1.
___________ is the first step in good computer security.
2.
______________ is anything that can cause harm to our compupter resources.
A. 
B. 
C. 
D. 
3.
_________ is defined as a step to ward off threat, thus protecting our data from harm.
A. 
B. 
C. 
D. 
4.
_______ is a technology term used when someone impersonates you.
A. 
B. 
C. 
D. 
5.
____________ is watching someone who withdraws on the ATM machine, and getting to know his or her PIN number.
A. 
B. 
C. 
D. 
6.
The use of wire tapping so that one can listen to any conversation over a telephone line is called __________.
7.
_____________ is a tecnique used by thefts to unsuspecting victim in providing critical information under the pretext of something legitimate such as pretending to be the one who is in authorty.
8.
A person who is running a bogus website pretending to be a hiring manager of a well known company. He tricks website visitors he can help them have a job for the company with the condition that he deposits money for processing. What technique is the person using?
9.
The famous "Hello Garci Tapes", which a conversation between the President and a COMELEC official was recorded, was an example of ___________.
10.
A technique where a person can go to the garbage cans or trash bins to get cancelled checks, bank deposit slips or credit card statements is referred to as _________.
11.
____________ is a program that works like a biological virus that spread from one computer through another with damaging effects.
12.
A software that is used to scan and destroy computer virus is called _____________.
13.
Check more that one choices to answer the question.
Which of the following devices where computer virus can spread?
A. 
B. 
C. 
D. 
14.
To avoid the spread of viruses, which of the following should be best applied when inserting a USB flash disk?
A. 
Scan the flashdisk before accessing the files
B. 
Move the files the computer then scan
C. 
Copy the files to the computer then scan
15.
Which statement is true in the following when using antivirus?
A. 
Antivirus software should be manually activated to detect viruses.
B. 
Antivirus software can detect all types of viruses.
C. 
Antivirus software should be continually updated to detect new
16.
A ______ is a program that performs a useful task, however it carries out some secret destructive motive and cruel intention.
17.
A _____________ resides in the computers memory that can travel indepently over computer networks.
18.
___________ are trigerred to perform a task or a mission when it encounters som events such as a date came or a simple mouse click or opening of storage devices, or a certain amount of time elpased.
19.
Can a cookie be used as a spying tool?
20.
_________ is a small code that a web server asks the web browser to place on the computer.
21.
_________ is like a cookie that can track a computer users activities and report them to someone else.
22.
__________ are classified as unwanted emails entering in your inbox.
23.
Any act of stealing hardware ad software resources are classified as _________.
24.
_________ is an illegal act of accessing the computer resources of some people without the knowledge or permission, or unauthorized access into company's network system.
25.
A hacker employs __________ technique where he tries to guess the password of the hapless victim.