PRN Au Coa 2 Post Test 7 Key

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

ARELLANO UNIVERSITY

COLLEGE OF CRIMINOLOGY
COURSE AUDIT 2
POST TEST_07 - TECHNICAL ENGLISH 1 AND 2
INTRODUCTION TO CYBERCRIME AND ENVIRONMENTAL LAWS

1. What is the primary purpose of a police report?


a) To entertain the readers
b) To document information about a crime or incident
c) To provide recommendations for future actions
d) To summarize news articles about law enforcement

2. Which of the following is NOT a crucial element of a well-written police report?


a) Accuracy
b) Conciseness
c) Exaggeration
d) Clarity

3. Which tense is commonly used when writing police reports?


a) Future tense
b) Past tense
c) Present tense
d) Progressive tense

4. What is the appropriate format for a police report?


a) Freeform narrative
b) Bullet points
c) Text messages
d) Standardized template

5. In a police report, what information should be included in the "incident description" section?
a) Personal opinions of the officer
b) Detailed account of the suspect's family background
c) Objective facts related to the incident
d) Random thoughts and musings

6. What is the purpose of documenting witness statements in a police report?


a) To provide entertainment for the readers
b) To discredit the witnesses
c) To establish credibility and gather evidence
d) To confuse the investigation process

7. Which of the following is NOT a characteristic of a well-written police report?


a) Vagueness
b) Accuracy
c) Objectivity
d) Completeness

8. What should be included in the "suspect description" section of a police report?


a) Physical appearance, clothing, and distinguishing features
b) Speculations about the suspect's motives
c) Hearsay from bystanders
d) Personal opinions of the officer

9. Which of the following is an example of an objective statement in a police report?


a) "The suspect seemed guilty."
b) "The suspect was seen leaving the scene of the crime."
c) "The suspect probably committed the crime."
d) "I believe the suspect is innocent."

10. What is the purpose of the "officer's narrative" section in a police report?
a) To provide a platform for personal anecdotes
b) To summarize the incident in a concise manner
c) To showcase the officer's creative writing skills
d) To document the officer's observations and actions

11. When should a police report be completed?


a) Only when the suspect has been apprehended
b) As soon as possible after the incident
c) At the end of the officer's shift
d) When the officer feels like it

12. What information should be included in the "victim's statement" section of a police report?
a) The officer's personal opinions about the victim
b) Objective facts provided by the victim
c) Speculations about the victim's credibility
d) Gossip heard from neighbors

13. What is the purpose of documenting the location of an incident in a police report?
a) To confuse investigators
b) To provide a sense of direction
c) To establish jurisdiction
d) To entertain readers

14. Which of the following is an essential aspect of effective police report writing?
a) Emotional language and bias
b) Grammar and spelling errors
c) Factual accuracy and objectivity
d) Incomplete information

15. How should officers handle confidential information in a police report?


a) Share it with the media for public awareness
b) Redact it to protect privacy and security
c) Make it the centerpiece of the report
d) Ignore it completely
16. What is the significance of documenting the date and time of an incident in a police report?
a) To confuse readers
b) To comply with bureaucratic regulations
c) To establish a timeline of events
d) To showcase the officer's watch

17. Which of the following should be avoided in police report writing?


a) Using jargon and technical terms
b) Providing specific details and facts
c) Including only subjective opinions
d) Maintaining clarity and coherence

18. How should officers handle conflicting information in a police report?


a) Disregard it and move on
b) Document all perspectives and discrepancies
c) Invent additional details to resolve conflicts
d) Ignore it and hope for the best

19. What is the purpose of including the officer's badge number in a police report?
a) To identify the officer responsible for the report
b) To showcase the officer's rank
c) To entertain readers
d) To confuse investigators

20. What is the final step after completing a police report?


a) Share it on social media for public opinion
b) Submit it to the department for review and filing
c) Tear it into pieces for recycling
d) Hide it in a drawer and forget about it
21. What does the "who" question typically inquire about?
a) Location
b) Identity
c) Time
d) Cause

22. Which question seeks to determine the "where" of an event or situation?


a) Who
b) Why
c) Where
d) How

23. When asking "what," what aspect of the event or situation are you focusing on?
a) Purpose
b) Location
c) Identity
d) Description
24. The question "why" seeks to understand:
a) Time
b) Purpose or motive
c) Identity
d) Description

25. Which question is used to determine the method or manner in which something occurred?
a) Who
b) Why
c) How
d) What

26. Which term refers to the unauthorized copying, distribution, or use of copyrighted materials?
a. Identity theft c. Intellectual property theft
b. Cyberbullying d. Cyber terrorism
27. What type of cybercrime involves manipulating individuals into divulging confidential information?
a. Hacking c. Malware
b. Phishing d. Cyberstalking
28. Which of the following is an example of cyber terrorism?
a. Stealing credit card information
b. Disrupting critical infrastructure
c. Spreading false information online
d. Gaining unauthorized access to a computer system
29. What term describes the act of using the internet to harass, intimidate, or threaten others?
a. Cyberbullying c. Cyberstalking
b. Cyber espionage d. Cyber warfare
30. Which of the following is a characteristic of cybercrime?
a. Limited reach and impact c. Transcends geographical boundaries
b. Requires physical presence d. Primarily targets physical assets
31. Scenario: The government of the Philippines is implementing measures to enhance cybersecurity across the nation. Which of the
following initiatives is most likely to be effective in preventing cybercrime?
a. Providing free public Wi-Fi in urban areas
b. Launching cybersecurity awareness campaigns in schools and communities
c. Banning the use of social media platforms
d. Encouraging the use of outdated software to save costs
32. Scenario: A large corporation in the Philippines experienced a data breach, resulting in the exposure of sensitive customer
information. What should the company prioritize to prevent such incidents in the future?
a. Ignoring the breach and hoping it doesn't happen again
b. Implementing encryption techniques for stored data
c. Blaming individual employees for the breach
d. Decreasing investment in cybersecurity measures
33. Scenario: A small business owner in the Philippines wants to protect their company's online transactions from cyber threats. What
should they consider implementing?
a. Using the same password for all accounts to simplify management
b. Implementing multi-factor authentication for access to sensitive systems
c. Sharing confidential business information via unsecured email
d. Ignoring cybersecurity practices due to the small size of the business
34. Scenario: A government agency in the Philippines is concerned about the increasing frequency of phishing attacks targeting its
employees. What preventive measure should the agency prioritize?
a. Encouraging employees to click on suspicious links to gather more information
b. Providing regular cybersecurity training to employees to recognize phishing attempts
c. Restricting internet access for all employees to prevent phishing attacks
d. Ignoring reports of phishing attempts to avoid panic
35. Scenario: A university in the Philippines wants to secure its network from unauthorized access. What action should the university
take?
a. Sharing Wi-Fi passwords publicly to promote inclusivity
b. Implementing strong password policies for students and faculty
c. Allowing unrestricted access to the university's network
d. Disabling firewalls and antivirus software to improve network speed
36. Scenario: A non-profit organization in the Philippines collects donations online but is concerned about the security of its donation
platform. What should the organization do to enhance security?
a. Share donation links via unsecured social media channels
b. Implement SSL encryption for the donation website
c. Store donor information in plain text format
d. Allow anonymous donations without any verification process
37. Scenario: A group of individuals in the Philippines is planning to launch a community-based cybersecurity initiative. What approach
should they take to effectively prevent cybercrime?
a. Ignoring cybersecurity issues and focusing on other community projects
b. Collaborating with local law enforcement agencies and cybersecurity experts
c. Conducting cyber attacks to raise awareness about cyber threats
d. Blaming the government for all cybersecurity issues
38. Scenario: A financial institution in the Philippines wants to protect its customers' financial information from cyber threats. What
measure should the institution prioritize?
a. Sharing customer data with third-party vendors
b. Encrypting sensitive data during transmission and storage
c. Outsourcing cybersecurity responsibilities to reduce costs
d. Neglecting to update security systems and software regularly
39. Scenario: A school in the Philippines is concerned about the safety of its students online. What action should the school take to
promote cybersecurity among students?
a. Allowing students unrestricted access to the internet without supervision
b. Providing cybersecurity workshops and seminars for students
c. Ignoring reports of cyberbullying among students
d. Discouraging students from reporting cyber threats
40. Scenario: A telecommunications company in the Philippines wants to protect its infrastructure from cyber attacks. What should the
company prioritize to enhance its cybersecurity posture?
a. Sharing sensitive customer data with unauthorized third parties
b. Implementing robust intrusion detection and prevention systems
c. Ignoring reports of suspicious network activity
d. Using outdated software and hardware to save costs
41. What is the primary goal of cybersecurity?
a. Enhancing internet speed
b. Protecting information and systems from unauthorized access, use, disclosure, disruption, modification, or destruction
c. Increasing vulnerability to cyber attacks
d. Preventing physical break-ins
42. What is a common method cybercriminals use to gain unauthorized access to systems or networks?
a. Social engineering c. Strong passwords
b. Public Wi-Fi d. Encryption
43. What does the term "phishing" refer to in the context of cybersecurity?
a. Sending fraudulent emails or messages to trick c. Enhancing internet speed
individuals into revealing sensitive information d. Protecting against malware
b. Deleting files from a computer
44. What is the purpose of encryption in cybersecurity?
a. To slow down internet speed
b. To delete sensitive information
c. To convert data into a code that only authorized users can access
d. To increase vulnerability to cyber attacks
45. What is a DDoS (Distributed Denial of Service) attack?
a. An attack that denies users access to their own data
b. An attack that steals sensitive information
c. An attack that floods a system or network with traffic to disrupt its normal operation
d. An attack that encrypts files and demands a ransom for their release
46. What is a firewall in the context of cybersecurity?
a. A physical barrier around a computer
b. A software or hardware-based security system that monitors and controls incoming and outgoing network traffic
c. A device that scans for viruses on a computer
d. A tool used to generate strong passwords
47. Which of the following is an example of a strong password?
a. 123456
b. Password123
c. Tr0ub4dor&3
d. myDog'sName
48. What is the purpose of multi-factor authentication (MFA) in cybersecurity?
a. To use multiple passwords for the same account
b. To use multiple security measures to verify a user's identity, such as a password, fingerprint, or security token
c. To prevent users from accessing their accounts
d. To slow down internet speed
49. What does the term "malware" refer to in the context of cybersecurity?
a. Hardware that is malicious
b. Software that is intentionally designed to cause damage to a computer, server, or network
c. C) Mail services that are insecure
d. D) Software that improves computer performance
50. What is the purpose of a VPN (Virtual Private Network) in cybersecurity?
a. To slow down internet speed
b. To provide a secure connection to a private network over the internet
c. To share sensitive information publicly
d. To make it easier for hackers to access a network.

You might also like