. Broadband 83. A device that accepts information (in
c. Client the form of digitalized data) and
d. Server manipulates it for some result based on
77. It's a section of the Internet devoted to a program, software, or sequence of
allowing people to connect with one instructions on how the data is to be
another. C processed. B
a. Download a. Hardware
b. Client b. Computer
c. Chatrooms c. CPU
d. Node d. Software
78. A central node that directs messages 84. The most significant, part of
between sender and receiver nodes to information systems is the human
manage data flow. D element: the individuals who must
a. Node operate the system and the processes
b. Host they must obey in order for the facts
c. Director stored in huge databases and data
d. Switch warehouses to be transformed into
learning that can translate past events screensaver applications that can be
and direct future actions. B downloaded from the internet. B
a. Computer Hardware a. Worms
b. Human Resources and b. Trojan Horses
Procedures c. Viruses
c. Computer Software d. Internet Scams
d. Database and Data Warehouses 90. The practice of sending unsolicited e-
85. It's designed to help with device mail to vast groups of individuals using
diagnostics and repairs. Their email services. A
responsibilities could include anything a. Spam
from computer protection to disk drive b. Attack
defragmentation. A c. Adware
a. Utilities d. Botnet
b. Programming Language 91. It is a program that automates a task so
Translators that it can be carried out at a defense.
c. Firmware much faster pace and over a longer
d. Shareware period of time than a human operator
might. B
86. It is a dedicated server that handles a a. Adware
network's infrastructure, such as user b. Botnet
accounts. B c. Rootkits
a. Host d. Identity Theft
b. Directory Serve 92. A long-term storage that is used to keep
c. Router programs and records after the device
d. Server has been switched off. B
87. It involves flooding a computer a. Primary Storage
resource with more requests than it can b. Secondary Storage
handle, causing the resource to crash. C c. Data Storage
a. Logic Bombs d. Storage
b. Salami Attacks 93. It also stores stored data before it is
c. Denial of Service Attack output. A
d. Theft a. Primary Storage
88. Someone robs by breaking into b. Secondary Storage
company servers and converting funds c. Data Storage
from one account to another. D d. Storage
a. Hackers 94. A node that asks for and receives
b. Crackers services from other nodes. It is usually a
c. Industrial Spiers user's personal computer. C
d. Cyber Criminals a. Node
89. There are applications that tend to be b. Server
harmless, but they actually contain c. Client
malicious code. It is most often see in d. Host
the form of free video games and 95. A node that collaborates with other
nodes to exchange services. Dedicated
servers are dedicated to completing
complex activities. They can be referred
to as an application server, contact
server, storage server, file server,
printer server, or web server,
depending on the role hand. D
a. Client
b. Node
c. Host
d. Server
96. A node that forwards or routes data
packets from one network t60 another
network's destination. D
a. Client
b. Server
c. Host
d. Router
97. The act of harassing, tornament,
ridicule, or threats directed at a minor
by another minor or a group of minors
over the internet or by the phone. A
a. Cyber Bullying
b. Cyber Abuses
c. Cyber Stalking
d. Cyber Crime
98. It is a method of saving data from the
Internet to a server. B
a. Upload
b. Download
c. Sideload
d. Node
99. It's also a kind of internet to which only
a few have access. A
a. Extranet
b. Intranet
c. Internet
d. Instant Messaging
100. Storage device that is not
constantly linked to network servers or
the internet, such as USB Rash drives. B
a. Flash Memory
b. USB Flash Drives
c. Tape
d. Solid-State Drives