A) Encrypting sensitive customer data B) Creating a privacy policy for a company C) Archiving old company records securely D) Sharing personal information of clients without consent
A) Updating software regularly B) Using secure passwords for accounts C) Sending spam emails with malicious links D) Installing anti-virus software
A) RA 9003 – Solid Waste Management Act B) RA 8749 – Clean Air Act C) RA 9147 – Wildlife Act D) RA 9275 – Philippine Clean Water Act
A) RA 10175 B) RA 8749 C) RA 9147 D) RA 9003
A) Using dynamite for fishing B) Observing closed fishing season C) Practicing sustainable aquaculture D) Releasing fingerlings into a river
A) RA 8749 B) RA 9275 C) RA 10173 D) RA 9003
A) RA 8749 B) RA 9275 C) .RA 9003 D) RA 9147
A) RA 10173 B) RA 10175 C) RA 9003 D) RA 9275
A) RA 9275 B) RA 9003 C) Philippine Fisheries Code of 1998 D) RA 9147
A) RA 8749 B) RA 9275 C) RA 9003 D) RA 9147
A) RA 9275 B) RA 9003 C) RA 10173 D) RA 8749
A) RA 10175 B) RA 9003 C) RA 9147 D) RA 10173
A) RA 9147 B) RA 9275 C) RA 9003 D) RA 8749
A) RA 8749 B) RA 9003 C) RA 9275 D) RA 9147
A) Philippine Fisheries Code of 1998 B) RA 8749 C) RA 9147 D) RA 9003
A) RA 9275 B) RA 10173 C) RA 8749 D) RA 9003
A) RA 10175 B) RA 9275 C) RA 8749 D) RA 10173
A) RA 9003 B) RA 9147 C) RA 9275 D) RA 8749
A) RA 9147 B) RA 9275 C) RA 9003 D) RA 8749
A) RA 10173 B) RA 8749 C) RA 10175 D) RA 9003
A) RA 9147 B) Philippine Fisheries Code of 1998 C) RA 9003 D) RA 9275
A) RA 9275 B) RA 8749 C) RA 10173 D) RA 9003
A) RA 9147 B) RA 8749 C) RA 9275 D) RA 9003
A) RA 8749 B) RA 9003 C) RA 10175 D) RA 10173
A) RA 9003 B) RA 9275 C) RA 8749 D) RA 9147
A) RA 9147 B) RA 9003 C) RA 8749 D) RA 9275
A) RA 9003 B) RA 10175 C) RA 10173 D) RA 8749
A) RA 9275 B) RA 8749 C) RA 9003 D) RA 9147
A) RA 9275 B) RA 9147 C) RA 9003 D) RA 8749
A) RA 8749 B) RA 9275 C) RA 9003 D) RA 10173
A) RA 9003 B) Philippine Fisheries Code of 1998 C) RA 9147 D) RA 8749
A) To publicly announce the investigation B) To allow law enforcement to monitor email accounts indefinitely C) To punish suspects before trial D) To authorize the seizure or inspection of digital devices and data
A) Any government agency head B) A judge of competent jurisdiction C) Barangay Captain D) Any law enforcement officer
A) Blood sample B) Fingerprints C) CCTV footage stored on a cloud server D) Written confession
A) Disconnect the device from all networks B) Immediately open files for inspection C) Post about it on social media D) Make a copy for personal use
A) Habeas corpus B) Miranda rights C) Chain of custody D) Procedural fairness
A) To create reports for training purposes only B) To maintain accurate records for admissibility in court C) To intimidate suspects D) To justify the investigator’s presence
A) Using write-blockers to copy data B) Recording serial numbers of devices C) Photographing hardware before seizure D) Altering file timestamps without documentation
A) Evidence must be obtained legally and integrity preserved B) Evidence must be from a government server C) Evidence must be analyzed within 24 hours D) Evidence must be published online
A) Containment B) Identification C) Recovery D) Erasure of all logs
A) To speed up the investigation B) To install new software C) To delete malicious files permanently D) To allow analysis without altering the original device
A) Obtain legal authorization to access the data B) Share credentials with third parties C) Access the data through personal accounts D) Ignore jurisdictional issues
A) Identify and contain the threat B) Disconnect all company systems permanently C) Arrest the suspect immediately D) Notify media outlets
A) To permanently delete files B) To encrypt the hard drive C) To accelerate data transmission D) To prevent modification of original evidence
A) To impose fines on suspected hackers B) To search and seize evidence of cybercrime C) To monitor all internet activity without probable cause D) To perform routine maintenance on someone’s computer
A) To reduce paperwork B) To sell items later C) To make the process faster D) To maintain chain of custody and evidence integrity
A) Details of the alleged offense and description of the device or data to be seized B) Market value of the seized devices C) Names of witnesses only D) Investigator’s personal opinion
A) Printed documents B) RAM (Random Access Memory) contents C) Hard drive files D) Archived emails
A) Incident report B) Chain of custody C) Police blotter D) Affidavit of complaint
A) To ensure suspect cooperation B) To prevent unauthorized access or physical damage C) To display in court as visual proof D) To make shipping cheaper
A) Share credentials with third parties B) Publicize the attack online C) Erase old logs D) Establish roles and responsibilities
A) Using force to access encrypted data B) Confiscating all digital devices in a location C) Minimizing disruption to non-involved systems during seizure D) Arresting as many suspects as possible
A) Investigator’s personal judgment B) Internet publication of the evidence C) Chain of custody and proper collection procedures D) Suspect’s admission only
A) Shutting down unrelated computers randomly B) Ignoring minor system alerts C) Disconnecting affected systems from the network D) Deleting suspicious files immediately
A) Let it remain on and connected to Wi-Fi B) Access messages immediately C) Return the phone to the owner after copying files casually D) Power it off and remove the SIM and memory card if possible
A) Using personal USB drives B) Deleting irrelevant files before analysis C) Encryption, documentation, and controlled access D) Public sharing of all files
A) Wiretap/interception order B) Search and seizure warrant C) Arrest warrant D) Summons
A) Restore systems to normal operation securely B) Disconnect from all communication permanently C) Share confidential data externally D) Delete logs to hide evidence
A) To reduce storage costs B) To allow unrestricted access C) To prevent tampering and environmental damage D) To impress court officials
A) Sharing passwords among staff B) Ensuring all files are deleted automatically C) Avoiding logging all activities D) Preparing systems to enable rapid and effective investigation when incidents occur
A) Altering timestamps for clarity B) Using personal analysis tools without documentation C) Presenting files in any order D) Demonstrating that collection followed legal procedures and integrity was preserved
A) Filing a complaint with the Philippine National Police or BFAR B) Imposing fines directly C) Arresting the suspect immediately D) Conducting a public hearing
A) Bureau of Fisheries and Aquatic Resources (BFAR) B) Civil Society Organizations C) Arresting the suspect immediately D) Department of Environment and Natural Resources (DENR) only
A) Physical evidence, witness statements, and official inspection reports B) Witness testimony only C) Suspect’s verbal admission only D) News reports of the incident
A) Warrant of Arrest B) Complaint-Affidavit C) Certification of Fisheries Permit D) Barangay Resolution
A) Barangay Council B) Municipal Trial Court C) Regional Trial Court D) Department of Justice
A) Capture the suspected poacher first B) Wait for media coverage C) Notify the local police only D) Submit a complaint to the DENR Wildlife Management Bureau
A) Personal assumptions B) Anonymous letters C) Newspaper clippings D) Animal carcass, photographs, or seizure receipts
A) Only Barangay Captains B) Only government officers C) Only non-government organizations D) Any person with personal knowledge of the violation
A) Public demonstration B) Filing of a verified complaint with supporting evidence C) Issuance of a cease and desist order D) Mediation between parties
A) RA 9147 B) RA 9003 C) RA 8749 D) RA 9275
A) Filing a written complaint with the LGU’s Environmental Office B) Issuing a summons directly C) Conducting a clean-up drive D) Posting a notice on social media
A) Verbal complaints only B) Photos of improper dumping, witness affidavits, inspection reports C) Social media posts without verification D) Personal opinion
A) Court of Appeals B) Barangay Environmental Officer C) Department of Health D) Bureau of Fire Protection
A) Environmental Impact Statement B) Community approval C) Mayor’s verbal order D) Sworn complaint specifying violation
A) Local Government Unit (LGU) or municipal/city courts B) Supreme Court C) Department of Interior and Local Government (DILG) D) National Bureau of Investigation (NBI)
A) Issuing a cease and desist order B) Conducting an ambient air quality test C) Informing the media D) Filing a complaint with the DENR or LGU
A) Local Barangay Council B) Bureau of Fire Protection C) Department of Environment and Natural Resources (DENR) D) Philippine Coast Guard
A) Public notice B) Written and verified complaint with evidence C) News article D) Police blotter
A) Only the mayor B) Any person with knowledge of the violation C) Only environmental NGOs D) Only DENR officers
A) Personal opinion B) Social media posts C) Emission monitoring results, photos, official inspection reports D) Hearsay statements only
A) Written complaint to DENR or LGU detailing the violation B) Letter to the President C) Posting flyers in the affected area D) Direct action against polluters
A) Civil Society Organizations B) Department of Agriculture C) Department of Environment and Natural Resources D) Bureau of Fisheries
A) Community rumor B) Personal opinion C) Newspaper articles D) Water sampling results, photos, witness affidavits
A) Identify the violator and the act committed B) Include only verbal statements C) Wait for media coverage D) Describe the color of the water only
A) Local Police only B) DENR or LGU offices with jurisdiction C) Barangay Tanod D) Philippine Navy
A) Publicize the violation B) Initiate investigation and legal proceedings C) Collect donations for the case D) Evict the violator immediately
A) Written complaint with supporting evidence B) Direct execution of fines by complainant C) Public protest D) Media announcement
A) Only the mayor can authorize filing B) Filing is optional if evidence exists C) Any person with knowledge of violation may file D) Only government officers can file complaints
A) Impose fines without trial B) Publish on social media C) Immediately arrest the violator D) Conduct inspection or gather evidence
A) Media personnel B) Only the complainant personally C) Random citizens D) Private counsel or government prosecutor
A) Blotter is filed only by NGOs B) Blotter is evidence in court; complaint is optional C) Blotter is filed after verdict; complaint is filed after media report D) Blotter records the incident; complaint initiates prosecution
A) Sworn statement under oath B) Verbal notice to neighbor C) Petition signed by friends D) Social media post
A) Impose life imprisonment B) Publish complaints nationwide C) Receive complaints and conduct preliminary investigation D) Issue fishing licenses only
A) Only verbal testimony B) None of the above C) Evidence showing violation D) Social media posts
A) Only public notice B) Only media coverage C) Only witness statements D) Verified complaint and supporting evidence
A) Conduct media campaigns B) Arrest violators personally C) Provide firsthand accounts supporting the complaint D) Announce violations on social media
A) Automatically impose fines B) Be dismissed by the court C) Lead to immediate conviction D) Require public hearing
A) RA 9275 B) RA 9003 C) RA 9147 D) RA 8749
A) Media sensationalism B) Publicizing the complainant C) Evicting residents forcibly D) Preventing environmental degradation and promoting compliance |