CDI9-ICYBER
  • 1. Which of the following constitutes a violation of RA 10173 (Data Privacy Act of 2012)?
A) Encrypting sensitive customer data
B) Creating a privacy policy for a company
C) Archiving old company records securely
D) Sharing personal information of clients without consent
  • 2. Under RA 10175 (Cybercrime Prevention Act of 2012), which act is considered illegal?
A) Updating software regularly
B) Using secure passwords for accounts
C) Sending spam emails with malicious links
D) Installing anti-virus software
  • 3. Dumping untreated sewage into rivers violates which law?
A) RA 9003 – Solid Waste Management Act
B) RA 8749 – Clean Air Act
C) RA 9147 – Wildlife Act
D) RA 9275 – Philippine Clean Water Act
  • 4. Hunting of endangered species without permit is a violation of?
A) RA 10175
B) RA 8749
C) RA 9147
D) RA 9003
  • 5. Which of the following actions violates the Philippine Fisheries Code of 1998?
A) Using dynamite for fishing
B) Observing closed fishing season
C) Practicing sustainable aquaculture
D) Releasing fingerlings into a river
  • 6. Improper segregation of biodegradable and non-biodegradable waste violates?
A) RA 8749
B) RA 9275
C) RA 10173
D) RA 9003
  • 7. Releasing factory smoke without air pollution control devices violates?
A) RA 8749
B) RA 9275
C) .RA 9003
D) RA 9147
  • 8. Unauthorized collection of personal data from online users is a violation of?
A) RA 10173
B) RA 10175
C) RA 9003
D) RA 9275
  • 9. Illegal fishing using fine mesh nets is prohibited under?
A) RA 9275
B) RA 9003
C) Philippine Fisheries Code of 1998
D) RA 9147
  • 10. Dumping household garbage into a public river constitutes a violation of?
A) RA 8749
B) RA 9275
C) RA 9003
D) RA 9147
  • 11. Releasing untreated industrial effluent into water bodies violates?
A) RA 9275
B) RA 9003
C) RA 10173
D) RA 8749
  • 12. Posting malicious content online intending to defame a person violates?
A) RA 10175
B) RA 9003
C) RA 9147
D) RA 10173
  • 13. Killing a protected wildlife species without permit is a violation of?
A) RA 9147
B) RA 9275
C) RA 9003
D) RA 8749
  • 14. Using prohibited fishing methods that destroy coral reefs is punishable under?
A) RA 8749
B) RA 9003
C) RA 9275
D) RA 9147
  • 15. Using prohibited fishing methods that destroy coral reefs is punishable under?
A) Philippine Fisheries Code of 1998
B) RA 8749
C) RA 9147
D) RA 9003
  • 16. Industrial plants emitting harmful gases without clearance violate?
A) RA 9275
B) RA 10173
C) RA 8749
D) RA 9003
  • 17. Unauthorized hacking of personal email accounts is a violation of?
A) RA 10175
B) RA 9275
C) RA 8749
D) RA 10173
  • 18. Illegal disposal of plastic wastes in streets is a violation of?
A) RA 9003
B) RA 9147
C) RA 9275
D) RA 8749
  • 19. Releasing untreated sewage into a river is primarily a violation of?
A) RA 9147
B) RA 9275
C) RA 9003
D) RA 8749
  • 20. Sharing personal records of employees without their consent violates?
A) RA 10173
B) RA 8749
C) RA 10175
D) RA 9003
  • 21. Using explosives for fishing, destroying marine habitats, is a violation of?
A) RA 9147
B) Philippine Fisheries Code of 1998
C) RA 9003
D) RA 9275
  • 22. Emitting air pollutants above prescribed standards violates?
A) RA 9275
B) RA 8749
C) RA 10173
D) RA 9003
  • 23. Capturing wildlife for sale without a permit is a violation of?
A) RA 9147
B) RA 8749
C) RA 9275
D) RA 9003
  • 24. Online identity theft is prohibited under?
A) RA 8749
B) RA 9003
C) RA 10175
D) RA 10173
  • 25. Releasing untreated sewage into coastal waters violates?
A) RA 9003
B) RA 9275
C) RA 8749
D) RA 9147
  • 26. Dumping industrial chemical waste into waterways violates?
A) RA 9147
B) RA 9003
C) RA 8749
D) RA 9275
  • 27. Unauthorized access to computer systems to steal information violates?
A) RA 9003
B) RA 10175
C) RA 10173
D) RA 8749
  • 28. Cutting endangered trees in protected forests is a violation of?
A) RA 9275
B) RA 8749
C) RA 9003
D) RA 9147
  • 29. Littering public streets with garbage violates?
A) RA 9275
B) RA 9147
C) RA 9003
D) RA 8749
  • 30. Emitting black smoke from vehicles without proper emission testing violates?
A) RA 8749
B) RA 9275
C) RA 9003
D) RA 10173
  • 31. Unauthorized fishing in municipal waters is a violation of?
A) RA 9003
B) Philippine Fisheries Code of 1998
C) RA 9147
D) RA 8749
  • 32. What is the primary purpose of a cybercrime search warrant?
A) To publicly announce the investigation
B) To allow law enforcement to monitor email accounts indefinitely
C) To punish suspects before trial
D) To authorize the seizure or inspection of digital devices and data
  • 33. According to the Rules on Cybercrime Warrants, who may issue a warrant to search digital devices?
A) Any government agency head
B) A judge of competent jurisdiction
C) Barangay Captain
D) Any law enforcement officer
  • 34. Which of the following is considered a digital evidence?
A) Blood sample
B) Fingerprints
C) CCTV footage stored on a cloud server
D) Written confession
  • 35. When seizing digital evidence, what is the first step an investigator should take?
A) Disconnect the device from all networks
B) Immediately open files for inspection
C) Post about it on social media
D) Make a copy for personal use
  • 36. Which principle ensures that the integrity of digital evidence is maintained?
A) Habeas corpus
B) Miranda rights
C) Chain of custody
D) Procedural fairness
  • 37. What is the purpose of documenting an incident during digital evidence collection?
A) To create reports for training purposes only
B) To maintain accurate records for admissibility in court
C) To intimidate suspects
D) To justify the investigator’s presence
  • 38. Which action violates proper digital evidence handling?
A) Using write-blockers to copy data
B) Recording serial numbers of devices
C) Photographing hardware before seizure
D) Altering file timestamps without documentation
  • 39. What is the minimum requirement for digital evidence to be admissible in court?
A) Evidence must be obtained legally and integrity preserved
B) Evidence must be from a government server
C) Evidence must be analyzed within 24 hours
D) Evidence must be published online
  • 40. Which of the following is NOT part of basic incident response?
A) Containment
B) Identification
C) Recovery
D) Erasure of all logs
  • 41. In digital forensics, what is the purpose of creating a forensic image of a device?
A) To speed up the investigation
B) To install new software
C) To delete malicious files permanently
D) To allow analysis without altering the original device
  • 42. Which rule should be followed when collecting evidence from online cloud storage?
A) Obtain legal authorization to access the data
B) Share credentials with third parties
C) Access the data through personal accounts
D) Ignore jurisdictional issues
  • 43. When responding to a cyber incident, which is the first action to take after detection?
A) Identify and contain the threat
B) Disconnect all company systems permanently
C) Arrest the suspect immediately
D) Notify media outlets
  • 44. What is the role of a write-blocker in digital forensics?
A) To permanently delete files
B) To encrypt the hard drive
C) To accelerate data transmission
D) To prevent modification of original evidence
  • 45. Which is a valid reason for obtaining a cybercrime warrant?
A) To impose fines on suspected hackers
B) To search and seize evidence of cybercrime
C) To monitor all internet activity without probable cause
D) To perform routine maintenance on someone’s computer
  • 46. During seizure, why should investigators label and log every item collected?
A) To reduce paperwork
B) To sell items later
C) To make the process faster
D) To maintain chain of custody and evidence integrity
  • 47. What must be included in a cybercrime warrant application?
A) Details of the alleged offense and description of the device or data to be seized
B) Market value of the seized devices
C) Names of witnesses only
D) Investigator’s personal opinion
  • 48. Which type of data is most volatile and must be collected first?
A) Printed documents
B) RAM (Random Access Memory) contents
C) Hard drive files
D) Archived emails
  • 49. Which document tracks the movement and handling of digital evidence?
A) Incident report
B) Chain of custody
C) Police blotter
D) Affidavit of complaint
  • 50. Why is proper packaging of digital evidence important?
A) To ensure suspect cooperation
B) To prevent unauthorized access or physical damage
C) To display in court as visual proof
D) To make shipping cheaper
  • 51. Which of the following is a basic step in incident response planning?
A) Share credentials with third parties
B) Publicize the attack online
C) Erase old logs
D) Establish roles and responsibilities
  • 52. In cybercrime investigations, the “least intrusive means” principle refers to?
A) Using force to access encrypted data
B) Confiscating all digital devices in a location
C) Minimizing disruption to non-involved systems during seizure
D) Arresting as many suspects as possible
  • 53. What ensures that digital evidence can be relied upon in court?
A) Investigator’s personal judgment
B) Internet publication of the evidence
C) Chain of custody and proper collection procedures
D) Suspect’s admission only
  • 54. Which is an example of proper containment during a cyber incident?
A) Shutting down unrelated computers randomly
B) Ignoring minor system alerts
C) Disconnecting affected systems from the network
D) Deleting suspicious files immediately
  • 55. What is the proper procedure when seizing a mobile phone as evidence?
A) Let it remain on and connected to Wi-Fi
B) Access messages immediately
C) Return the phone to the owner after copying files casually
D) Power it off and remove the SIM and memory card if possible
  • 56. Which of the following is required for digital evidence to maintain authenticity?
A) Using personal USB drives
B) Deleting irrelevant files before analysis
C) Encryption, documentation, and controlled access
D) Public sharing of all files
  • 57. Which type of cybercrime warrant allows law enforcement to intercept data in transit?
A) Wiretap/interception order
B) Search and seizure warrant
C) Arrest warrant
D) Summons
  • 58. What is a key objective of the recovery phase in incident response?
A) Restore systems to normal operation securely
B) Disconnect from all communication permanently
C) Share confidential data externally
D) Delete logs to hide evidence
  • 59. Why must digital evidence be stored in a secure environment?
A) To reduce storage costs
B) To allow unrestricted access
C) To prevent tampering and environmental damage
D) To impress court officials
  • 60. What does “forensic readiness” mean in cybersecurity?
A) Sharing passwords among staff
B) Ensuring all files are deleted automatically
C) Avoiding logging all activities
D) Preparing systems to enable rapid and effective investigation when incidents occur
  • 61. Which of the following is critical when presenting digital evidence in court?
A) Altering timestamps for clarity
B) Using personal analysis tools without documentation
C) Presenting files in any order
D) Demonstrating that collection followed legal procedures and integrity was preserved
  • 62. Which of the following is the first step in filing a case for illegal fishing under the Philippine Fisheries Code?
A) Filing a complaint with the Philippine National Police or BFAR
B) Imposing fines directly
C) Arresting the suspect immediately
D) Conducting a public hearing
  • 63. Who has the authority to investigate violations of the Philippine Fisheries Code?
A) Bureau of Fisheries and Aquatic Resources (BFAR)
B) Civil Society Organizations
C) Arresting the suspect immediately
D) Department of Environment and Natural Resources (DENR) only
  • 64. Which of the following best describes the required evidence in filing a fisheries case?
A) Physical evidence, witness statements, and official inspection reports
B) Witness testimony only
C) Suspect’s verbal admission only
D) News reports of the incident
  • 65. Under the Fisheries Code, what document is needed to officially start a prosecution?
A) Warrant of Arrest
B) Complaint-Affidavit
C) Certification of Fisheries Permit
D) Barangay Resolution
  • 66. When filing a case, which body has jurisdiction over municipal waters violations?
A) Barangay Council
B) Municipal Trial Court
C) Regional Trial Court
D) Department of Justice
  • 67. To file a case under the Wildlife Act, a complainant must?
A) Capture the suspected poacher first
B) Wait for media coverage
C) Notify the local police only
D) Submit a complaint to the DENR Wildlife Management Bureau
  • 68. Which type of evidence is crucial in wildlife violation cases?
A) Personal assumptions
B) Anonymous letters
C) Newspaper clippings
D) Animal carcass, photographs, or seizure receipts
  • 69. Who can initiate a wildlife violation complaint?
A) Only Barangay Captains
B) Only government officers
C) Only non-government organizations
D) Any person with personal knowledge of the violation
  • 70. The Wildlife Act requires which of the following before a court hearing?
A) Public demonstration
B) Filing of a verified complaint with supporting evidence
C) Issuance of a cease and desist order
D) Mediation between parties
  • 71. If someone illegally hunts endangered species, which law applies?
A) RA 9147
B) RA 9003
C) RA 8749
D) RA 9275
  • 72. What is the proper initial step in filing a complaint under RA 9003?
A) Filing a written complaint with the LGU’s Environmental Office
B) Issuing a summons directly
C) Conducting a clean-up drive
D) Posting a notice on social media
  • 73. Which evidence is acceptable for a solid waste case?
A) Verbal complaints only
B) Photos of improper dumping, witness affidavits, inspection reports
C) Social media posts without verification
D) Personal opinion
  • 74. Who enforces compliance with RA 9003 in barangay areas?
A) Court of Appeals
B) Barangay Environmental Officer
C) Department of Health
D) Bureau of Fire Protection
  • 75. Filing of a solid waste case must be accompanied by:
A) Environmental Impact Statement
B) Community approval
C) Mayor’s verbal order
D) Sworn complaint specifying violation
  • 76. Violations of RA 9003 in private property are filed with?
A) Local Government Unit (LGU) or municipal/city courts
B) Supreme Court
C) Department of Interior and Local Government (DILG)
D) National Bureau of Investigation (NBI)
  • 77. The first step in filing a Clean Air Act case is?
A) Issuing a cease and desist order
B) Conducting an ambient air quality test
C) Informing the media
D) Filing a complaint with the DENR or LGU
  • 78. Which agency handles violations from industrial pollution sources?
A) Local Barangay Council
B) Bureau of Fire Protection
C) Department of Environment and Natural Resources (DENR)
D) Philippine Coast Guard
  • 79. What document initiates the legal process under RA 8749?
A) Public notice
B) Written and verified complaint with evidence
C) News article
D) Police blotter
  • 80. Who may file a complaint under the Clean Air Act?
A) Only the mayor
B) Any person with knowledge of the violation
C) Only environmental NGOs
D) Only DENR officers
  • 81. Evidence for air pollution violations may include?
A) Personal opinion
B) Social media posts
C) Emission monitoring results, photos, official inspection reports
D) Hearsay statements only
  • 82. Filing a complaint under the Clean Water Act begins with?
A) Written complaint to DENR or LGU detailing the violation
B) Letter to the President
C) Posting flyers in the affected area
D) Direct action against polluters
  • 83. Who has authority to investigate water pollution complaints?
A) Civil Society Organizations
B) Department of Agriculture
C) Department of Environment and Natural Resources
D) Bureau of Fisheries
  • 84. Essential evidence for water pollution includes?
A) Community rumor
B) Personal opinion
C) Newspaper articles
D) Water sampling results, photos, witness affidavits
  • 85. A verified complaint under RA 9275 must?
A) Identify the violator and the act committed
B) Include only verbal statements
C) Wait for media coverage
D) Describe the color of the water only
  • 86. Complaints involving coastal pollution are filed with?
A) Local Police only
B) DENR or LGU offices with jurisdiction
C) Barangay Tanod
D) Philippine Navy
  • 87. The purpose of filing a verified complaint is to?
A) Publicize the violation
B) Initiate investigation and legal proceedings
C) Collect donations for the case
D) Evict the violator immediately
  • 88. What is common in filing all environmental cases?
A) Written complaint with supporting evidence
B) Direct execution of fines by complainant
C) Public protest
D) Media announcement
  • 89. Which of the following statements is true regarding environmental complaints?
    A. Only government officers can file complaints
A) Only the mayor can authorize filing
B) Filing is optional if evidence exists
C) Any person with knowledge of violation may file
D) Only government officers can file complaints
  • 90. Before a case is filed, authorities usually?
A) Impose fines without trial
B) Publish on social media
C) Immediately arrest the violator
D) Conduct inspection or gather evidence
  • 91. Who may represent a complainant in filing environmental cases?
A) Media personnel
B) Only the complainant personally
C) Random citizens
D) Private counsel or government prosecutor
  • 92. The difference between a police blotter report and a complaint-affidavit is?
A) Blotter is filed only by NGOs
B) Blotter is evidence in court; complaint is optional
C) Blotter is filed after verdict; complaint is filed after media report
D) Blotter records the incident; complaint initiates prosecution
  • 93. What ensures the complaint is “official” and actionable?
A) Sworn statement under oath
B) Verbal notice to neighbor
C) Petition signed by friends
D) Social media post
  • 94. Which of the following is a function of the LGU in environmental cases?
A) Impose life imprisonment
B) Publish complaints nationwide
C) Receive complaints and conduct preliminary investigation
D) Issue fishing licenses only
  • 95. Which document must accompany the complaint in most environmental cases?
A) Only verbal testimony
B) None of the above
C) Evidence showing violation
D) Social media posts
  • 96. Environmental cases filed in court require?
A) Only public notice
B) Only media coverage
C) Only witness statements
D) Verified complaint and supporting evidence
  • 97. What is the key role of witnesses in environmental cases?
A) Conduct media campaigns
B) Arrest violators personally
C) Provide firsthand accounts supporting the complaint
D) Announce violations on social media
  • 98. Filing a complaint without evidence will most likely?
A) Automatically impose fines
B) Be dismissed by the court
C) Lead to immediate conviction
D) Require public hearing
  • 99. Which law emphasizes the protection of wildlife and its habitats?
A) RA 9275
B) RA 9003
C) RA 9147
D) RA 8749
  • 100. Proper filing of environmental cases helps in?
A) Media sensationalism
B) Publicizing the complainant
C) Evicting residents forcibly
D) Preventing environmental degradation and promoting compliance
Created with That Quiz — the site for test creation and grading in math and other subjects.