GAMARO, SEGUNDO JR. F.
Introduction to Cybercrime & Environmetal Laws & Protection (CDI9)
BSCRIMINOLOGY SIR QUIZON
100ems Question and Answer (MCQ)
1) Refers to a criminal activity involving the use of a computer.
a. COMPUTER CRIME
b. NET CRIME
c. CRIME
d. NOTA
2) Refers to criminal use of the internet.
a. CYBERCRIME
b. NET CRIME
c. COMPUTER CRIME
d. NOTA
3) A crime under the Revised Penal Code is referred to as
a. CYBERCRIME
b. NET CRIME
c. COMPUTER CRIME
d. Felony
4) CLASSIFICATION OF COMPUTER CRIMES
a. Financial Fraud Crimes and Cybercrime
b. Cybercrime and Computer Fraud
c. Financial Fraud Crimes and Computer Fraud
5) defined as an intentional act of deception involving financialtransactions for purposes of personal
gain.
a. Cybercrime
b. Financial Fraud Crime
c. Computer Crime
d. Nota
6) Is any dishonest misrepresentation of fact intended to let another to door refrain from doing
something which causes loss.
a. Computer Fraud Crime
b. Financial Fraud Crime
c. Cybercrime
d. Nota
7) Kenneth Fillada used a computer and internet as an instrument to commit crime. what is
computer?
a. Cybercrime
b. Computer Crime
c. Net crime
d. Nota
8) Japjap Supot used a computer as an instrument to further illegal ends. What type of crime does
japjap supot commit?
a. Cybercrime
b. Computer crime
c. Net crime
d. Nota
9) Computer as a target and Computer as a tool is categories of
a. Net Crime
b. Cybercrime
c. Computer crime
d. Nota
10) When the individual is the main target of cybercrime, the computer can be
considered as
a. Tool
b. Target
c. Instrument
d. Nota
11) An electronic medium that is used to facilitate online communication.
a. Facebook
b. Twitter
c. Instragram
d. Cyberspace
12) it refers to the virtual computer world
a. Facebook
b. Twitter
c. Instragram
d. Cyberspace
13) Antivirus and Antispyware programs, Firewall that block unauthorized access to a network and
VPNs is a example of
a. Cybercrime
b. Cyberspace
c. Cybersecurity
d. Net Crime
14) It actually prevents the cyber attacks.
a. Cybercrime
b. Cyberspace
c. Cybersecurity
d. Net Crime
15) Ogz Pango use fake email account to get information from internet user. What type of Cybercrime
does Ogz pango commit?
a. Phising
b. Identity Theft
c. Online Harassment
d. Web jacking
16) Using fake email messages to get personal information from internet users.
a. Phishing
b. Cyberstalking
c. Cybersex
d. Identity Theft
17) It aims to steal user data including the log in credentials, credit card number and
sensitive personal information of the user.
a. Phishing
b. Cyberstalking
c. Cybersex
d. Identity Theft
18) The following is the correct way to detect phishing except
a. Watch for overly generic content and greetings.
b. Examine the entire email address
c. Look for urgency or demanding actions
d. Check for secure websites. – any webpage
where you enter personal information should a
URL with [Link]
19) Uhm Fillado uses your personal information such as your name, address, credit or bank account
and any sensitive information to assume your identity in order to commit fraud or
other criminal acts. What type of Cybercrime does Uhm Fillado commit.
a. Identity Theft
b. Phishing
c. Webjacking
d. Cyberstalking
20) It is one of the oldest cybercrime
a. Identity Theft
b. Phishing
c. Webjacking
d. Cyberstalking
21) Does Stealing Kenneth fillado wallets and purses containing identification cards and bank
Information is necessary to commit Identity Theft
a. Yes
b. No
c. Maybe
d. Sometimes
22) Rummaging through your trash for discarded personal data in a practice
known as
a. Dumpster diving
b. Diving
c. Trash Diving
d. Dumpster driving