Bestlink College of the Philippines
1071 Brgy. Kaligayahan, Quirino Highway, Novaliches, Quezon City
VISION
To improve the quality of student’s input and by promoting IT VISION
enabled, market driven and internationally comparable To produce a self-motivated and self-directed individual who
programs through quality assurance systems, upgrading aims for academic excellence, God-fearing, peaceful, healthy,
faculty qualifications and establishing international linkages. and productive successful citizens.
MISSION MISSION
Bestlink College of the Philippines is committed to provide and The College of Computer Studies is committed to provide
promote quality education with a unique, modern and quality information and communication technology education
research-based curriculum with delivery systems geared through the use of modern and transformation learning
towards excellence. teaching process.
COLLEGE OF COMPUTER STUDIES
BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY
PRELIMENARY EXAMINATION: FIRST SEMESTER, A.Y. 2025-2026
ITSP3C DATA PRIVACY AND SECURITY
SET B
General Directions: All answers should be written in the test booklet. Do not mark/write on the questionnaire.
Specific Direction: Read each sentence/statement/situation carefully, select the correct answer among the choices, and write its
corresponding letter.
1. Adware primarily aims to:
A. Destroy files B. Spy on users C. Display targeted ads D. Lock screens
2. Cyberbullying is a form of:
A. Physical theft B. Intellectual loss C. Mental abuse D. Server overload
3. When a bot is used maliciously, it connects to:
A. An ad server B. Central control server C. Browser D. Task manager
4. Which malware is known for showing ads tied to user behavior?
A. Spyware B. Ransomware C. Adware D. Worm
5. Which cloud improvement helps detect unauthorized CPU usage?
A. Auto-login B. Monitoring tools C. Quick boot D. VPN logs
6. Trojans are named after a tale from which mythology?
A. Roman B. Egyptian C. Greek D. Norse
7. What virus was the first to be detected on ARPANET?
A. ILOVEYOU B. Creeper C. Blaster D. Nimda
8. Which of the following is a type of malware that attaches itself to files and replicates?
A. Worm B. Virus C. Trojan D. Rootkit
9. Which type of malware replicates without attaching to host files?
A. Virus B. Trojan C. Worm D. Spyware
10. Which malware type often connects infected systems to a central command server?
A. Worm B. Keylogger C. Bot D. Rootkit
11. What is a botnet?
A. A virus collection B. A spyware group C. A worm farm D. A network of infected computers controlled remotely
12. Which of the following may simulate traffic to test security?
A. Keylogger B. Good Bot C. Ransomware D. Rootkit
13. What malware shows fake virus alerts to scare users into paying?
A. Ransomware B. Scareware C. Adware D. Spyware
14. Spyware mainly tries to:
A. Delete files B. Encrypt data C. Steal information D. Display ads
15. The ILOVEYOU virus originated from which country?
A. Russia B. China C. Philippines D. India
16. Which tool is best used to remove spyware?
A. Disk cleaner B. Registry editor C. Anti-spyware D. Task manager
17. What does ransomware typically do?
A. Hide ads B. Encrypt files for ransom C. Record keystrokes D. Delete system logs
18. Which of these can be used to detect botnets?
A. Heat sink B. IDS/IPS C. Task Manager D. BIOS
ITSP3 DATA PRIVACY AND SECURITY SET B Page 1 of 4
19. Bots can be used to:
A. Print images B. Perform DDoS attacks C. Clean files D. Boost firewalls
20. A rootkit typically:
A. Hides system drivers B. Encrypts personal files C. Deletes shortcuts D. Creates desktop icons
21. Which of the following malware attacks usually demands money?
A. Adware B. Spyware C. Ransomware D. Keylogger
22. A worm primarily spreads through:
A. System Registry B. Emails and networks C. USB devices only D. Browsers only
23. Which malware is known to disguise as a legitimate program?
A. Botnet B. Trojan C. Worm D. Keylogger
24. What is the main goal of a virus?
A. Reproduce and spread B. Send emails C. Create networks D. Open browsers
25. Which malware type is difficult to detect because it hides in the OS?
A. Keylogger B. Rootkit C. Adware D. Worm
26. Which malware captures everything a user types?
A. Botnet B. Keylogger C. Trojan D. Worm
27. Which of the following does not self-replicate?
A. Virus B. Worm C. Trojan D. Bot
28. Cloud-based antivirus mainly helps in:
A. Disabling apps B. Remote scanning C. Reducing logs D. Boosting boot time
29. What technique is commonly used by ransomware?
A. Spying B. Keylogging C. Encryption D. Port scanning
30. Which attack uses multiple bots to flood systems?
A. Ping flood B. DDoS C. Phishing D. Keylogging
31. A Trojan pretends to be:
A. A firewall B. Useful software C. BIOS update D. Malware scanner
32. Which of these is best at secretly collecting data without consent?
A. Adware B. Spyware C. Worm D. Virus
33. The main method to remove rootkits is:
A. Task Manager B. Anti-rootkit tools C. Disk Defrag D. System log
34. What do you call the device infected and controlled by a bot?
A. Client B. Zombie C. Node D. Host
35. A keylogger records:
A. Mouse clicks B. Keystrokes C. Screen brightness D. Network usage
36. A virus needs what to replicate?
A. Firewall B. Host file C. BIOS D. Router
37. What protects against unwanted cloud logins?
A. CAPTCHAs B. Backups C. Reboots D. Cookies
38. What’s one way to stop bots?
A. Disconnect power B. Update firewalls C. Delete temp files D. Rename folders
39. Malware that controls cameras and microphones is likely:
A. Ransomware B. Spyware C. Adware D. Rootkit
40. What malware is usually part of illegal software downloads?
A. Trojan B. Firewall C. Antivirus D. Cookie
41. Which of the following is often bundled with free software to collect user data?
A. Trojan B. Adware C. Botnet D. Ransomware
42. What tool helps track unusual activity in the network?
A. IDS B. USB C. Router D. Monitor
43. What is a sign of spyware on your system?
A. Bright screen B. Unusual data use C. Fast performance D. Blue background
44. An updated antivirus helps prevent:
A. Document printing B. Malware infection C. Overcharging D. System updates
45. What makes a botnet attack harder to detect?
A. Single origin B. Distributed nature C. Bright UI D. Server logs
ITSP3C DATA PRIVACY AND SECURITY SET B Page 2 of 4
46. The ILOVEYOU virus mainly spread through:
A. USB B. Wi-Fi C. Email D. Social media
47. What was the purpose of the Creeper virus?
A. Delete data B. Display a message C. Demand money D. Encrypt files
48. Keyloggers may be used by:
A. Photographers B. Hackers C. Musicians D. Designers
49. What is a worm's main strength compared to viruses?
A. Email ability B. File deletion C. Independent replication D. Animation
50. Which of the following is a social engineering technique?
A. Trojan virus B. DDoS C. Phishing D. Rootkit
Prepared by:
MR. WENDYLL P. OJASTRO
Instructor
Checked and Validated by: Noted by:
MR. ALEJANDRO B. ADOVAS Dr. ROMMEL J. CONSTANTINO, DIT
Prof. Ed Coordinator Program Head
ITSP3C DATA PRIVACY AND SECURITY SET B Page 3 of 4
1. C
2. C
3. B
4. C
5. B
6. C
7. B
8. B
9. C
10. C
11. D
12. B
13. B
14. C
15. C
16. C
17. B
18. B
19. B
20. A
21. C
22. B
23. B
24. A
25. B
26. B
27. C
28. B
29. C
30. B
31. B
32. B
33. B
34. B
35. B
36. B
37. A
38. B
39. B
40. A
41. B
42. A
43. B
44. B
45. B
46. C
47. B
48. B
49. C
50. C
ITSP3C DATA PRIVACY AND SECURITY SET B Page 4 of 4