A) Requesting consent before data processing B) Informing data subjects of their rights C) Secure data storage practices D) Unauthorized access to personal data
A) Installing antivirus software B) Sending emails to consenting recipients C) Intentional or reckless alteration or damaging of computer data D) Updating operating systems regularly
A) Unauthorized fishing in protected bays B) Registering fishing vessels properly C) Reporting daily catch accurately D) Using eco-friendly fishing gear
A) Reporting wildlife sightings responsibly B) Observing protected species from a distance C) Hunting endangered species without a permit D) Participating in authorized wildlife conservation
A) Open burning of solid waste B) Proper segregation of recyclable materials C) Using eco-friendly trash bins D) Composting biodegradable waste at home
A) Operating emission-intensive business without clearance B) Using approved air pollution control devices C) Conducting regular equipment maintenance D) Reporting air emissions regularly
A) Filing water quality reports on time B) Participating in river clean-up drives C) Discharging untreated wastewater into bodies of water D) Treating wastewater before discharge
A) Conducting data protection impact assessments B) Encrypting personal data C) Using data beyond the scope of consent D) Allowing access to authorized personnel only
A) Selling software designed to commit cybercrimes B) Deploying legitimate software for business operations C) Reporting discovered vulnerabilities D) Regular software updates
A) Complying with catch limits B) Obtaining fishing licenses C) Avoiding endangered species catch D) Fishing during closed seasons
A) Dumping waste in critical habitats B) Monitoring habitats for research C) Protecting breeding sites D) Educating communities about wildlife
A) Providing recycling education B) Segregating waste at source C) Using designated garbage collection days D) Mixing recyclable materials with general waste
A) Installing modern scrubbers B) Emitting controlled levels of pollutant C) Conducting ambient air quality monitoring D) Using outdated or non-compliant pollution control technology
A) Adhering to effluent standards B) Participating in water conservation programs C) Installing treatment facilities D) Failing to submit water quality reports as require
A) Informing data subjects about data use B) Unauthorized disclosure of personal information C) Sharing aggregate, anonymized data D) Using data encryption method
A) Reporting suspected identity theft promptly B) Protecting online accounts with strong passwords C) Using someone’s identity without consent to commit fraud D) Creating personal social media profiles
A) Using fish aggregating devices legally B) Use of illegal fishing nets and explosives C) Inspecting fishing equipment regularly D) Use of registered gear as per regulations
A) Participating in wildlife rescue operations B) Trading products made from protected species without permit C) Licensing of wildlife handlers D) Promoting legal wildlife tourism
A) Reporting landfill operations to authorities B) Using controlled disposal facilities C) Establishing or operating open dumpsites D) Encouraging waste recycling
A) eeking clearance for emission source B) Falsifying emission test results C) Reporting emissions accurately D) Maintaining pollution control devices
A) Refusing to designate pollution control officers when required B) Submitting monitoring data timely C) Training designated pollution control officers D) Performing scheduled water sampling
A) Informing affected individuals B) Reporting breaches to authorities promptly C) Strengthening cybersecurity measures D) Concealing security breaches involving personal data
A) Blocking abusive users B) Posting respectful comments C) Sending threatening or harassing messages online D) Reporting cybercrime cases
A) Protecting breeding grounds B) Reporting breeding activities C) Implementing sustainable fishing practices D) Collecting or harvesting fry or fingerlings without permit
A) Participating in habitat restoration projects B) Dumping waste detrimental to wildlife habitats C) Promoting community clean-up drives D) Reporting illegal dumping sightings
A) Squatting in open dumpsites or landfills B) Segregating waste properly C) Composting biodegradable waste D) Using authorized waste disposal services
A) Emitting concentrations of pollutants above permissible limits B) Maintaining emission-controlling technologies C) Reporting emissions to environmental agencies D) Monitoring air quality regularly
A) Routine water quality testing B) Reporting contamination events C) Tampering with water quality by unauthorized booster pump use D) Regular maintenance of water supply systems
A) Notifying authorities of violations B) Knowingly sharing false or unwarranted personal information C) Securing personal data with encryption D) Reporting truthful data breaches
A) Intentionally causing interruption or damage to computer systems B) Installing security patches C) Performing authorized system maintenance D) Monitoring system performance
A) Employing legal fishing gear B) Using explosives or poison for fishing C) Reporting fish catch data D) Following catch quotas
A) Rescue and protection activities B) Legal scientific research involving wildlife C) Inflicting injury that cripples or impairs reproductive systems D) Rehabilitation of injured wildlife
A) Proper disposal of hazardous waste B) Selling recyclable materials to authorized collectors C) Unauthorized removal of recyclable materials D) Segregation of recyclables at source
A) Operating without required environmental clearance B) Implementing pollution prevention measures C) Using clean technologies D) Submitting air pollution control reports
A) Cooperation with environmental agencies B) Timely submission of monitoring data C) Accurate recordkeeping D) Refusal to submit reports as required
A) Notifying breaches promptly B) Securing data storage facilities C) Informing data subjects about purposes of data processing D) Processing personal data without data subject consent
A) Using domains legally obtained B) Creating original domain name C) Reporting registered domains D) Registering domain names to profit from trademarks
A) Abstaining from fishing in closed seasons B) Fishing without valid licenses C) Reporting vessel positions accurately D) Using approved fishing methods
A) Removing garbage from protected areas B) Controlled landfill operations C) Removing waste responsibly D) Dumping of toxic waste into wildlife habitats
A) Composting organic waste B) Burning solid waste in open areas without control C) Recycling of plastics D) Controlled incineration in compliant facilities
A) To detain suspects without trial B) To prohibit use of technology in investigations C) To authorize law enforcement to search and seize digital devices D) To approve business use of the internet
A) Ignoring the incident if no damage is visible B) Identification and logging of the incident C) Immediately deleting all data on the system D) Shutting down the entire network permanently
A) The device or storage medium without altering data B) Using software to modify evidence before seizing C) Logging out all users immediately D) Simply turning off the device without documentation
A) Allowing unauthorized personnel access B) Powering on the device repeatedly before seizing C) Documenting the chain of custody and using write-blockers D) Downloading data to personal devices without logging
A) Evidence altered for clarity B) Data shared freely on social media C) Evidence collected without warrant D) Proper collection, preservation, and expert testimony on handling
A) Until the search or seizure is completed or as specified in the warrant B) For one year regardless of activity C) For 24 hours only regardless of process D) Indefinitely until the investigation ends
A) Communicating with key stakeholders B) Changing passwords or deleting logs before documentation C) Monitoring ongoing attacks D) Isolating affected systems
A) It deletes unnecessary files B) It encrypts the data automatically C) It speeds up data transfer D) It prevents alteration of the original data
A) Before disconnecting or moving any devices B) At any time during the investigation C) After data is copied to another device D) After logging into the system
A) Law enforcement only after the fact B) External vendors only C) The designated incident response team or officer D) Any available staff member
A) To allow free access to evidence to many personnel B) To prove evidence has not been tampered with or altered C) To speed up the investigation process D) To encrypt evidence
A) Just general suspicion without specifics B) A verbal request without documentation C) Description of the places, persons, or objects to be searched or seized D) Only the name of the suspect
A) Archived email data B) Data that is permanently stored on a hard drive C) Data that can be lost quickly such as RAM contents or running processes D) Backups stored off-site
A) Under general suspicion of a crime B) Whenever requested by a third party C) Only during exigent circumstances with probable cause D) Whenever law enforcement arrives at the scene
A) Network traffic analyzers and forensic software B) Ordinary text editors C) Social media platforms D) Manual paperwork only
A) Copied multiple times without authorization B) Taken by unauthorized personnel for analysis C) Removed safely and stored in anti-static bags with proper labeling D) Left attached to the device without documentation
A) The Philippine Fisheries Code B) Republic Act 10175 C) Philippine Clean Air Act D) Data Privacy Act only
A) If it is published on social media B) Authenticity, relevancy, and proper handling C) If it supports the prosecution only D) Popularity online
A) Sending via regular mail without labeling B) Leaving devices unattended C) Using secure, tamper-evident packaging and documentation D) Deleting non-relevant files
A) To act as legal counsel B) To coordinate evidence collection, incident analysis, and reporting C) To prosecute suspects D) To ignore non-digital evidence
A) Any real party in interest, including citizens and organizations B) Only the Department of Environment and Natural Resources (DENR) C) Only private individuals with affected property D) Only government agencies
A) An informal letter B) A verbal notice only C) No need to notify before filing D) A copy of the complaint
A) Local Barangay Hall B) Environmental NGOs C) Municipal Treasury Office D) Provincial Prosecutor’s Office
A) The accused party immediately surrenders B) The complainant must pay a fine C) The court assigns the case by raffle D) The government automatically dismisses the case
A) An order issued to prevent or stop environmental damage pending case resolution B) A permit for polluters to continue operations C) A permanent ban on all construction activities D) A certification of environmental compliance
A) Thirty (30) days B) No specific time limit C) Five (5) days D) Ten (10) days, non-extendable
A) Local Police Department B) Department of Agriculture only C) Department of Tourism D) Department of Environment and Natural Resources (DENR)
A) Violations related to solid waste management and illegal dumping B) Water pollution complaints C) Illegal wildlife trading D) Air pollution violations
A) Polluting companies themselves B) Only environmental organizations C) Only government personnel D) Any person affected or on behalf of public interest
A) Local government units only B) Department of Environment and Natural Resources (DENR), through the Environmental Management Bureau (EMB) C) Department of Health D) Department of Agriculture
A) Sufficient factual and legal basis in the complaint B) Consent of the accused party C) Verbal complaints without documentation D) Only opinion letters
A) The complaint is returned to the complainant B) The case is dismissed automatically C) A default judgment may be issued D) The case is transferred to a different court
A) Scheduled after one year B) Priority hearing within 60 days C) No hearing required for environmental cases D) Hearing scheduled based on court availability only
A) Ocular inspections and production of documents B) No discovery tools allowed C) Only written interrogatories D) Secret evidence gathering
A) Issue a notice of violation B) File a complaint with the Bureau of Fisheries and Aquatic Resources (BFAR) C) Conduct an investigation D) Arrest the offender
A) Private citizens B) Department of Environment and Natural Resources (DENR) C) Barangay officials D) Philippine National Police only
A) List of hazardous waste B) Proof of payment for fees C) Waste disposal plan only D) Affidavit of complaint detailing the violation
A) Barangay captain B) Environmental Management Bureau (EMB) C) Local police station D) Department of Health
A) Local government units only B) Government agencies only C) Water utility companies only D) Any individual or group
A) No role B) Conduct formal investigations C) Prosecute cases D) Receive complaints initially and forward to proper agencies
A) Names of community members B) Approved fishing seasons C) Description of illegal fishing activity D) List of fishing vessels
A) 1 week B) 1 month C) No specified period but timely action is required D) 6 months
A) Community consultation B) Proof of injury C) Payment of fees D) Prior notice to violator
A) Only DENR B) DENR and PNP C) NGOs only D) Local governments only
A) Report to mayor B) File suit directly C) Do nothing D) Appeal or refile with additional evidence
A) Unauthorized waste dumping into water bodies B) Air pollution C) Illegal logging D) Noise pollution
A) Court hearing and resolution B) Release of violator C) Community campaign D) Public announcement
A) No, agency involvement is mandatory B) Yes, directly in court C) Yes, with NGOs only D) Yes, by filing in barangay
A) Immediate closure without hearing B) Fine only C) Administrative charges and penalties D) Community cleanup
A) 6 months B) 1 year C) 3 months D) No limitation, but prompt filing advised
A) Proof of ownership B) Details of incident and involved persons C) Species list only D) No affidavit required
A) Statements only B) No verification C) Public hearings D) Laboratory tests and field inspections
A) Main enforcement agency B) Awareness only C) None D) Coordination with DENR and EMB
A) Community service B) Warning only C) Imprisonment and fines D) License revocation only
A) Local government only B) DENR with other agencies C) Bureau of Fisheries only D) Private investigators
A) DENR regional office B) Environmental Court or regular courts C) Barangay hall D) Police station
A) Confiscated wildlife or evidence linking accused B) Witnesses only C) Verbal complaint only D) Accusation alone
A) RA 9275 B) RA 9147 C) RA 8749 D) RA 9003
A) Barangay councils B) Bureau of Fisheries C) PNP D) Environmental Management Bureau (EMB)
A) Government clearance B) Community petition C) Certificate of environmental compliance D) Formal complaint or affidavit stating the violation |