GAMARO CDI 9 100 Questions

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

GAMARO, SEGUNDO JR. F.

Introduction to Cybercrime & Environmetal Laws & Protection (CDI9)

BSCRIMINOLOGY SIR QUIZON

100ems Question and Answer (MCQ) 

1) Refers to a criminal activity involving the use of a computer.


a. COMPUTER CRIME
b. NET CRIME
c. CRIME
d. NOTA
2) Refers to criminal use of the internet.
a. CYBERCRIME
b. NET CRIME
c. COMPUTER CRIME
d. NOTA
3) A crime under the Revised Penal Code is referred to as
a. CYBERCRIME
b. NET CRIME
c. COMPUTER CRIME
d. Felony
4) CLASSIFICATION OF COMPUTER CRIMES
a. Financial Fraud Crimes and Cybercrime
b. Cybercrime and Computer Fraud
c. Financial Fraud Crimes and Computer Fraud
5) defined as an intentional act of deception involving financialtransactions for purposes of personal
gain.
a. Cybercrime
b. Financial Fraud Crime
c. Computer Crime
d. Nota
6) Is any dishonest misrepresentation of fact intended to let another to door refrain from doing
something which causes loss.
a. Computer Fraud Crime
b. Financial Fraud Crime
c. Cybercrime
d. Nota
7) Kenneth Fillada used a computer and internet as an instrument to commit crime. what is
computer?
a. Cybercrime
b. Computer Crime
c. Net crime
d. Nota
8) Japjap Supot used a computer as an instrument to further illegal ends. What type of crime does
japjap supot commit?
a. Cybercrime
b. Computer crime
c. Net crime
d. Nota
9) Computer as a target and Computer as a tool is categories of
a. Net Crime
b. Cybercrime
c. Computer crime
d. Nota
10) When the individual is the main target of cybercrime, the computer can be
considered as
a. Tool
b. Target
c. Instrument
d. Nota
11) An electronic medium that is used to facilitate online communication.
a. Facebook
b. Twitter
c. Instragram
d. Cyberspace

12) it refers to the virtual computer world

a. Facebook
b. Twitter
c. Instragram
d. Cyberspace

13) Antivirus and Antispyware programs, Firewall that block unauthorized access to a network and
VPNs is a example of

a. Cybercrime

b. Cyberspace

c. Cybersecurity

d. Net Crime

14) It actually prevents the cyber attacks.

a. Cybercrime

b. Cyberspace
c. Cybersecurity

d. Net Crime

15) Ogz Pango use fake email account to get information from internet user. What type of Cybercrime
does Ogz pango commit?

a. Phising

b. Identity Theft

c. Online Harassment

d. Web jacking

16) Using fake email messages to get personal information from internet users.

a. Phishing

b. Cyberstalking

c. Cybersex

d. Identity Theft

17) It aims to steal user data including the log in credentials, credit card number and

sensitive personal information of the user.

a. Phishing

b. Cyberstalking

c. Cybersex

d. Identity Theft

18) The following is the correct way to detect phishing except

a. Watch for overly generic content and greetings.

b. Examine the entire email address

c. Look for urgency or demanding actions

d. Check for secure websites. – any webpage

where you enter personal information should a

URL with http://.

19) Uhm Fillado uses your personal information such as your name, address, credit or bank account

and any sensitive information to assume your identity in order to commit fraud or

other criminal acts. What type of Cybercrime does Uhm Fillado commit.
a. Identity Theft
b. Phishing
c. Webjacking
d. Cyberstalking

20) It is one of the oldest cybercrime

a. Identity Theft
b. Phishing
c. Webjacking
d. Cyberstalking

21) Does Stealing Kenneth fillado wallets and purses containing identification cards and bank

Information is necessary to commit Identity Theft

a. Yes
b. No
c. Maybe
d. Sometimes

22) Rummaging through your trash for discarded personal data in a practice

known as

a. Dumpster diving
b. Diving
c. Trash Diving
d. Dumpster driving

You might also like