1.
It refers to assets whose value should be protected such as data, software, computers and network equipment.
A. 
B. 
C. 
D. 
2.
Which is not an example of tangible assets?
A. 
B. 
Knowledge and experience of people
C. 
D. 
3.
Which is an example of intangible asset?
A. 
B. 
Hard copy of customer information
C. 
D. 
4.
It refers to information that has been made available to the public such as product catalogs and information on Web pages, and information that can be published without issue.
A. 
B. 
C. 
D. 
5.
Which is not an example of unpublished information?
A. 
B. 
Human resources information
C. 
D. 
6.
It refers to the act of manipulating people to obtain important information through physical and personal means and use it for fraudulent purpose.
A. 
B. 
C. 
D. 
7.
The process of trespassing into a building or site by using items such as ID card that have been found or stolen.
A. 
B. 
C. 
D. 
8.
The act of looking at someone's keyboard while they are entering a password.
A. 
B. 
C. 
D. 
9.
The act of intruding on a system without authorization in order to rewrite data within a computer using an unauthorized means.
A. 
B. 
Falsification of information
C. 
D. 
10.
A malicious program that is created for purposes such as intruding into a computer without the user's knowledge to destroy data within the computer.
A. 
B. 
C. 
D. 
11.
Which among the ff. is not part of the life cycle of a computer virus?
A. 
B. 
C. 
D. 
12.
The process of masquerading as cleaning staff in order to dig through trash and gather information such as customer information and human resources information.
A. 
B. 
C. 
D. 
13.
Type of virus that infects the location that stores the program that are executed on system launch.
A. 
B. 
C. 
D. 
14.
Type of virus that attempts to conceal itself so that it is hard to find the infection.
A. 
B. 
C. 
D. 
15.
A newer type of computer virus created for the purpose of using a computer for malicious purposes. Once a computer is infected, a third party with a malicious intent can manipulate the computer and cause serious damage.
A. 
B. 
C. 
D. 
16.
The act of sending email as if it were from an actual corporation or organization to obtain the personal credit information of the recepient such as credit card numbers, IDs and passwords.
A. 
B. 
C. 
D. 
17.
An attack with an attempt to disable the functions of a mail server by sending a large amount of email to overload a server
A. 
B. 
C. 
D. 
18.
The process of scanning a computer to look for open port numbers
A. 
B. 
C. 
D. 
19.
A form of password cracking that involves analysis in combination with a file which comprises a large list of descriptions of candidate user names and passwords.
A. 
B. 
C. 
D. 
Distributed denial-of-service
20.
A form of password cracking which involves analysis in combination with a program that generates random character strings
A. 
B. 
C. 
D. 
21.
Type of virus by symptoms that causes destruction to the OS as the basic software, or causes destruction to application software.
A. 
B. 
C. 
Screen display destruction
D. 
Specific date/time message output