A) Encrypting sensitive customer data B) Creating a privacy policy for a company C) Archiving old company records securely D) Sharing personal information of clients without consent
A) Sending spam emails with malicious links B) Installing anti-virus software C) Updating software regularly D) Using secure passwords for accounts
A) RA 8749 – Clean Air Act B) RA 9003 – Solid Waste Management Act C) RA 9275 – Philippine Clean Water Act D) RA 9147 – Wildlife Act
A) RA 10175 B) RA 8749 C) RA 9147 D) RA 9003
A) Practicing sustainable aquaculture B) Releasing fingerlings into a river C) Observing closed fishing season D) Using dynamite for fishing
A) RA 9003 B) RA 10173 C) RA 8749 D) RA 9275
A) RA 8749 B) RA 9275 C) RA 9147 D) .RA 9003
A) RA 9275 B) RA 10175 C) RA 10173 D) RA 9003
A) RA 9147 B) Philippine Fisheries Code of 1998 C) RA 9003 D) RA 9275
A) RA 9275 B) RA 9147 C) RA 9003 D) RA 8749
A) RA 8749 B) RA 9275 C) RA 10173 D) RA 9003
A) RA 9003 B) RA 9147 C) RA 10175 D) RA 10173
A) RA 9147 B) RA 8749 C) RA 9275 D) RA 9003
A) RA 9147 B) RA 9003 C) RA 9275 D) RA 8749
A) RA 8749 B) RA 9147 C) Philippine Fisheries Code of 1998 D) RA 9003
A) RA 8749 B) RA 9003 C) RA 10173 D) RA 9275
A) RA 10175 B) RA 10173 C) RA 8749 D) RA 9275
A) RA 9003 B) RA 9275 C) RA 8749 D) RA 9147
A) RA 8749 B) RA 9275 C) RA 9147 D) RA 9003
A) RA 10173 B) RA 10175 C) RA 9003 D) RA 8749
A) Philippine Fisheries Code of 1998 B) RA 9275 C) RA 9147 D) RA 9003
A) RA 9275 B) RA 9003 C) RA 10173 D) RA 8749
A) RA 8749 B) RA 9147 C) RA 9003 D) RA 9275
A) RA 10173 B) RA 10175 C) RA 8749 D) RA 9003
A) RA 9147 B) RA 9275 C) RA 9003 D) RA 8749
A) RA 9275 B) RA 9003 C) RA 9147 D) RA 8749
A) RA 8749 B) RA 10175 C) RA 9003 D) RA 10173
A) RA 9147 B) RA 9003 C) RA 9275 D) RA 8749
A) RA 9275 B) RA 9003 C) RA 8749 D) RA 9147
A) RA 9275 B) RA 10173 C) RA 8749 D) RA 9003
A) Philippine Fisheries Code of 1998 B) RA 9003 C) RA 8749 D) RA 9147
A) To allow law enforcement to monitor email accounts indefinitely B) To punish suspects before trial C) To authorize the seizure or inspection of digital devices and data D) To publicly announce the investigation
A) Any law enforcement officer B) Barangay Captain C) A judge of competent jurisdiction D) Any government agency head
A) Written confession B) CCTV footage stored on a cloud server C) Blood sample D) Fingerprints
A) Make a copy for personal use B) Immediately open files for inspection C) Disconnect the device from all networks D) Post about it on social media
A) Procedural fairness B) Habeas corpus C) Miranda rights D) Chain of custody
A) To maintain accurate records for admissibility in court B) To justify the investigator’s presence C) To create reports for training purposes only D) To intimidate suspects
A) Altering file timestamps without documentation B) Photographing hardware before seizure C) Using write-blockers to copy data D) Recording serial numbers of devices
A) Evidence must be analyzed within 24 hours B) Evidence must be obtained legally and integrity preserved C) Evidence must be published online D) Evidence must be from a government server
A) Erasure of all logs B) Containment C) Identification D) Recovery
A) To delete malicious files permanently B) To speed up the investigation C) To allow analysis without altering the original device D) To install new software
A) Obtain legal authorization to access the data B) Share credentials with third parties C) Ignore jurisdictional issues D) Access the data through personal accounts
A) Disconnect all company systems permanently B) Arrest the suspect immediately C) Notify media outlets D) Identify and contain the threat
A) To accelerate data transmission B) To encrypt the hard drive C) To prevent modification of original evidence D) To permanently delete files
A) To impose fines on suspected hackers B) To search and seize evidence of cybercrime C) To perform routine maintenance on someone’s computer D) To monitor all internet activity without probable cause
A) To make the process faster B) To sell items later C) To maintain chain of custody and evidence integrity D) To reduce paperwork
A) Details of the alleged offense and description of the device or data to be seized B) Market value of the seized devices C) Names of witnesses only D) Investigator’s personal opinion
A) RAM (Random Access Memory) contents B) Hard drive files C) Printed documents D) Archived emails
A) Affidavit of complaint B) Police blotter C) Incident report D) Chain of custody
A) To make shipping cheaper B) To ensure suspect cooperation C) To display in court as visual proof D) To prevent unauthorized access or physical damage
A) Publicize the attack online B) Establish roles and responsibilities C) Erase old logs D) Share credentials with third parties
A) Confiscating all digital devices in a location B) Using force to access encrypted data C) Arresting as many suspects as possible D) Minimizing disruption to non-involved systems during seizure
A) Investigator’s personal judgment B) Chain of custody and proper collection procedures C) Suspect’s admission only D) Internet publication of the evidence
A) Shutting down unrelated computers randomly B) Deleting suspicious files immediately C) Ignoring minor system alerts D) Disconnecting affected systems from the network
A) Power it off and remove the SIM and memory card if possible B) Return the phone to the owner after copying files casually C) Let it remain on and connected to Wi-Fi D) Access messages immediately
A) Encryption, documentation, and controlled access B) Public sharing of all files C) Using personal USB drives D) Deleting irrelevant files before analysis
A) Search and seizure warrant B) Arrest warrant C) Wiretap/interception order D) Summons
A) Restore systems to normal operation securely B) Delete logs to hide evidence C) Share confidential data externally D) Disconnect from all communication permanently
A) To reduce storage costs B) To allow unrestricted access C) To prevent tampering and environmental damage D) To impress court officials
A) Avoiding logging all activities B) Ensuring all files are deleted automatically C) Preparing systems to enable rapid and effective investigation when incidents occur D) Sharing passwords among staff
A) Using personal analysis tools without documentation B) Presenting files in any order C) Altering timestamps for clarity D) Demonstrating that collection followed legal procedures and integrity was preserved
A) Imposing fines directly B) Arresting the suspect immediately C) Conducting a public hearing D) Filing a complaint with the Philippine National Police or BFAR
A) Arresting the suspect immediately B) Civil Society Organizations C) Department of Environment and Natural Resources (DENR) only D) Bureau of Fisheries and Aquatic Resources (BFAR)
A) News reports of the incident B) Suspect’s verbal admission only C) Witness testimony only D) Physical evidence, witness statements, and official inspection reports
A) Warrant of Arrest B) Certification of Fisheries Permit C) Barangay Resolution D) Complaint-Affidavit
A) Municipal Trial Court B) Regional Trial Court C) Department of Justice D) Barangay Council
A) Submit a complaint to the DENR Wildlife Management Bureau B) Capture the suspected poacher first C) Notify the local police only D) Wait for media coverage
A) Anonymous letters B) Animal carcass, photographs, or seizure receipts C) Newspaper clippings D) Personal assumptions
A) Only non-government organizations B) Any person with personal knowledge of the violation C) Only government officers D) Only Barangay Captains
A) Mediation between parties B) Issuance of a cease and desist order C) Filing of a verified complaint with supporting evidence D) Public demonstration
A) RA 8749 B) RA 9003 C) RA 9275 D) RA 9147
A) Filing a written complaint with the LGU’s Environmental Office B) Posting a notice on social media C) Conducting a clean-up drive D) Issuing a summons directly
A) Photos of improper dumping, witness affidavits, inspection reports B) Personal opinion C) Social media posts without verification D) Verbal complaints only
A) Barangay Environmental Officer B) Bureau of Fire Protection C) Court of Appeals D) Department of Health
A) Mayor’s verbal order B) Community approval C) Environmental Impact Statement D) Sworn complaint specifying violation
A) Department of Interior and Local Government (DILG) B) Local Government Unit (LGU) or municipal/city courts C) Supreme Court D) National Bureau of Investigation (NBI)
A) Filing a complaint with the DENR or LGU B) Conducting an ambient air quality test C) Informing the media D) Issuing a cease and desist order
A) Bureau of Fire Protection B) Philippine Coast Guard C) Local Barangay Council D) Department of Environment and Natural Resources (DENR)
A) Police blotter B) Public notice C) Written and verified complaint with evidence D) News article
A) Only the mayor B) Only environmental NGOs C) Any person with knowledge of the violation D) Only DENR officers
A) Emission monitoring results, photos, official inspection reports B) Personal opinion C) Hearsay statements only D) Social media posts
A) Letter to the President B) Written complaint to DENR or LGU detailing the violation C) Posting flyers in the affected area D) Direct action against polluters
A) Department of Agriculture B) Bureau of Fisheries C) Civil Society Organizations D) Department of Environment and Natural Resources
A) Personal opinion B) Community rumor C) Newspaper articles D) Water sampling results, photos, witness affidavits
A) Wait for media coverage B) Identify the violator and the act committed C) Include only verbal statements D) Describe the color of the water only
A) Local Police only B) Philippine Navy C) Barangay Tanod D) DENR or LGU offices with jurisdiction
A) Evict the violator immediately B) Collect donations for the case C) Publicize the violation D) Initiate investigation and legal proceedings
A) Public protest B) Written complaint with supporting evidence C) Direct execution of fines by complainant D) Media announcement
A) Filing is optional if evidence exists B) Only government officers can file complaints C) Any person with knowledge of violation may file D) Only the mayor can authorize filing
A) Impose fines without trial B) Conduct inspection or gather evidence C) Immediately arrest the violator D) Publish on social media
A) Only the complainant personally B) Media personnel C) Random citizens D) Private counsel or government prosecutor
A) Blotter is evidence in court; complaint is optional B) Blotter records the incident; complaint initiates prosecution C) Blotter is filed only by NGOs D) Blotter is filed after verdict; complaint is filed after media report
A) Verbal notice to neighbor B) Sworn statement under oath C) Petition signed by friends D) Social media post
A) Publish complaints nationwide B) Impose life imprisonment C) Receive complaints and conduct preliminary investigation D) Issue fishing licenses only
A) None of the above B) Social media posts C) Evidence showing violation D) Only verbal testimony
A) Only media coverage B) Only public notice C) Only witness statements D) Verified complaint and supporting evidence
A) Arrest violators personally B) Announce violations on social media C) Provide firsthand accounts supporting the complaint D) Conduct media campaigns
A) Automatically impose fines B) Require public hearing C) Lead to immediate conviction D) Be dismissed by the court
A) RA 9275 B) RA 8749 C) RA 9003 D) RA 9147
A) Media sensationalism B) Publicizing the complainant C) Preventing environmental degradation and promoting compliance D) Evicting residents forcibly |