This document is a criminology exam covering organized crime and cybercrime. It contains 10 multiple choice identification questions defining key terms like hacking, phishing, viruses, and smuggling. It also asks two short answer questions about common cybercrimes and reasons for terrorist bombings. The exam was prepared by JO2 Mart Law S Ocampo and approved by the Dean and Director for Academics of Bataan Heroes Memorial College.
This document is a criminology exam covering organized crime and cybercrime. It contains 10 multiple choice identification questions defining key terms like hacking, phishing, viruses, and smuggling. It also asks two short answer questions about common cybercrimes and reasons for terrorist bombings. The exam was prepared by JO2 Mart Law S Ocampo and approved by the Dean and Director for Academics of Bataan Heroes Memorial College.
This document is a criminology exam covering organized crime and cybercrime. It contains 10 multiple choice identification questions defining key terms like hacking, phishing, viruses, and smuggling. It also asks two short answer questions about common cybercrimes and reasons for terrorist bombings. The exam was prepared by JO2 Mart Law S Ocampo and approved by the Dean and Director for Academics of Bataan Heroes Memorial College.
This document is a criminology exam covering organized crime and cybercrime. It contains 10 multiple choice identification questions defining key terms like hacking, phishing, viruses, and smuggling. It also asks two short answer questions about common cybercrimes and reasons for terrorist bombings. The exam was prepared by JO2 Mart Law S Ocampo and approved by the Dean and Director for Academics of Bataan Heroes Memorial College.
Year & Section: _____________________________________________ Date of Examination: _________________________________________ Permit #: ______________
INSTRUCTION: Read and analyze the directions, questions and choices CAREFULLY.
Part I. IDENTIFICATION (2 points each)
1. ________________________ - the act of illegally accessing the computer system/network of
an individual, group or business enterprise without the consent or approval of the owner of the system 2. ________________________ - a higher form of hacking in which unauthorized access culminates with the process of defeating the security system for the purpose of acquiring money or information and/or availing of free services 3. _______________________ - a computer program that can copy itself and infect a computer without permission or knowledge of the user 4. _______________________ - a file that appears harmless until executed 5. _______________________ - sending fraudulent e-mails or website pop-ups, to get victim to divulge sensitive financial information such as credit card numbers or social security numbers. 6. ______________________________- the unlawful or threatened use of force or violence by a person or an organized group against people or property 7. ______________________________- the category of terrorist group which aims in restructuring the society. 8. ______________________________- the category of terrorist group which is dedicated to overthrow an established order and replacing it with a new political or social structure. 9. ______________________________- body of ideas affecting the social needs and aspirations of an individual or group, a class or a culture. 10. ______________________________- clandestine transportation of goods or persons past a point where prohibited, such as out of a building, into a prison, or across an international border, in violation of the law or other rules.
Part II. Enumeration
1. What are the common types of cybercrimes?
2. What are common reasons why terrorist commit bombings?