1.
RA 10175, also known as the Cybercrime Prevention Act of 2012, follows which principle or definition of cybercrime?
2.
The feature of information security where sensitive data or information can be accessed only by an authorized person and should be reserved away from all those who are not authorized to access it.
3.
What term refers to attacks that can cause significant disruption to business operations and result in significant financial losses by sending or inputting malware that encrypts an organization’s data and demands payment for the decryption key?
4.
What term refers to the introduction of viruses, worms, Trojan horses, and other malicious software for the purpose of hacking or destroying ICT systems?
5.
It refers to an act of identifying and then exploiting weaknesses in a computer system or network, usually to gain unauthorized access to personal or organizational data.
6.
Here, the computer is used to store data and instructions.
7.
The declaration of policy is like the opening statement of a speech, explaining the purpose and intention behind the law. It helps to guide the interpretation and application of the law by providing a framework for understanding its objectives and scope. What does the Declaration of Policy under Sec. 2 of Republic Act 10175, known as Cybercrime Prevention Act of 2012 seek to protect?
8.
It refers to a crime that 'knows no physical or geographic boundaries' and can be conducted with less effort, greater ease, and at greater speed.
9.
What process involves utilizing a matrix-based system, commonly used across various industries, that correlates the severity of a threat with the probability of its occurrence?
10.
Programs, apps, and online services often have vulnerabilities, providing avenues for attackers. Detecting these vulnerabilities can be challenging, especially for large and frequently changing software projects.
11.
It decides when to start receiving data, when to stop it, where to store data, etc. It takes care of step-by-step processing of all operations inside the computer.
12.
It refers to the process of entering data and programs into the computer system.
13.
Without the intention of illegally accessing the confidential information of the local government's website, Mr. W was able to access such documents not available to the public by using Google search indexing. Which principle of cryptography is compromised?
14.
Challenges arise in international cooperation, demanding harmonized laws between collaborating countries. Mutual legal assistance treaties can facilitate cooperation. What government agency handles this challenge?
15.
It refers to the discrepancies in internet access across the globe.
16.
It refers to the right to be free from unwarranted exploitation of one’s person or from intrusion into one’s private activities in such a way as to cause humiliation to a person’s ordinary sensibilities.
17.
Mr. W was able to access the school's WiFi when one of the professors shared the password. Mr. W is engaging in the act of hacking.
18.
One of the processes of assessing and mitigating risks involves setting boundaries and limitations to find the right balance in scope. This refers to?
19.
One of the processes of assessing and mitigating risks involves interpreting the results in the context of either explicit risk acceptance or implementing countermeasures to mitigate the risk. This refers to?
20.
There is no universally accepted definition of cybercrime.
21.
In the context of computer security, what is defined as the probability of an adverse event occurring, considering both the likelihood of the event and its potential impact?
22.
Challenges arise in international cooperation, demanding harmonized laws between collaborating countries. Mutual legal assistance treaties can facilitate cooperation, but requests for support may be time-consuming and yield unpredictable results. This is referred to as:
23.
It refers to the devices externally connected to the computer.
24.
It ensures that data is accurate, complete, and unaltered. Which principle of cryptography is this?
25.
Which law enforcement authorities, specifically the computer or technology crime divisions or units responsible for the investigation of cybercrimes, are required to submit timely and regular reports, including pre-operation, post-operation, and investigation results, as well as any other required documents?
26.
The last paragraph of Sec. 2 of RA 10175 states: 'In this light, the State shall adopt sufficient powers to effectively prevent and combat such offenses by facilitating their detection, investigation, and prosecution at both the domestic and international levels and by providing arrangements for fast and reliable international cooperation.' This is referred to as:
27.
It is an office created under RA 10175 established for policy coordination among concerned agencies and for the formulation and enforcement of the national cyber security plan.
28.
Scribd.com, Academia.com, Slideshare.net, Coursehero.com, Studocu.com, and other file-sharing sites for educational materials are accessible on the internet. To prevent further fraud and illegal downloading, administrators use software or systems to block users by region for suspected illegal acts, through Internet Protocol (IP) bans or geolocking. What process is involved here?
29.
What type of attack involves creating a fake website to trick users into inputting their personal information, leading to the theft of sensitive data such as passwords, usernames, or login credentials?
30.
It ensures that sensitive information is kept private and only accessed by authorized individuals or entities. This protects against unauthorized disclosure of sensitive data, which can result in financial loss, reputational damage, or legal liability.
31.
It refers to those persons or individuals who use tools and techniques to gain unauthorized access to a computer system or network, with the intention of causing harm, stealing information, or committing other criminal offenses.
32.
What category of ICT do online or web security cameras fall under?
Hint
33.
According to Europol's definition of cybercrime, it encompasses traditional crimes facilitated by the internet and digital technologies, in addition to offenses solely perpetrated through computers or digital means.
34.
These threats come from within an organization, such as employees or contractors who misuse their access to sensitive information or systems, either intentionally or unintentionally.
35.
Among its powers is to monitor cybercrime cases being handled by participating law enforcement and prosecution agencies. What government agency has such power?
36.
It refers to an act that violates the law, which is perpetrated using information and communication technology (ICT) to either target networks, systems, data, websites and technology or facilitate a crime.
37.
Scribd.com, Academia.com, Slideshare.net, Coursehero.com, Studocu.com, and other file-sharing sites for educational materials are accessible on the internet. When evaluating these sites for potential fraud limiting it from multiple countries or user access, what process of assessing and mitigating risks is involved?
38.
What (ICT) term refers to the theft of sensitive information by nation-states or other organizations for strategic or competitive advantage.
39.
Which computer organization is referred to when major operations are performed using addition, subtraction, multiplication, division, logic, and comparison?
40.
Which of the following statements best describes a challenge faced in addressing cybercrime?
41.
It ensures that the information created and stored by an organization is accessible to authorized parties.
42.
The PNP shall create an anti-cybercrime unit, headed by at least a __________.
43.
These attacks involve manipulating individuals into divulging sensitive information or taking actions that are detrimental to security, often using psychological tactics.
44.
What term refers to targeted attacks that are carried out over a long period of time by skilled attackers who seek to gain unauthorized access to sensitive data or systems?
45.
Malicious attacks, such as Distributed Denial of Service (DoS) attacks, involve overwhelming a server with unnecessary requests, disrupting service for legitimate users. As a result, users may be unable to access a site due to the voluminous traffic. Which principle of cryptography is violated?
46.
The PNP through the PNP-ACG will be the frontrunner in raising awareness of cyber security at all levels of government especially the PNP, and has the following goals to help in raising public awareness to the Philippine cyberspace users.
47.
Another office is created under RA 10175 to coordinate the efforts of the NBI and the PNP in enforcing the provisions of the Act.
48.
It refers to professionals who are authorized by the owners of the system to test the system’s security and report back on any vulnerabilities found rather than causing harm or stealing information..
49.
When ICT is the target of the offense, this cybercrime negatively affects the confidentiality, integrity and/or availability of computer data or systems.
50.
Challenges arise in international cooperation, particularly in extradition processes, which facilitate the enforcement of cybercrime at the international level. Which government agency handles this challenge?