0% found this document useful (0 votes)
94 views4 pages

COE70

1. The document discusses key provisions and terms related to electronic signatures and e-commerce under Philippine law. 2. It covers definitions, requirements, and oversight for electronic transactions, digital signatures, cybercrime, and the roles of government agencies in implementing related acts like the E-Commerce Act of 2000. 3. Various terms and concepts are defined, such as electronic signatures, digital signatures, hacking, cyber-squatting, and the duties of agencies like the Cybercrime Investigation and Coordinating Center to enforce cybersecurity laws and recommend new legislation.

Uploaded by

Jeruel Tulfo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
94 views4 pages

COE70

1. The document discusses key provisions and terms related to electronic signatures and e-commerce under Philippine law. 2. It covers definitions, requirements, and oversight for electronic transactions, digital signatures, cybercrime, and the roles of government agencies in implementing related acts like the E-Commerce Act of 2000. 3. Various terms and concepts are defined, such as electronic signatures, digital signatures, hacking, cyber-squatting, and the duties of agencies like the Cybercrime Investigation and Coordinating Center to enforce cybersecurity laws and recommend new legislation.

Uploaded by

Jeruel Tulfo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

1. When an electronic signature is used, it 6.

These 2 sections carries the provisions


is presumed that for E-commerce in the government.
a. There is a method used to identify a. 30 and 31
the signature b. 27 and 28
b. It was affixed by the owner of c. 25 and 26
signature d. 40 and 41
c. the signature belongs to the person 7. Which congressional committee is not
whom it correlates part of the oversight committee?
d. both b and c a. Committee on trade and industry
2. What does the "usual place of b. science and technology
residence" in relation to a body of c. National telecommunications
corporate mean? commission
a. The place of business d. Finance
b. The place where it is legally 8. The E-commerce Act does not cover
constituted a. International transactions
c. Habitual residence b. non-commercial transactions
d. The principal place of business c. private transactions
3. Refers to any access in order to corrupt, d. none of the above transactions
alter, steal, or destroy using a computer 9. Foreigners may enjoy the privileges and
or other similar info and benefits of RA8792 if their country of
communication devices without the origin provides similar privileges and
knowledge and consent of the owner. benefits to the Filipinos
a. Hacking a. Barter
b. Piracy b. Mutuality
c. Cracking c. Equality
d. Stealing d. Reciprocity
4. Electronic transactions in banks are 10. The acquisition of a domain name over
completed when? the internet in bad faith to profit,
a. The electronic data message is sent. mislead, destroy reputation, and
b. The electronic receipt is received. deprive others from registering the
c. cash is dispensed, or account is same.
debited (or credited) a. Illegal access
d. The account holder is duly notified. b. Illegal interception
5. RA8792 was adopted from United c. Cyber-squatting
Nations model law known as d. none of the above
a. UNIECL 11. Which of the following government
b. UNCENTRAL bodies are responsible for making the
c. UNTRIPAL IRR as mandated by RA 10175 Section
d. UNCITRAL 28?
a. ICTO-DOST and PNP
b. CICC and the Office of the President
c. Senate and the Office of the
Representatives
d. ICTO-DOST, DOJ, DILG
12. The following are requirements of the 17. A secret code which secures and
law for the integrity & reliability of defends sensitive information that cross
electronic document, except one: over public channels.
a. Completeness a. Password
b. Held by a party adverse in interest b. Electronic PIN
c. Reliable of its purpose c. Electronic Signature
d. Unaltered d. Electronic Key
13. In any proceedings involving electronic 18. Which of the following is NOT part of
signatures, all of the ff. is presumed, the "Powers and Functions" of CICC as
except for one: stated on Section 26 of RA 10175
a. It was affixed w/ the intention of a. To formulate a national
acknowledging conditions of the cybersecurity plan
electronic document b. To monitor cybercrime cases
b. Integrity of the data signed is c. To recommend the enactment of
shown by evidence appropriate laws
c. The signature originated from the d. To shut down websites caught in
person to whom it correlates the act violating RA10175
d. None of the above. 19. Parties are given the right to choose
14. It is the intentional alteration or ____________ of security methods that
reckless hindering or inherence with the suit their needs.
function of computer or computer a. The safest only
network. b. the cheapest
a. System Interference c. the benefits and kind
b. Data Interference d. the type and level
c. Interception 20. It refers to a computer or a computer
d. Illegal Interception network, the electronic medium in
15. How much fund shall be appropriated which online communication takes
annually for the implementation of R.A. place.
No. 10175? a. Service Provider
a. PhP20,000,000.00 b. Cyber
b. PhP30,000,000.00 c. Computer System
c. PhP50,000,000.00 d. ICT
d. PhP40,000,000.00 21. Any evidence procured without a valid
16. Traffic data or ____ refers to any warrant or beyond the authority of the
computer data other than the content same shall be inadmissible for any
of the communication including, but not proceeding before any court or tribunal.
limited to, the communication's origin, a. Validity Rule
destination, route, time, date, size, b. Admission Rule
duration, or type of underlying service. c. Appeal Rule
a. Non-violent data d. Exclusionary Rule
b. Non-essential data
c. Non-content data
d. Non-volatile data
22. This clause states that if any provision 26. The information or the representation
of the Act is held invalid, the other of information, data, figures, symbols or
provisions not affected shall remain in other modes of written expression,
full force and effect. described or however represented, by
a. Repealing Clause which a right is established, or an
b. Persistence Clause obligation extinguished, or by which a
c. Effectivity Clause fact may be prove and affirmed, which
d. Separability Clause is receive, recorded, transmitted,
23. The person by whom, or on whose stored, processed, retrieved or
behalf, the electronic document produced electronically.
purports to have been created, a. Electronic Data Message
generated and/or separated b. Electronic Signature
a. Addressee c. Electronic Document
b. Intermediary d. Electronic Key
c. Originator 27. The person who in behalf of another
d. Producer person and with respect to a particular
24. Input, alteration, or deletion of any electronic document sends, receives
computer data without right resulting in and on stores or provides other services
inauthentic data with the intent that it in respect of that electronic data
be and intelligible authentic, regardless message or electronic document.
whether or not the data is directly a. Addressee
readable and intelligible. b. Intermediary
a. Computer-related Forgery c. Originator
b. Computer-related Fraud d. Producer
c. Computer-related Identity Theft 28. It mandates the government to install
d. Computer-related Offense an electronic network to known as the
25. This can be appended to electronic RPWeb within two (2) years from the
evidences and is sworn under oath. date on effectivity of the Act.
a. Image a. RA 8792 Section 27
b. Video b. RA 8792 Section 28
c. File attachment c. RA 8792 Section 29
d. Affidavit d. RA 8792 Section 30
29. From Section 13 of the Anti-Camcording
Act of 2010, all laws, decrees,
ordinances or rules inconsistent with or
contrary to the provisions of this Act are
hereby amended.
a. Repealing Clause
b. Separability Clause
c. Enforcement
d. Penalties
30. In the absence of evidence, the integrity
of the electronic data may be
established by showing that
a. The data operates in a manner that
doesn't affect its integrity
b. An appropriate security procedure
was employed in verifying the
originator
c. The signature originated from the
person to whom it correlates.
d. The signature was affixed w/ the
intention of acknowledging
conditions of the electronic
document
31.

You might also like