A) Storing data securely for future reference, without immediate use. B) Unauthorized disclosure of sensitive personal information, breaching privacy rights and security principles. C) Unauthorized disclosure of sensitive personal information, breaching privacy rights and security principles. D) Processing data for legitimate law enforcement purposes, provided safeguards are in place. E) Collecting data with proper warrants, as it aligns with public interest.
A) Accessing systems with owner consent for maintenance. B) Sharing public information online without malice. C) Using encryption for personal data protection D) Hacking into government databases to steal classified information, constituting cyber espionage. E) Hacking into government databases to steal classified information, constituting cyber espionage.
A) Using sustainable fishing gear like nets in designated areas. B) Employing destructive methods like explosives, destroying habitats and violating conservation rules. C) Employing destructive methods like explosives, destroying habitats and violating conservation rules. D) Reporting catch volumes to local authorities. E) Harvesting seaweed for aquaculture purposes.
A) Educating the public on wildlife preservation B) Selling or transporting endangered wildlife without permits, threatening biodiversity. C) Educating the public on wildlife preservation D) Breeding protected species in captivity for conservation E) Selling or transporting endangered wildlife without permits, threatening biodiversity.
A) Educating communities on waste reduction. B) Improper disposal of hazardous waste, polluting land and violating segregation mandates. C) Improper disposal of hazardous waste, polluting land and violating segregation mandates. D) Collecting waste for composting programs. E) Recycling materials in designated facilities.
A) Using renewable energy sources for operations. B) Reporting emissions to environmental agencies. C) Releasing excessive pollutants into the atmosphere, violating emission limits and health standards. D) Releasing excessive pollutants into the atmosphere, violating emission limits and health standards. E) Installing air quality monitoring devices.
A) Treating wastewater before release into bodies of water. B) Implementing watershed management plans. C) Discharging pollutants directly into waterways, breaching water quality standards. D) Monitoring water quality in protected areas. E) Discharging pollutants directly into waterways, breaching water quality standards.
A) Deleting outdated records securely B) Unauthorized processing or alteration of personal data, compromising privacy. C) Obtaining consent for data collection D) Encrypting data for security purposes. E) Unauthorized processing or alteration of personal data, compromising privacy.
A) Producing or distributing child sexual abuse material, constituting a severe cybercrime. B) Using social media for lawful advocacy C) Encrypting communications for privacy. D) Producing or distributing child sexual abuse material, constituting a severe cybercrime. E) Sharing educational content on internet safety.
A) Fishing in no-take zones, destroying marine biodiversity. B) Fishing in no-take zones, destroying marine biodiversity. C) Implementing community-based fisheries management. D) Reporting illegal activities to authorities. E) Conducting research in protected areas with permits.
A) Clearing forests for development, endangering species and violating habitat protection. B) Monitoring wildlife populations. C) Restoring degraded habitats legally. D) Clearing forests for development, endangering species and violating habitat protection. E) Establishing eco-tourism zones.
A) Burning waste openly, releasing toxins and violating anti-burning provisions. B) Segregating waste for recycling. C) Burning waste openly, releasing toxins and violating anti-burning provisions. D) Educating on waste segregation. E) Composting organic waste properly.
A) Using public transportation to reduce emissions. B) Operating without valid emission compliance certificates, contributing to air pollution. C) Operating without valid emission compliance certificates, contributing to air pollution. D) Reporting vehicle maintenance. E) Retrofitting vehicles with emission controls.
A) Discharging untreated pollutants, degrading marine ecosystems. B) Implementing pollution prevention plans. C) Monitoring effluent quality. D) Treating wastewater before release into bodies of water. E) Discharging untreated pollutants, degrading marine ecosystems.
A) Providing privacy notices as required. B) Collecting data surreptitiously, breaching transparency principles. C) Limiting data retention periods. D) Collecting data surreptitiously, breaching transparency principles. E) Obtaining consent for processing.
A) Sharing public profiles online. B) Using secure authentication. C) Verifying identities securely. D) Stealing personal information for fraudulent purposes, constituting cybercrime. E) Stealing personal information for fraudulent purposes, constituting cybercrime.
A) Using non-toxic methods for aquaculture. B) Applying poisons to stun fish, harming ecosystems. C) Enforcing fishing bans. D) Applying poisons to stun fish, harming ecosystems. E) Monitoring fish stocks.
A) Promoting anti-poaching campaigns. B) Hunting with permits in controlled areas C) Killing protected species illegally, threatening populations. D) Killing protected species illegally, threatening populations. E) Conducting wildlife censuses.
A) Storing hazardous waste separately. B) Reporting waste generation. C) Recycling hazardous materials. D) Mixing wastes improperly, increasing pollution risks. E) Mixing wastes improperly, increasing pollution risks.
A) Permitting excessive smoke emissions, violating air quality rules. B) Permitting excessive smoke emissions, violating air quality rules. C) Promoting electric vehicles D) Monitoring air pollution levels. E) Enforcing emission standards.
A) Failing to contain and remediate oil discharges, polluting water bodies B) Implementing spill prevention measures C) Failing to contain and remediate oil discharges, polluting water bodies D) Reporting spills immediately E) Using biodegradable oils
A) Obtaining consent for retention. B) Deleting data after use. C) Auditing data inventories. D) Excessive retention without justification, breaching minimization principles E) Excessive retention without justification, breaching minimization principles
A) Expressing opinions freely. B) Publishing defamatory content online, constituting cyber libel. C) Fact-checking information D) Using anonymous accounts legally. E) Publishing defamatory content online, constituting cyber libel.
A) Reporting catches accurately B) Using selective gear C) Exceeding limits, leading to overfishing. D) Adhering to quotas. E) Exceeding limits, leading to overfishing.
A) Cutting trees in protected areas, destroying habitats. B) Reforestation efforts. C) Enforcing logging bans. D) Cutting trees in protected areas, destroying habitats. E) Sustainable logging with permits.
A) Exigent circumstances justify warrantless seizure if evidence is at risk of destruction. B) Consent of the suspect is implied during cybercrime operations. C) Warrant is unnecessary for digital evidence. D) Exigent circumstances justify warrantless seizure if evidence is at risk of destruction. E) The officer’s authority under RA 10175 supersedes all other laws.
A) Warrant to Intercept Computer Data (WICD) B) Warrant to Disclose Computer Data (WDCD) C) Warrant to Examine Computer Data (WECD) D) Warrant to Search, Seize, and Examine Computer Data (WSSECD) E) Warrant to Disclose Computer Data (WDCD)
A) Proper labeling and sealing of the storage device B) Use of the latest antivirus software C) Electronic signature by the prosecutor D) Presentation by the arresting officer E) Proper labeling and sealing of the storage device
A) WICD applies to physical devices; WECD applies to social media accounts B) WICD Involves real-time data interception; WECD involves stored data examination. C) Both are identical under RA 10175. D) WICD Involves real-time data interception; WECD involves stored data examination. E) WECD is issued only by the DOJ; WICD is issued by courts.
A) Failure to decrypt the files B) Absence of a search warrant C) Improper use of forensic imaging tools D) Lack of data backup E) Improper use of forensic imaging tools
A) Rule on Electronic Evidence (A.M. No. 01-7-01-SC) B) Evidence Act of 1989 C) Rule on Electronic Evidence (A.M. No. 01-7-01-SC) D) Rule on Cybercrime Warrants (A.M. No. 17-11-03-SC) E) Rule 115, Rules of Criminal Procedure
A) Applies only to social media posts. B) Combines the authority to search, seize, and examine physical and digital evidence. C) Combines the authority to search, seize, and examine physical and digital evidence. D) Limited only to physical seizure of hardware. E) Used exclusively for interception of live chats.
A) Plain view doctrine B) Fruit of the poisonous tree C) Plain view doctrine D) Adverse inference rule E) Exclusionary rule
A) First responder B) Evidence originator C) Evidence analyst D) Evidence custodian E) First responder
A) The number of digital copies produced B) The volume of data stored C) The reliability of the data source and integrity of the process used D) The reliability of the data source and integrity of the process used E) The encryption software used
A) Remote wiping or alteration of data B) Increase in battery temperature C) Delay in data extraction D) Remote wiping or alteration of data E) Device encryption failure
A) Compress the file for storage B) Encrypt the data for security C) Verify that data has not been altered D) Translate binary codes to text E) Verify that data has not been altered
A) It starts only after evidence collection. B) It excludes coordination with service providers. C) It involves detection, containment, eradication, and recovery. D) It is optional if a warrant has been issued. E) It involves detection, containment, eradication, and recovery.
A) WSSECD B) WDCD C) WDCD D) WICD E) WECD
A) Chain of custody rule B) Best evidence rule C) Res gestae rule D) Plain view rule E) Best evidence rule
A) Delete malicious data. B) Disconnect all systems permanently. C) Contain the incident while preserving evidence integrity. D) Contain the incident while preserving evidence integrity. E) Immediately prosecute the offender.
A) Jurisdiction of the court B) Chain of custody documentation C) Chain of custody documentation D) Admissibility under RA 10175 E) Authority of the warrant
A) Immediately and without limit B) Within one (1) year C) Within twenty (20) days D) Within ten (10) days from issuance, unless extended by the court E) Within ten (10) days from issuance, unless extended by the court
A) By oral testimony of a witness alone. B) By certification from the ISP. C) By submission of printed copies. D) By digital signature or other security procedures proving identity. E) By digital signature or other security procedures proving identity.
A) Warrant to Intercept Computer Data B) Warrant to Disclose Computer Data C) Warrant to Delete Computer Data D) Warrant to Delete Computer Data E) Warrant to Block Access
A) Maintenance of chain of custody with documentation and signatures. B) Certification by a foreign expert. C) Inclusion of suspect’s consent form. D) Submission of encrypted files only. E) Maintenance of chain of custody with documentation and signatures.
A) Potential inadmissibility due to alteration risk. B) Automatically admissible if signed by investigator. C) Accepted as secondary evidence. D) Potential inadmissibility due to alteration risk. E) No consequence if warrant exists.
A) Accessing unrelated folders outside the warrant’s scope. B) Hashing all collected data. C) Seizing a USB found in plain view. D) Submitting the report within ten days. E) Accessing unrelated folders outside the warrant’s scope.
A) Quantity, quality, and accessibility B) Reliability, importance, and format C) Relevance, authenticity, and integrity D) Relevance, authenticity, and integrity E) Consent, jurisdiction, and value
A) Exclusionary clause exception B) Fruit of the poisonous tree doctrine C) De minimis rule D) Fruit of the poisonous tree doctrine E) Plain view doctrine
A) The officer must establish a complete chain of custody to prevent tampering, ensuring evidentiary integrity. B) The officer must establish a complete chain of custody to prevent tampering, ensuring evidentiary integrity. C) Documentation is only required if the suspect confesses D) The officer must photograph and label the gear but not seal it. E) Documentation is optional if the gear is perishable.
A) Dismiss the case if the violator offers compensation. B) Transfer the case to a non-governmental organization. C) Assess environmental impact to prioritize cases affecting marine ecosystems. D) Immediately arrest the violator without further evaluation E) Assess environmental impact to prioritize cases affecting marine ecosystems.
A) Coordination only involves sharing suspect information. B) BFAR provides technical expertise, improving evidence accuracy and case strength. C) Coordination is unnecessary as local officers handle all aspects. D) BFAR provides technical expertise, improving evidence accuracy and case strength. E) It delays the process by requiring additional approvals.
A) Preservation is preferred, but destruction is allowed with documentation to maintain chain of custody. B) Destruction requires court approval first. C) Destruction is always mandatory to avoid spoilage. D) The officer has no discretion; all evidence must be preserved E) Preservation is preferred, but destruction is allowed with documentation to maintain chain of custody.
A) The rule applies only to minor violations. B) The rule is flexible and not strictly enforced. C) It ensures timely evidence collection, preventing loss and upholding accountability. D) It ensures timely evidence collection, preventing loss and upholding accountability. E) It allows indefinite delays for complex cases.
A) It provides scientific basis, enhancing evidential weight and judicial outcomes. B) It is only for civil, not criminal, cases. C) Assessment delays filing unnecessarily. D) Assessment is optional and not required for filing. E) It provides scientific basis, enhancing evidential weight and judicial outcomes.
A) It complicates procedures without benefits. B) Officials only witness arrests. C) It facilitates local cooperation, improving detection and resolution rates. D) It facilitates local cooperation, improving detection and resolution rates. E) Barangay involvement is mandatory for all cases.
A) Notice is issued only after arrest. B) Notice delays prosecution indefinitely C) It allows violators to correct behavior, balancing deterrence with rehabilitation. D) It is mandatory for all violations without exceptions. E) It allows violators to correct behavior, balancing deterrence with rehabilitation.
A) Consolidation only applies to civil penalties. B) It requires separate filings for each violation. C) It streamlines evidence presentation, reducing court time and strengthening linkages. D) It streamlines evidence presentation, reducing court time and strengthening linkages. E) Consolidation is prohibited to avoid complexity
A) It involves follow-up inspections, deterring future violations through accountability. B) Monitoring is optional and not enforced. C) Monitoring occurs only during trial. D) It is handled solely by the court. E) It involves follow-up inspections, deterring future violations through accountability.
A) Consultation is optional for routine seizures. B) Consultation only involves paperwork. C) DENR expertise ensures proper identification, enhancing case validity. D) DENR expertise ensures proper identification, enhancing case validity. E) It requires approval before any action.
A) It is unnecessary if the animal is alive. B) Visual evidence provides irrefutable proof, aiding in network disruption. C) Documentation is limited to written reports D) Documentation delays seizure. E) Visual evidence provides irrefutable proof, aiding in network disruption.
A) Coordination leverages local knowledge, improving detection and resolution. B) PAMBs only approve permits. C) Coordination leverages local knowledge, improving detection and resolution D) It complicates jurisdiction. E) PAMBs have no role in enforcement.
A) The rule is discretionary. B) It prevents evidence degradation, ensuring timely prosecution. C) Filing can be delayed indefinitely D) It applies only to dead specimens. E) It prevents evidence degradation, ensuring timely prosecution.
A) It establishes origin and illegality, strengthening culpability. B) Analysis is optional for common species C) It only identifies species. D) It establishes origin and illegality, strengthening culpability. E) Analysis requires court order first.
A) NGOs only handle rehabilitation. B) NGOs are excluded from procedures. C) They provide resources, enhancing capacity but risking bias. D) Involvement is mandatory. E) They provide resources, enhancing capacity but risking bias.
A) It delays prosecution. B) It ensures animal welfare, potentially influencing plea deals. C) Rehabilitation is separate from filing. D) Rehabilitation is not required. E) It ensures animal welfare, potentially influencing plea deals.
A) Impact assessment tailors penalties, deterring severe violations. B) It only considers economic loss C) Assessment is post-trial D) Impact assessment tailors penalties, deterring severe violations. E) Penalties are fixed.
A) Custody is court-managed B) Custody is informal C) Strict documentation maintains evidence reliability D) It applies only to live animals E) Strict documentation maintains evidence reliability
A) Joint filing is prohibited B) It pools resources, improving transnational enforcement C) It pools resources, improving transnational enforcement D) Joint cases are rare E) It complicates jurisdiction
A) Sampling requires lab approval B) Sampling is unnecessary C) It provides representative evidence, strengthening cases D) It provides representative evidence, strengthening cases E) It only identifies waste types
A) It is mandatory for all cases. B) Notice is issued post-arrest C) It promotes compliance, reducing litigation D) It promotes compliance, reducing litigation E) Notice is punitive
A) It creates overlaps B) Coordination ensures local implementation, improving outcomes C) LGUs have no role D) LGUs only issue permits. E) Coordination ensures local implementation, improving outcomes
A) It applies to minor issues only B) The rule is flexible C) It ensures prompt action, maintaining integrity D) Reporting can be delayed E) It ensures prompt action, maintaining integrity
A) Seizure requires court order B) Detailed records ensure evidentiary strength C) Detailed records ensure evidentiary strength D) Documentation is minimal E) Documentation is post-seizure
A) Monitoring is optional B) It detects violations early, aiding prevention C) It detects violations early, aiding prevention D) It is court-ordered E) Monitoring delays filing.
A) Generators are not involved B) Involvement encourages responsibility, resolving issues C) It complicates procedures D) Generators only pay fines E) Involvement encourages responsibility, resolving issues
A) Strict tracking prevents contamination B) Custody is informal C) Custody is lab-managed D) It applies to non-hazardous waste only E) Strict tracking prevents contamination
A) Inspections require permits B) Inspections are random C) They delay transport D) Protocol establishes violations, strengthening cases E) Protocol establishes violations, strengthening cases
A) It ensures sustained compliance B) Monitoring occurs during trial C) It ensures sustained compliance D) Monitoring is not required E) It is handled by courts
A) Consent of the suspect is implied during cybercrime operations B) Exigent circumstances justify warrantless seizure if evidence is at risk of destruction C) The officer’s authority under RA 10175 supersedes all other laws D) Warrant is unnecessary for digital evidence E) Exigent circumstances justify warrantless seizure if evidence is at risk of destruction
A) Warrant to Disclose Computer Data (WDCD) B) Warrant to Examine Computer Data (WECD) C) Warrant to Intercept Computer Data (WICD) D) Warrant to Search, Seize, and Examine Computer Data (WSSECD) E) Warrant to Disclose Computer Data (WDCD)
A) Electronic signature by the prosecutor B) Proper labeling and sealing of the storage device C) Presentation by the arresting officer D) Use of the latest antivirus software E) Proper labeling and sealing of the storage device
A) WICD involves real-time data interception; WECD involves stored data examination. B) WICD involves real-time data interception; WECD involves stored data examination. C) Both are identical under RA 10175 D) WICD applies to physical devices; WECD applies to social media accounts E) WECD is issued only by the DOJ; WICD is issued by courts
A) Absence of a search warrant B) Lack of data backup C) Failure to decrypt the files D) Improper use of forensic imaging tools E) Improper use of forensic imaging tools
A) Evidence Act of 1989 B) Rule on Electronic Evidence (A.M. No. 01-7-01-SC) C) Rule on Cybercrime Warrants (A.M. No. 17-11-03-SC) D) Rule on Electronic Evidence (A.M. No. 01-7-01-SC) E) Rule 115, Rules of Criminal Procedure
A) Limited only to physical seizure of hardware B) Combines the authority to search, seize, and examine physical and digital evidence. C) Combines the authority to search, seize, and examine physical and digital evidence. D) Applies only to social media posts E) Used exclusively for interception of live chats
A) Fruit of the poisonous tree B) Plain view doctrine C) Plain view doctrine D) Adverse inference rule E) Exclusionary rule
A) Evidence analyst B) Evidence custodian C) First responder D) First responder E) Evidence originator
A) The reliability of the data source and integrity of the process used B) The reliability of the data source and integrity of the process used C) The volume of data stored D) The encryption software used E) The number of digital copies produced
A) Delay in data extraction B) Remote wiping or alteration of data C) Remote wiping or alteration of data D) Device encryption failure E) Increase in battery temperature
A) Verify that data has not been altered B) Translate binary codes to text C) Compress the file for storage D) Verify that data has not been altered E) Encrypt the data for security
A) It involves detection, containment, eradication, and recovery B) It is optional if a warrant has been issued C) It involves detection, containment, eradication, and recovery D) It excludes coordination with service providers E) It starts only after evidence collection
A) WDCD B) WSSECD C) WDCD D) WICD E) WECD
A) Best evidence rule B) Best evidence rule C) Res gestae rule D) Plain view rule E) Chain of custody rule
A) Delete malicious data B) Contain the incident while preserving evidence integrity. C) Contain the incident while preserving evidence integrity. D) Immediately prosecute the offender E) Disconnect all systems permanently
A) Chain of custody documentation B) Chain of custody documentation C) Authority of the warrant D) Jurisdiction of the court E) Admissibility under RA 10175
A) Within one (1) year B) Within twenty (20) days C) Within ten (10) days from issuance, unless extended by the court D) Immediately and without limit E) Within ten (10) days from issuance, unless extended by the court
A) By oral testimony of a witness alone B) By submission of printed copies C) By digital signature or other security procedures proving identity D) By certification from the ISP E) By digital signature or other security procedures proving identity
A) Warrant to Delete Computer Data B) Warrant to Delete Computer Data C) Warrant to Disclose Computer Data D) Warrant to Block Access E) Warrant to Intercept Computer Data |