A) Archiving old company records securely B) Creating a privacy policy for a company C) Encrypting sensitive customer data D) Sharing personal information of clients without consent
A) Updating software regularly B) Installing anti-virus software C) Using secure passwords for accounts D) Sending spam emails with malicious links
A) RA 9147 – Wildlife Act B) RA 9275 – Philippine Clean Water Act C) RA 8749 – Clean Air Act D) RA 9003 – Solid Waste Management Act
A) RA 9003 B) RA 10175 C) RA 9147 D) RA 8749
A) Releasing fingerlings into a river B) Using dynamite for fishing C) Observing closed fishing season D) Practicing sustainable aquaculture
A) RA 10173 B) RA 9003 C) RA 8749 D) RA 9275
A) .RA 9003 B) RA 8749 C) RA 9275 D) RA 9147
A) RA 9275 B) RA 10175 C) RA 10173 D) RA 9003
A) RA 9003 B) RA 9275 C) RA 9147 D) Philippine Fisheries Code of 1998
A) RA 9147 B) RA 8749 C) RA 9003 D) RA 9275
A) RA 8749 B) RA 9003 C) RA 10173 D) RA 9275
A) RA 9147 B) RA 9003 C) RA 10175 D) RA 10173
A) RA 9275 B) RA 9147 C) RA 9003 D) RA 8749
A) RA 9275 B) RA 9003 C) RA 9147 D) RA 8749
A) RA 8749 B) RA 9147 C) RA 9003 D) Philippine Fisheries Code of 1998
A) RA 10173 B) RA 9275 C) RA 9003 D) RA 8749
A) RA 10175 B) RA 8749 C) RA 9275 D) RA 10173
A) RA 9275 B) RA 8749 C) RA 9003 D) RA 9147
A) RA 9003 B) RA 8749 C) RA 9147 D) RA 9275
A) RA 9003 B) RA 10173 C) RA 10175 D) RA 8749
A) RA 9003 B) RA 9147 C) Philippine Fisheries Code of 1998 D) RA 9275
A) RA 9275 B) RA 8749 C) RA 10173 D) RA 9003
A) RA 9003 B) RA 8749 C) RA 9275 D) RA 9147
A) RA 10173 B) RA 10175 C) RA 8749 D) RA 9003
A) RA 8749 B) RA 9147 C) RA 9003 D) RA 9275
A) RA 9275 B) RA 8749 C) RA 9003 D) RA 9147
A) RA 10173 B) RA 10175 C) RA 8749 D) RA 9003
A) RA 9003 B) RA 9275 C) RA 8749 D) RA 9147
A) RA 9275 B) RA 9147 C) RA 8749 D) RA 9003
A) RA 10173 B) RA 8749 C) RA 9003 D) RA 9275
A) RA 9003 B) RA 8749 C) Philippine Fisheries Code of 1998 D) RA 9147
A) To allow law enforcement to monitor email accounts indefinitely B) To publicly announce the investigation C) To punish suspects before trial D) To authorize the seizure or inspection of digital devices and data
A) A judge of competent jurisdiction B) Any government agency head C) Any law enforcement officer D) Barangay Captain
A) CCTV footage stored on a cloud server B) Fingerprints C) Written confession D) Blood sample
A) Post about it on social media B) Immediately open files for inspection C) Disconnect the device from all networks D) Make a copy for personal use
A) Miranda rights B) Procedural fairness C) Habeas corpus D) Chain of custody
A) To maintain accurate records for admissibility in court B) To justify the investigator’s presence C) To intimidate suspects D) To create reports for training purposes only
A) Using write-blockers to copy data B) Altering file timestamps without documentation C) Photographing hardware before seizure D) Recording serial numbers of devices
A) Evidence must be analyzed within 24 hours B) Evidence must be from a government server C) Evidence must be published online D) Evidence must be obtained legally and integrity preserved
A) Containment B) Identification C) Recovery D) Erasure of all logs
A) To allow analysis without altering the original device B) To delete malicious files permanently C) To speed up the investigation D) To install new software
A) Obtain legal authorization to access the data B) Access the data through personal accounts C) Ignore jurisdictional issues D) Share credentials with third parties
A) Notify media outlets B) Disconnect all company systems permanently C) Arrest the suspect immediately D) Identify and contain the threat
A) To permanently delete files B) To accelerate data transmission C) To encrypt the hard drive D) To prevent modification of original evidence
A) To perform routine maintenance on someone’s computer B) To monitor all internet activity without probable cause C) To impose fines on suspected hackers D) To search and seize evidence of cybercrime
A) To sell items later B) To maintain chain of custody and evidence integrity C) To make the process faster D) To reduce paperwork
A) Market value of the seized devices B) Details of the alleged offense and description of the device or data to be seized C) Names of witnesses only D) Investigator’s personal opinion
A) RAM (Random Access Memory) contents B) Archived emails C) Hard drive files D) Printed documents
A) Affidavit of complaint B) Chain of custody C) Police blotter D) Incident report
A) To display in court as visual proof B) To ensure suspect cooperation C) To make shipping cheaper D) To prevent unauthorized access or physical damage
A) Establish roles and responsibilities B) Publicize the attack online C) Erase old logs D) Share credentials with third parties
A) Minimizing disruption to non-involved systems during seizure B) Confiscating all digital devices in a location C) Arresting as many suspects as possible D) Using force to access encrypted data
A) Internet publication of the evidence B) Suspect’s admission only C) Investigator’s personal judgment D) Chain of custody and proper collection procedures
A) Disconnecting affected systems from the network B) Ignoring minor system alerts C) Shutting down unrelated computers randomly D) Deleting suspicious files immediately
A) Let it remain on and connected to Wi-Fi B) Return the phone to the owner after copying files casually C) Power it off and remove the SIM and memory card if possible D) Access messages immediately
A) Deleting irrelevant files before analysis B) Encryption, documentation, and controlled access C) Using personal USB drives D) Public sharing of all files
A) Summons B) Arrest warrant C) Wiretap/interception order D) Search and seizure warrant
A) Restore systems to normal operation securely B) Share confidential data externally C) Disconnect from all communication permanently D) Delete logs to hide evidence
A) To reduce storage costs B) To prevent tampering and environmental damage C) To allow unrestricted access D) To impress court officials
A) Sharing passwords among staff B) Avoiding logging all activities C) Ensuring all files are deleted automatically D) Preparing systems to enable rapid and effective investigation when incidents occur
A) Presenting files in any order B) Altering timestamps for clarity C) Demonstrating that collection followed legal procedures and integrity was preserved D) Using personal analysis tools without documentation
A) Imposing fines directly B) Conducting a public hearing C) Arresting the suspect immediately D) Filing a complaint with the Philippine National Police or BFAR
A) Arresting the suspect immediately B) Department of Environment and Natural Resources (DENR) only C) Bureau of Fisheries and Aquatic Resources (BFAR) D) Civil Society Organizations
A) Suspect’s verbal admission only B) Physical evidence, witness statements, and official inspection reports C) News reports of the incident D) Witness testimony only
A) Certification of Fisheries Permit B) Warrant of Arrest C) Complaint-Affidavit D) Barangay Resolution
A) Department of Justice B) Municipal Trial Court C) Regional Trial Court D) Barangay Council
A) Wait for media coverage B) Capture the suspected poacher first C) Notify the local police only D) Submit a complaint to the DENR Wildlife Management Bureau
A) Anonymous letters B) Animal carcass, photographs, or seizure receipts C) Personal assumptions D) Newspaper clippings
A) Only Barangay Captains B) Any person with personal knowledge of the violation C) Only non-government organizations D) Only government officers
A) Public demonstration B) Filing of a verified complaint with supporting evidence C) Mediation between parties D) Issuance of a cease and desist order
A) RA 9275 B) RA 9003 C) RA 8749 D) RA 9147
A) Filing a written complaint with the LGU’s Environmental Office B) Conducting a clean-up drive C) Posting a notice on social media D) Issuing a summons directly
A) Social media posts without verification B) Verbal complaints only C) Photos of improper dumping, witness affidavits, inspection reports D) Personal opinion
A) Department of Health B) Court of Appeals C) Bureau of Fire Protection D) Barangay Environmental Officer
A) Community approval B) Sworn complaint specifying violation C) Mayor’s verbal order D) Environmental Impact Statement
A) Local Government Unit (LGU) or municipal/city courts B) National Bureau of Investigation (NBI) C) Department of Interior and Local Government (DILG) D) Supreme Court
A) Issuing a cease and desist order B) Informing the media C) Filing a complaint with the DENR or LGU D) Conducting an ambient air quality test
A) Bureau of Fire Protection B) Local Barangay Council C) Philippine Coast Guard D) Department of Environment and Natural Resources (DENR)
A) Written and verified complaint with evidence B) News article C) Police blotter D) Public notice
A) Any person with knowledge of the violation B) Only the mayor C) Only DENR officers D) Only environmental NGOs
A) Personal opinion B) Emission monitoring results, photos, official inspection reports C) Social media posts D) Hearsay statements only
A) Direct action against polluters B) Written complaint to DENR or LGU detailing the violation C) Posting flyers in the affected area D) Letter to the President
A) Bureau of Fisheries B) Department of Agriculture C) Department of Environment and Natural Resources D) Civil Society Organizations
A) Community rumor B) Water sampling results, photos, witness affidavits C) Newspaper articles D) Personal opinion
A) Describe the color of the water only B) Identify the violator and the act committed C) Wait for media coverage D) Include only verbal statements
A) Philippine Navy B) DENR or LGU offices with jurisdiction C) Local Police only D) Barangay Tanod
A) Collect donations for the case B) Publicize the violation C) Evict the violator immediately D) Initiate investigation and legal proceedings
A) Media announcement B) Written complaint with supporting evidence C) Direct execution of fines by complainant D) Public protest
A) Only government officers can file complaints B) Any person with knowledge of violation may file C) Only the mayor can authorize filing D) Filing is optional if evidence exists
A) Publish on social media B) Conduct inspection or gather evidence C) Impose fines without trial D) Immediately arrest the violator
A) Random citizens B) Private counsel or government prosecutor C) Only the complainant personally D) Media personnel
A) Blotter is evidence in court; complaint is optional B) Blotter is filed only by NGOs C) Blotter is filed after verdict; complaint is filed after media report D) Blotter records the incident; complaint initiates prosecution
A) Social media post B) Verbal notice to neighbor C) Petition signed by friends D) Sworn statement under oath
A) Impose life imprisonment B) Issue fishing licenses only C) Publish complaints nationwide D) Receive complaints and conduct preliminary investigation
A) Social media posts B) Only verbal testimony C) Evidence showing violation D) None of the above
A) Only witness statements B) Verified complaint and supporting evidence C) Only public notice D) Only media coverage
A) Conduct media campaigns B) Provide firsthand accounts supporting the complaint C) Arrest violators personally D) Announce violations on social media
A) Lead to immediate conviction B) Be dismissed by the court C) Automatically impose fines D) Require public hearing
A) RA 9147 B) RA 8749 C) RA 9275 D) RA 9003
A) Evicting residents forcibly B) Publicizing the complainant C) Media sensationalism D) Preventing environmental degradation and promoting compliance |