Practice Exam: Criminal Law & Jurisprudence - Cybercrime & Electronic Evidence (Set 52)

A 30-question practice exam covering RA 10175 (Cybercrime Prevention Act), electronic evidence, and digital crimes.

1. Which of the following is considered a core cybercrime offense under RA 10175?

A.Online libel
B.Illegal Access
C.Cybersex
D.Identity theft

2. Under the Cybercrime Prevention Act, what is the penalty for illegal interception of data?

A.Prision correccional in its maximum period
B.Prision mayor in its minimum period
C.Reclusion temporal
D.Arresto mayor

3. Which government agency is the central authority for international cooperation on cybercrime matters?

A.National Bureau of Investigation (NBI)
B.Department of Justice - Office of Cybercrime (DOJ-OOC)
C.Philippine National Police (PNP) Anti-Cybercrime Group
D.Department of Information and Communications Technology (DICT)

4. A person who knowingly uses a computer program designed to damage a computer system is liable for what offense?

A.Data Interference
B.Misuse of Devices
C.System Interference
D.Illegal Access

5. What is the specific provision in RA 10175 that penalizes the acquisition of a domain name in bad faith to profit from the goodwill of another's trademark?

A.Cyber-libel
B.Cybersquatting
C.Cybersex
D.Online Fraud

6. If a public official commits any of the cybercrime offenses, what is the effect on the penalty?

A.The penalty is lowered by one degree.
B.The penalty is one degree higher.
C.The penalty is the same as for a private individual.
D.The official is only administratively liable.

7. Which court has jurisdiction over cybercrime cases?

A.Municipal Trial Court
B.Regional Trial Court
C.Court of Appeals
D.Sandiganbayan

8. The act of inputting, altering, or deleting any computer data without right, resulting in inauthentic data with the intent that it be considered or acted upon as if it were authentic, is known as:

A.Computer-related Fraud
B.Computer-related Forgery
C.Computer-related Identity Theft
D.Data Interference

9. What is the nature of liability for corporate offenders in cybercrime cases?

A.The corporation is solely liable.
B.The CEO is solely liable.
C.The responsible officers, directors, or employees are criminally liable.
D.The corporation is only civilly liable.

10. The DOJ-OOC is created under what specific law?

A.Electronic Commerce Act (RA 8792)
B.Data Privacy Act (RA 10173)
C.Cybercrime Prevention Act (RA 10175)
D.Anti-Wiretapping Act (RA 4200)

11. What is the primary principle established by the Electronic Commerce Act (RA 8792) regarding electronic documents?

A.They are superior to paper-based documents.
B.They shall have the same legal effect, validity, and enforceability as paper-based documents.
C.They are only admissible in civil cases.
D.They require notarization to be valid.

12. Under RA 8792, an electronic signature is legally recognized if it is:

A.A scanned image of a person's handwritten signature.
B.Any distinctive mark, characteristic, or sound in electronic form, representing the identity of a person and attached to an electronic document.
C.A password entered into a system.
D.A digital certificate from a foreign authority.

13. For an electronic data message to be legally equivalent to an original document, what must be demonstrated?

A.That it was encrypted.
B.That its integrity has been preserved and is capable of being displayed.
C.That it was sent via a secure email server.
D.That it was digitally signed by a lawyer.

14. RA 8792 provides for the legal recognition of contracts formed through what means?

A.Verbal agreements only.
B.Notarized documents only.
C.Electronic means.
D.Handwritten letters.

15. The Electronic Commerce Act applies to what kind of transactions?

A.Government transactions only.
B.Private commercial transactions only.
C.Both commercial and non-commercial transactions.
D.International transactions only.

16. What is the presumption regarding an electronic signature under RA 8792?

A.It is presumed to be forged until proven otherwise.
B.It is presumed to be the signature of the person to whom it correlates.
C.It is presumed to be invalid if not a digital signature.
D.It has no legal presumption.

17. The act of sending unsolicited commercial communications online is also known as:

A.Phishing
B.Spamming
C.Hacking
D.Vishing

18. Under the Electronic Commerce Act, what is the liability of a service provider who merely provides access?

A.Strictly liable for any illegal content.
B.Generally not liable if it has no knowledge of the illegal activity.
C.Always liable as an accomplice.
D.Liable only if they profit from the content.

19. What does "functional equivalence" mean in the context of RA 8792?

A.Electronic documents are functionally easier to use.
B.An electronic record has the same legal function as its paper counterpart.
C.All electronic devices are treated the same.
D.A digital signature is the same as a handwritten one.

20. RA 8792 defines a "computer" as:

A.Any desktop or laptop device.
B.Any device with a screen and keyboard.
C.Any device or group of interconnected devices that can perform automated processing of data.
D.Mainframe systems only.

21. Under the Rules on Electronic Evidence, what is the main requirement for admitting electronic evidence?

A.It must be authenticated by the NBI.
B.It must be authenticated by the party seeking to introduce it.
C.It must be in a printed format.
D.It must be certified by an IT expert.

22. How can an electronic document be authenticated under the Rules on Electronic Evidence?

A.By showing it was created by the opposing party.
B.By evidence that it has been digitally signed by the person purported to have signed it.
C.By testifying that the document is new.
D.By presenting a floppy disk where the file was stored.

23. What are "ephemeral electronic communications" under the Rules on Electronic Evidence?

A.Emails and database records.
B.Text messages, telephone conversations, and other forms of communication that are not recorded or retained.
C.Official government electronic records.
D.Website content.

24. How may ephemeral electronic communications be proven in court?

A.By presenting the device where it originated.
B.By a certified true copy.
C.By the testimony of a person who was a party to or has personal knowledge of the communication.
D.By an affidavit of a telecom engineer.

25. What is the legal presumption concerning the integrity of an electronic document?

A.It is presumed to be compromised.
B.It is presumed to have been preserved if a reliable assurance can be shown.
C.It is presumed to be intact if it is encrypted.
D.There is no such presumption.

26. Which of the following is considered "sensitive personal information" under the Data Privacy Act (RA 10173)?

A.Name and address.
B.Age and birthdate.
C.Health records and religious affiliation.
D.Email address.

27. What is the primary government agency tasked with implementing and enforcing the Data Privacy Act?

A.Department of Justice (DOJ)
B.DICT
C.National Privacy Commission (NPC)
D.Cybercrime Investigation and Coordinating Center (CICC)

28. The unauthorized processing of personal information is punishable by:

A.A fine only.
B.Community service.
C.Imprisonment and a fine.
D.A public apology.

29. What is the principle that requires personal information to be collected for specified and legitimate purposes only?

A.Transparency
B.Proportionality
C.Legitimate Purpose
D.Anonymization

30. A person or organization who controls the collection, holding, processing, or use of personal information is called a:

A.Data subject
B.Personal information processor
C.Personal information controller
D.Privacy officer