PRN Au Coa 2 Post Test 7 Key
PRN Au Coa 2 Post Test 7 Key
PRN Au Coa 2 Post Test 7 Key
COLLEGE OF CRIMINOLOGY
COURSE AUDIT 2
POST TEST_07 - TECHNICAL ENGLISH 1 AND 2
INTRODUCTION TO CYBERCRIME AND ENVIRONMENTAL LAWS
5. In a police report, what information should be included in the "incident description" section?
a) Personal opinions of the officer
b) Detailed account of the suspect's family background
c) Objective facts related to the incident
d) Random thoughts and musings
10. What is the purpose of the "officer's narrative" section in a police report?
a) To provide a platform for personal anecdotes
b) To summarize the incident in a concise manner
c) To showcase the officer's creative writing skills
d) To document the officer's observations and actions
12. What information should be included in the "victim's statement" section of a police report?
a) The officer's personal opinions about the victim
b) Objective facts provided by the victim
c) Speculations about the victim's credibility
d) Gossip heard from neighbors
13. What is the purpose of documenting the location of an incident in a police report?
a) To confuse investigators
b) To provide a sense of direction
c) To establish jurisdiction
d) To entertain readers
14. Which of the following is an essential aspect of effective police report writing?
a) Emotional language and bias
b) Grammar and spelling errors
c) Factual accuracy and objectivity
d) Incomplete information
19. What is the purpose of including the officer's badge number in a police report?
a) To identify the officer responsible for the report
b) To showcase the officer's rank
c) To entertain readers
d) To confuse investigators
23. When asking "what," what aspect of the event or situation are you focusing on?
a) Purpose
b) Location
c) Identity
d) Description
24. The question "why" seeks to understand:
a) Time
b) Purpose or motive
c) Identity
d) Description
25. Which question is used to determine the method or manner in which something occurred?
a) Who
b) Why
c) How
d) What
26. Which term refers to the unauthorized copying, distribution, or use of copyrighted materials?
a. Identity theft c. Intellectual property theft
b. Cyberbullying d. Cyber terrorism
27. What type of cybercrime involves manipulating individuals into divulging confidential information?
a. Hacking c. Malware
b. Phishing d. Cyberstalking
28. Which of the following is an example of cyber terrorism?
a. Stealing credit card information
b. Disrupting critical infrastructure
c. Spreading false information online
d. Gaining unauthorized access to a computer system
29. What term describes the act of using the internet to harass, intimidate, or threaten others?
a. Cyberbullying c. Cyberstalking
b. Cyber espionage d. Cyber warfare
30. Which of the following is a characteristic of cybercrime?
a. Limited reach and impact c. Transcends geographical boundaries
b. Requires physical presence d. Primarily targets physical assets
31. Scenario: The government of the Philippines is implementing measures to enhance cybersecurity across the nation. Which of the
following initiatives is most likely to be effective in preventing cybercrime?
a. Providing free public Wi-Fi in urban areas
b. Launching cybersecurity awareness campaigns in schools and communities
c. Banning the use of social media platforms
d. Encouraging the use of outdated software to save costs
32. Scenario: A large corporation in the Philippines experienced a data breach, resulting in the exposure of sensitive customer
information. What should the company prioritize to prevent such incidents in the future?
a. Ignoring the breach and hoping it doesn't happen again
b. Implementing encryption techniques for stored data
c. Blaming individual employees for the breach
d. Decreasing investment in cybersecurity measures
33. Scenario: A small business owner in the Philippines wants to protect their company's online transactions from cyber threats. What
should they consider implementing?
a. Using the same password for all accounts to simplify management
b. Implementing multi-factor authentication for access to sensitive systems
c. Sharing confidential business information via unsecured email
d. Ignoring cybersecurity practices due to the small size of the business
34. Scenario: A government agency in the Philippines is concerned about the increasing frequency of phishing attacks targeting its
employees. What preventive measure should the agency prioritize?
a. Encouraging employees to click on suspicious links to gather more information
b. Providing regular cybersecurity training to employees to recognize phishing attempts
c. Restricting internet access for all employees to prevent phishing attacks
d. Ignoring reports of phishing attempts to avoid panic
35. Scenario: A university in the Philippines wants to secure its network from unauthorized access. What action should the university
take?
a. Sharing Wi-Fi passwords publicly to promote inclusivity
b. Implementing strong password policies for students and faculty
c. Allowing unrestricted access to the university's network
d. Disabling firewalls and antivirus software to improve network speed
36. Scenario: A non-profit organization in the Philippines collects donations online but is concerned about the security of its donation
platform. What should the organization do to enhance security?
a. Share donation links via unsecured social media channels
b. Implement SSL encryption for the donation website
c. Store donor information in plain text format
d. Allow anonymous donations without any verification process
37. Scenario: A group of individuals in the Philippines is planning to launch a community-based cybersecurity initiative. What approach
should they take to effectively prevent cybercrime?
a. Ignoring cybersecurity issues and focusing on other community projects
b. Collaborating with local law enforcement agencies and cybersecurity experts
c. Conducting cyber attacks to raise awareness about cyber threats
d. Blaming the government for all cybersecurity issues
38. Scenario: A financial institution in the Philippines wants to protect its customers' financial information from cyber threats. What
measure should the institution prioritize?
a. Sharing customer data with third-party vendors
b. Encrypting sensitive data during transmission and storage
c. Outsourcing cybersecurity responsibilities to reduce costs
d. Neglecting to update security systems and software regularly
39. Scenario: A school in the Philippines is concerned about the safety of its students online. What action should the school take to
promote cybersecurity among students?
a. Allowing students unrestricted access to the internet without supervision
b. Providing cybersecurity workshops and seminars for students
c. Ignoring reports of cyberbullying among students
d. Discouraging students from reporting cyber threats
40. Scenario: A telecommunications company in the Philippines wants to protect its infrastructure from cyber attacks. What should the
company prioritize to enhance its cybersecurity posture?
a. Sharing sensitive customer data with unauthorized third parties
b. Implementing robust intrusion detection and prevention systems
c. Ignoring reports of suspicious network activity
d. Using outdated software and hardware to save costs
41. What is the primary goal of cybersecurity?
a. Enhancing internet speed
b. Protecting information and systems from unauthorized access, use, disclosure, disruption, modification, or destruction
c. Increasing vulnerability to cyber attacks
d. Preventing physical break-ins
42. What is a common method cybercriminals use to gain unauthorized access to systems or networks?
a. Social engineering c. Strong passwords
b. Public Wi-Fi d. Encryption
43. What does the term "phishing" refer to in the context of cybersecurity?
a. Sending fraudulent emails or messages to trick c. Enhancing internet speed
individuals into revealing sensitive information d. Protecting against malware
b. Deleting files from a computer
44. What is the purpose of encryption in cybersecurity?
a. To slow down internet speed
b. To delete sensitive information
c. To convert data into a code that only authorized users can access
d. To increase vulnerability to cyber attacks
45. What is a DDoS (Distributed Denial of Service) attack?
a. An attack that denies users access to their own data
b. An attack that steals sensitive information
c. An attack that floods a system or network with traffic to disrupt its normal operation
d. An attack that encrypts files and demands a ransom for their release
46. What is a firewall in the context of cybersecurity?
a. A physical barrier around a computer
b. A software or hardware-based security system that monitors and controls incoming and outgoing network traffic
c. A device that scans for viruses on a computer
d. A tool used to generate strong passwords
47. Which of the following is an example of a strong password?
a. 123456
b. Password123
c. Tr0ub4dor&3
d. myDog'sName
48. What is the purpose of multi-factor authentication (MFA) in cybersecurity?
a. To use multiple passwords for the same account
b. To use multiple security measures to verify a user's identity, such as a password, fingerprint, or security token
c. To prevent users from accessing their accounts
d. To slow down internet speed
49. What does the term "malware" refer to in the context of cybersecurity?
a. Hardware that is malicious
b. Software that is intentionally designed to cause damage to a computer, server, or network
c. C) Mail services that are insecure
d. D) Software that improves computer performance
50. What is the purpose of a VPN (Virtual Private Network) in cybersecurity?
a. To slow down internet speed
b. To provide a secure connection to a private network over the internet
c. To share sensitive information publicly
d. To make it easier for hackers to access a network.