A) Encrypting sensitive customer data B) Creating a privacy policy for a company C) Sharing personal information of clients without consent D) Archiving old company records securely
A) Updating software regularly B) Using secure passwords for accounts C) Installing anti-virus software D) Sending spam emails with malicious links
A) RA 9275 – Philippine Clean Water Act B) RA 9003 – Solid Waste Management Act C) RA 8749 – Clean Air Act D) RA 9147 – Wildlife Act
A) RA 10175 B) RA 9003 C) RA 9147 D) RA 8749
A) Practicing sustainable aquaculture B) Observing closed fishing season C) Releasing fingerlings into a river D) Using dynamite for fishing
A) RA 9275 B) RA 8749 C) RA 10173 D) RA 9003
A) RA 9275 B) .RA 9003 C) RA 8749 D) RA 9147
A) RA 10175 B) RA 10173 C) RA 9003 D) RA 9275
A) RA 9147 B) RA 9003 C) RA 9275 D) Philippine Fisheries Code of 1998
A) RA 9147 B) RA 9275 C) RA 8749 D) RA 9003
A) RA 9275 B) RA 10173 C) RA 8749 D) RA 9003
A) RA 10173 B) RA 9147 C) RA 9003 D) RA 10175
A) RA 9147 B) RA 9275 C) RA 9003 D) RA 8749
A) RA 9147 B) RA 8749 C) RA 9003 D) RA 9275
A) RA 9003 B) RA 8749 C) Philippine Fisheries Code of 1998 D) RA 9147
A) RA 8749 B) RA 10173 C) RA 9275 D) RA 9003
A) RA 8749 B) RA 10175 C) RA 9275 D) RA 10173
A) RA 8749 B) RA 9003 C) RA 9275 D) RA 9147
A) RA 8749 B) RA 9147 C) RA 9003 D) RA 9275
A) RA 9003 B) RA 8749 C) RA 10173 D) RA 10175
A) RA 9275 B) RA 9003 C) Philippine Fisheries Code of 1998 D) RA 9147
A) RA 8749 B) RA 10173 C) RA 9003 D) RA 9275
A) RA 8749 B) RA 9003 C) RA 9275 D) RA 9147
A) RA 9003 B) RA 10175 C) RA 10173 D) RA 8749
A) RA 9147 B) RA 8749 C) RA 9003 D) RA 9275
A) RA 9275 B) RA 8749 C) RA 9147 D) RA 9003
A) RA 8749 B) RA 10173 C) RA 10175 D) RA 9003
A) RA 9147 B) RA 9275 C) RA 8749 D) RA 9003
A) RA 9147 B) RA 8749 C) RA 9275 D) RA 9003
A) RA 10173 B) RA 9003 C) RA 8749 D) RA 9275
A) RA 9147 B) RA 9003 C) Philippine Fisheries Code of 1998 D) RA 8749
A) To punish suspects before trial B) To authorize the seizure or inspection of digital devices and data C) To publicly announce the investigation D) To allow law enforcement to monitor email accounts indefinitely
A) A judge of competent jurisdiction B) Any law enforcement officer C) Any government agency head D) Barangay Captain
A) Written confession B) Fingerprints C) Blood sample D) CCTV footage stored on a cloud server
A) Post about it on social media B) Immediately open files for inspection C) Disconnect the device from all networks D) Make a copy for personal use
A) Chain of custody B) Miranda rights C) Procedural fairness D) Habeas corpus
A) To create reports for training purposes only B) To intimidate suspects C) To maintain accurate records for admissibility in court D) To justify the investigator’s presence
A) Recording serial numbers of devices B) Altering file timestamps without documentation C) Photographing hardware before seizure D) Using write-blockers to copy data
A) Evidence must be obtained legally and integrity preserved B) Evidence must be published online C) Evidence must be from a government server D) Evidence must be analyzed within 24 hours
A) Erasure of all logs B) Containment C) Identification D) Recovery
A) To delete malicious files permanently B) To allow analysis without altering the original device C) To speed up the investigation D) To install new software
A) Obtain legal authorization to access the data B) Access the data through personal accounts C) Ignore jurisdictional issues D) Share credentials with third parties
A) Identify and contain the threat B) Disconnect all company systems permanently C) Arrest the suspect immediately D) Notify media outlets
A) To accelerate data transmission B) To permanently delete files C) To encrypt the hard drive D) To prevent modification of original evidence
A) To monitor all internet activity without probable cause B) To impose fines on suspected hackers C) To perform routine maintenance on someone’s computer D) To search and seize evidence of cybercrime
A) To maintain chain of custody and evidence integrity B) To sell items later C) To reduce paperwork D) To make the process faster
A) Names of witnesses only B) Investigator’s personal opinion C) Details of the alleged offense and description of the device or data to be seized D) Market value of the seized devices
A) Archived emails B) Hard drive files C) Printed documents D) RAM (Random Access Memory) contents
A) Chain of custody B) Police blotter C) Incident report D) Affidavit of complaint
A) To display in court as visual proof B) To ensure suspect cooperation C) To make shipping cheaper D) To prevent unauthorized access or physical damage
A) Publicize the attack online B) Establish roles and responsibilities C) Erase old logs D) Share credentials with third parties
A) Confiscating all digital devices in a location B) Using force to access encrypted data C) Arresting as many suspects as possible D) Minimizing disruption to non-involved systems during seizure
A) Chain of custody and proper collection procedures B) Suspect’s admission only C) Investigator’s personal judgment D) Internet publication of the evidence
A) Shutting down unrelated computers randomly B) Deleting suspicious files immediately C) Ignoring minor system alerts D) Disconnecting affected systems from the network
A) Power it off and remove the SIM and memory card if possible B) Let it remain on and connected to Wi-Fi C) Access messages immediately D) Return the phone to the owner after copying files casually
A) Public sharing of all files B) Deleting irrelevant files before analysis C) Encryption, documentation, and controlled access D) Using personal USB drives
A) Arrest warrant B) Search and seizure warrant C) Wiretap/interception order D) Summons
A) Restore systems to normal operation securely B) Disconnect from all communication permanently C) Delete logs to hide evidence D) Share confidential data externally
A) To reduce storage costs B) To allow unrestricted access C) To prevent tampering and environmental damage D) To impress court officials
A) Ensuring all files are deleted automatically B) Preparing systems to enable rapid and effective investigation when incidents occur C) Avoiding logging all activities D) Sharing passwords among staff
A) Presenting files in any order B) Altering timestamps for clarity C) Using personal analysis tools without documentation D) Demonstrating that collection followed legal procedures and integrity was preserved
A) Filing a complaint with the Philippine National Police or BFAR B) Conducting a public hearing C) Arresting the suspect immediately D) Imposing fines directly
A) Department of Environment and Natural Resources (DENR) only B) Arresting the suspect immediately C) Civil Society Organizations D) Bureau of Fisheries and Aquatic Resources (BFAR)
A) Suspect’s verbal admission only B) Physical evidence, witness statements, and official inspection reports C) News reports of the incident D) Witness testimony only
A) Complaint-Affidavit B) Barangay Resolution C) Warrant of Arrest D) Certification of Fisheries Permit
A) Barangay Council B) Regional Trial Court C) Department of Justice D) Municipal Trial Court
A) Submit a complaint to the DENR Wildlife Management Bureau B) Notify the local police only C) Wait for media coverage D) Capture the suspected poacher first
A) Newspaper clippings B) Anonymous letters C) Animal carcass, photographs, or seizure receipts D) Personal assumptions
A) Any person with personal knowledge of the violation B) Only government officers C) Only non-government organizations D) Only Barangay Captains
A) Filing of a verified complaint with supporting evidence B) Public demonstration C) Mediation between parties D) Issuance of a cease and desist order
A) RA 8749 B) RA 9275 C) RA 9147 D) RA 9003
A) Filing a written complaint with the LGU’s Environmental Office B) Issuing a summons directly C) Posting a notice on social media D) Conducting a clean-up drive
A) Social media posts without verification B) Photos of improper dumping, witness affidavits, inspection reports C) Personal opinion D) Verbal complaints only
A) Bureau of Fire Protection B) Department of Health C) Barangay Environmental Officer D) Court of Appeals
A) Environmental Impact Statement B) Sworn complaint specifying violation C) Community approval D) Mayor’s verbal order
A) National Bureau of Investigation (NBI) B) Department of Interior and Local Government (DILG) C) Local Government Unit (LGU) or municipal/city courts D) Supreme Court
A) Issuing a cease and desist order B) Conducting an ambient air quality test C) Filing a complaint with the DENR or LGU D) Informing the media
A) Department of Environment and Natural Resources (DENR) B) Local Barangay Council C) Bureau of Fire Protection D) Philippine Coast Guard
A) Police blotter B) Written and verified complaint with evidence C) News article D) Public notice
A) Only the mayor B) Any person with knowledge of the violation C) Only DENR officers D) Only environmental NGOs
A) Personal opinion B) Social media posts C) Emission monitoring results, photos, official inspection reports D) Hearsay statements only
A) Direct action against polluters B) Written complaint to DENR or LGU detailing the violation C) Posting flyers in the affected area D) Letter to the President
A) Department of Agriculture B) Department of Environment and Natural Resources C) Civil Society Organizations D) Bureau of Fisheries
A) Personal opinion B) Community rumor C) Water sampling results, photos, witness affidavits D) Newspaper articles
A) Wait for media coverage B) Identify the violator and the act committed C) Include only verbal statements D) Describe the color of the water only
A) DENR or LGU offices with jurisdiction B) Local Police only C) Barangay Tanod D) Philippine Navy
A) Collect donations for the case B) Initiate investigation and legal proceedings C) Publicize the violation D) Evict the violator immediately
A) Direct execution of fines by complainant B) Public protest C) Written complaint with supporting evidence D) Media announcement
A) Filing is optional if evidence exists B) Only the mayor can authorize filing C) Only government officers can file complaints D) Any person with knowledge of violation may file
A) Conduct inspection or gather evidence B) Immediately arrest the violator C) Impose fines without trial D) Publish on social media
A) Private counsel or government prosecutor B) Random citizens C) Only the complainant personally D) Media personnel
A) Blotter is filed after verdict; complaint is filed after media report B) Blotter is filed only by NGOs C) Blotter is evidence in court; complaint is optional D) Blotter records the incident; complaint initiates prosecution
A) Social media post B) Sworn statement under oath C) Verbal notice to neighbor D) Petition signed by friends
A) Receive complaints and conduct preliminary investigation B) Impose life imprisonment C) Issue fishing licenses only D) Publish complaints nationwide
A) Evidence showing violation B) None of the above C) Social media posts D) Only verbal testimony
A) Only public notice B) Only media coverage C) Verified complaint and supporting evidence D) Only witness statements
A) Arrest violators personally B) Conduct media campaigns C) Announce violations on social media D) Provide firsthand accounts supporting the complaint
A) Be dismissed by the court B) Lead to immediate conviction C) Automatically impose fines D) Require public hearing
A) RA 9275 B) RA 9147 C) RA 8749 D) RA 9003
A) Media sensationalism B) Publicizing the complainant C) Preventing environmental degradation and promoting compliance D) Evicting residents forcibly |