A) Unauthorized disclosure of sensitive personal information, breaching privacy rights and security principles. B) Processing data for legitimate law enforcement purposes, provided safeguards are in place. C) Storing data securely for future reference, without immediate use. D) Collecting data with proper warrants, as it aligns with public interest. E) Unauthorized disclosure of sensitive personal information, breaching privacy rights and security principles.
A) Sharing public information online without malice. B) Accessing systems with owner consent for maintenance. C) Hacking into government databases to steal classified information, constituting cyber espionage. D) Using encryption for personal data protection E) Hacking into government databases to steal classified information, constituting cyber espionage.
A) Employing destructive methods like explosives, destroying habitats and violating conservation rules. B) Harvesting seaweed for aquaculture purposes. C) Reporting catch volumes to local authorities. D) Using sustainable fishing gear like nets in designated areas. E) Employing destructive methods like explosives, destroying habitats and violating conservation rules.
A) Selling or transporting endangered wildlife without permits, threatening biodiversity. B) Educating the public on wildlife preservation C) Selling or transporting endangered wildlife without permits, threatening biodiversity. D) Breeding protected species in captivity for conservation E) Educating the public on wildlife preservation
A) Educating communities on waste reduction. B) Collecting waste for composting programs. C) Recycling materials in designated facilities. D) Improper disposal of hazardous waste, polluting land and violating segregation mandates. E) Improper disposal of hazardous waste, polluting land and violating segregation mandates.
A) Using renewable energy sources for operations. B) Installing air quality monitoring devices. C) Releasing excessive pollutants into the atmosphere, violating emission limits and health standards. D) Releasing excessive pollutants into the atmosphere, violating emission limits and health standards. E) Reporting emissions to environmental agencies.
A) Monitoring water quality in protected areas. B) Treating wastewater before release into bodies of water. C) Discharging pollutants directly into waterways, breaching water quality standards. D) Implementing watershed management plans. E) Discharging pollutants directly into waterways, breaching water quality standards.
A) Deleting outdated records securely B) Obtaining consent for data collection C) Encrypting data for security purposes. D) Unauthorized processing or alteration of personal data, compromising privacy. E) Unauthorized processing or alteration of personal data, compromising privacy.
A) Using social media for lawful advocacy B) Encrypting communications for privacy. C) Producing or distributing child sexual abuse material, constituting a severe cybercrime. D) Producing or distributing child sexual abuse material, constituting a severe cybercrime. E) Sharing educational content on internet safety.
A) Implementing community-based fisheries management. B) Fishing in no-take zones, destroying marine biodiversity. C) Reporting illegal activities to authorities. D) Fishing in no-take zones, destroying marine biodiversity. E) Conducting research in protected areas with permits.
A) Clearing forests for development, endangering species and violating habitat protection. B) Establishing eco-tourism zones. C) Restoring degraded habitats legally. D) Clearing forests for development, endangering species and violating habitat protection. E) Monitoring wildlife populations.
A) Burning waste openly, releasing toxins and violating anti-burning provisions. B) Burning waste openly, releasing toxins and violating anti-burning provisions. C) Composting organic waste properly. D) Educating on waste segregation. E) Segregating waste for recycling.
A) Operating without valid emission compliance certificates, contributing to air pollution. B) Reporting vehicle maintenance. C) Using public transportation to reduce emissions. D) Operating without valid emission compliance certificates, contributing to air pollution. E) Retrofitting vehicles with emission controls.
A) Monitoring effluent quality. B) Discharging untreated pollutants, degrading marine ecosystems. C) Implementing pollution prevention plans. D) Discharging untreated pollutants, degrading marine ecosystems. E) Treating wastewater before release into bodies of water.
A) Collecting data surreptitiously, breaching transparency principles. B) Obtaining consent for processing. C) Limiting data retention periods. D) Collecting data surreptitiously, breaching transparency principles. E) Providing privacy notices as required.
A) Verifying identities securely. B) Using secure authentication. C) Stealing personal information for fraudulent purposes, constituting cybercrime. D) Stealing personal information for fraudulent purposes, constituting cybercrime. E) Sharing public profiles online.
A) Monitoring fish stocks. B) Using non-toxic methods for aquaculture. C) Applying poisons to stun fish, harming ecosystems. D) Enforcing fishing bans. E) Applying poisons to stun fish, harming ecosystems.
A) Hunting with permits in controlled areas B) Killing protected species illegally, threatening populations. C) Conducting wildlife censuses. D) Promoting anti-poaching campaigns. E) Killing protected species illegally, threatening populations.
A) Mixing wastes improperly, increasing pollution risks. B) Reporting waste generation. C) Storing hazardous waste separately. D) Mixing wastes improperly, increasing pollution risks. E) Recycling hazardous materials.
A) Monitoring air pollution levels. B) Permitting excessive smoke emissions, violating air quality rules. C) Permitting excessive smoke emissions, violating air quality rules. D) Enforcing emission standards. E) Promoting electric vehicles
A) Reporting spills immediately B) Using biodegradable oils C) Failing to contain and remediate oil discharges, polluting water bodies D) Failing to contain and remediate oil discharges, polluting water bodies E) Implementing spill prevention measures
A) Deleting data after use. B) Excessive retention without justification, breaching minimization principles C) Obtaining consent for retention. D) Excessive retention without justification, breaching minimization principles E) Auditing data inventories.
A) Publishing defamatory content online, constituting cyber libel. B) Publishing defamatory content online, constituting cyber libel. C) Using anonymous accounts legally. D) Expressing opinions freely. E) Fact-checking information
A) Exceeding limits, leading to overfishing. B) Reporting catches accurately C) Adhering to quotas. D) Using selective gear E) Exceeding limits, leading to overfishing.
A) Enforcing logging bans. B) Sustainable logging with permits. C) Cutting trees in protected areas, destroying habitats. D) Cutting trees in protected areas, destroying habitats. E) Reforestation efforts.
A) Warrant is unnecessary for digital evidence. B) The officer’s authority under RA 10175 supersedes all other laws. C) Consent of the suspect is implied during cybercrime operations. D) Exigent circumstances justify warrantless seizure if evidence is at risk of destruction. E) Exigent circumstances justify warrantless seizure if evidence is at risk of destruction.
A) Warrant to Disclose Computer Data (WDCD) B) Warrant to Examine Computer Data (WECD) C) Warrant to Search, Seize, and Examine Computer Data (WSSECD) D) Warrant to Intercept Computer Data (WICD) E) Warrant to Disclose Computer Data (WDCD)
A) Proper labeling and sealing of the storage device B) Use of the latest antivirus software C) Presentation by the arresting officer D) Electronic signature by the prosecutor E) Proper labeling and sealing of the storage device
A) WICD applies to physical devices; WECD applies to social media accounts B) Both are identical under RA 10175. C) WECD is issued only by the DOJ; WICD is issued by courts. D) WICD Involves real-time data interception; WECD involves stored data examination. E) WICD Involves real-time data interception; WECD involves stored data examination.
A) Improper use of forensic imaging tools B) Failure to decrypt the files C) Lack of data backup D) Improper use of forensic imaging tools E) Absence of a search warrant
A) Rule on Cybercrime Warrants (A.M. No. 17-11-03-SC) B) Rule 115, Rules of Criminal Procedure C) Rule on Electronic Evidence (A.M. No. 01-7-01-SC) D) Evidence Act of 1989 E) Rule on Electronic Evidence (A.M. No. 01-7-01-SC)
A) Used exclusively for interception of live chats. B) Combines the authority to search, seize, and examine physical and digital evidence. C) Combines the authority to search, seize, and examine physical and digital evidence. D) Applies only to social media posts. E) Limited only to physical seizure of hardware.
A) Fruit of the poisonous tree B) Plain view doctrine C) Plain view doctrine D) Exclusionary rule E) Adverse inference rule
A) Evidence originator B) Evidence analyst C) First responder D) First responder E) Evidence custodian
A) The volume of data stored B) The encryption software used C) The reliability of the data source and integrity of the process used D) The reliability of the data source and integrity of the process used E) The number of digital copies produced
A) Device encryption failure B) Remote wiping or alteration of data C) Increase in battery temperature D) Delay in data extraction E) Remote wiping or alteration of data
A) Verify that data has not been altered B) Encrypt the data for security C) Translate binary codes to text D) Compress the file for storage E) Verify that data has not been altered
A) It starts only after evidence collection. B) It excludes coordination with service providers. C) It involves detection, containment, eradication, and recovery. D) It is optional if a warrant has been issued. E) It involves detection, containment, eradication, and recovery.
A) WICD B) WDCD C) WSSECD D) WDCD E) WECD
A) Plain view rule B) Res gestae rule C) Best evidence rule D) Chain of custody rule E) Best evidence rule
A) Disconnect all systems permanently. B) Contain the incident while preserving evidence integrity. C) Contain the incident while preserving evidence integrity. D) Immediately prosecute the offender. E) Delete malicious data.
A) Authority of the warrant B) Chain of custody documentation C) Admissibility under RA 10175 D) Chain of custody documentation E) Jurisdiction of the court
A) Within one (1) year B) Within ten (10) days from issuance, unless extended by the court C) Immediately and without limit D) Within twenty (20) days E) Within ten (10) days from issuance, unless extended by the court
A) By oral testimony of a witness alone. B) By digital signature or other security procedures proving identity. C) By submission of printed copies. D) By certification from the ISP. E) By digital signature or other security procedures proving identity.
A) Warrant to Delete Computer Data B) Warrant to Intercept Computer Data C) Warrant to Block Access D) Warrant to Delete Computer Data E) Warrant to Disclose Computer Data
A) Certification by a foreign expert. B) Maintenance of chain of custody with documentation and signatures. C) Maintenance of chain of custody with documentation and signatures. D) Inclusion of suspect’s consent form. E) Submission of encrypted files only.
A) Potential inadmissibility due to alteration risk. B) Potential inadmissibility due to alteration risk. C) No consequence if warrant exists. D) Accepted as secondary evidence. E) Automatically admissible if signed by investigator.
A) Accessing unrelated folders outside the warrant’s scope. B) Seizing a USB found in plain view. C) Accessing unrelated folders outside the warrant’s scope. D) Hashing all collected data. E) Submitting the report within ten days.
A) Relevance, authenticity, and integrity B) Reliability, importance, and format C) Quantity, quality, and accessibility D) Relevance, authenticity, and integrity E) Consent, jurisdiction, and value
A) De minimis rule B) Plain view doctrine C) Fruit of the poisonous tree doctrine D) Fruit of the poisonous tree doctrine E) Exclusionary clause exception
A) Documentation is only required if the suspect confesses B) The officer must establish a complete chain of custody to prevent tampering, ensuring evidentiary integrity. C) The officer must photograph and label the gear but not seal it. D) Documentation is optional if the gear is perishable. E) The officer must establish a complete chain of custody to prevent tampering, ensuring evidentiary integrity.
A) Dismiss the case if the violator offers compensation. B) Assess environmental impact to prioritize cases affecting marine ecosystems. C) Assess environmental impact to prioritize cases affecting marine ecosystems. D) Immediately arrest the violator without further evaluation E) Transfer the case to a non-governmental organization.
A) Coordination only involves sharing suspect information. B) BFAR provides technical expertise, improving evidence accuracy and case strength. C) Coordination is unnecessary as local officers handle all aspects. D) It delays the process by requiring additional approvals. E) BFAR provides technical expertise, improving evidence accuracy and case strength.
A) Preservation is preferred, but destruction is allowed with documentation to maintain chain of custody. B) Preservation is preferred, but destruction is allowed with documentation to maintain chain of custody. C) Destruction requires court approval first. D) The officer has no discretion; all evidence must be preserved E) Destruction is always mandatory to avoid spoilage.
A) It allows indefinite delays for complex cases. B) It ensures timely evidence collection, preventing loss and upholding accountability. C) It ensures timely evidence collection, preventing loss and upholding accountability. D) The rule is flexible and not strictly enforced. E) The rule applies only to minor violations.
A) It provides scientific basis, enhancing evidential weight and judicial outcomes. B) Assessment delays filing unnecessarily. C) It is only for civil, not criminal, cases. D) It provides scientific basis, enhancing evidential weight and judicial outcomes. E) Assessment is optional and not required for filing.
A) Officials only witness arrests. B) It complicates procedures without benefits. C) It facilitates local cooperation, improving detection and resolution rates. D) It facilitates local cooperation, improving detection and resolution rates. E) Barangay involvement is mandatory for all cases.
A) It allows violators to correct behavior, balancing deterrence with rehabilitation. B) Notice is issued only after arrest. C) It allows violators to correct behavior, balancing deterrence with rehabilitation. D) Notice delays prosecution indefinitely E) It is mandatory for all violations without exceptions.
A) Consolidation only applies to civil penalties. B) It streamlines evidence presentation, reducing court time and strengthening linkages. C) It requires separate filings for each violation. D) It streamlines evidence presentation, reducing court time and strengthening linkages. E) Consolidation is prohibited to avoid complexity
A) Monitoring occurs only during trial. B) It is handled solely by the court. C) Monitoring is optional and not enforced. D) It involves follow-up inspections, deterring future violations through accountability. E) It involves follow-up inspections, deterring future violations through accountability.
A) Consultation is optional for routine seizures. B) Consultation only involves paperwork. C) It requires approval before any action. D) DENR expertise ensures proper identification, enhancing case validity. E) DENR expertise ensures proper identification, enhancing case validity.
A) Visual evidence provides irrefutable proof, aiding in network disruption. B) Documentation is limited to written reports C) Documentation delays seizure. D) Visual evidence provides irrefutable proof, aiding in network disruption. E) It is unnecessary if the animal is alive.
A) PAMBs only approve permits. B) Coordination leverages local knowledge, improving detection and resolution. C) It complicates jurisdiction. D) PAMBs have no role in enforcement. E) Coordination leverages local knowledge, improving detection and resolution
A) It prevents evidence degradation, ensuring timely prosecution. B) Filing can be delayed indefinitely C) It prevents evidence degradation, ensuring timely prosecution. D) It applies only to dead specimens. E) The rule is discretionary.
A) It establishes origin and illegality, strengthening culpability. B) It establishes origin and illegality, strengthening culpability. C) Analysis is optional for common species D) It only identifies species. E) Analysis requires court order first.
A) Involvement is mandatory. B) NGOs are excluded from procedures. C) They provide resources, enhancing capacity but risking bias. D) They provide resources, enhancing capacity but risking bias. E) NGOs only handle rehabilitation.
A) It delays prosecution. B) It ensures animal welfare, potentially influencing plea deals. C) It ensures animal welfare, potentially influencing plea deals. D) Rehabilitation is separate from filing. E) Rehabilitation is not required.
A) Penalties are fixed. B) Assessment is post-trial C) Impact assessment tailors penalties, deterring severe violations. D) It only considers economic loss E) Impact assessment tailors penalties, deterring severe violations.
A) Custody is court-managed B) Strict documentation maintains evidence reliability C) It applies only to live animals D) Custody is informal E) Strict documentation maintains evidence reliability
A) It pools resources, improving transnational enforcement B) Joint cases are rare C) Joint filing is prohibited D) It complicates jurisdiction E) It pools resources, improving transnational enforcement
A) Sampling is unnecessary B) It provides representative evidence, strengthening cases C) Sampling requires lab approval D) It provides representative evidence, strengthening cases E) It only identifies waste types
A) It promotes compliance, reducing litigation B) Notice is punitive C) It is mandatory for all cases. D) Notice is issued post-arrest E) It promotes compliance, reducing litigation
A) Coordination ensures local implementation, improving outcomes B) LGUs only issue permits. C) LGUs have no role D) Coordination ensures local implementation, improving outcomes E) It creates overlaps
A) It ensures prompt action, maintaining integrity B) It applies to minor issues only C) The rule is flexible D) It ensures prompt action, maintaining integrity E) Reporting can be delayed
A) Documentation is post-seizure B) Documentation is minimal C) Detailed records ensure evidentiary strength D) Detailed records ensure evidentiary strength E) Seizure requires court order
A) It detects violations early, aiding prevention B) Monitoring delays filing. C) It detects violations early, aiding prevention D) Monitoring is optional E) It is court-ordered
A) It complicates procedures B) Generators only pay fines C) Generators are not involved D) Involvement encourages responsibility, resolving issues E) Involvement encourages responsibility, resolving issues
A) Custody is lab-managed B) It applies to non-hazardous waste only C) Strict tracking prevents contamination D) Custody is informal E) Strict tracking prevents contamination
A) Inspections require permits B) Inspections are random C) Protocol establishes violations, strengthening cases D) Protocol establishes violations, strengthening cases E) They delay transport
A) It ensures sustained compliance B) It ensures sustained compliance C) It is handled by courts D) Monitoring occurs during trial E) Monitoring is not required
A) Exigent circumstances justify warrantless seizure if evidence is at risk of destruction B) Warrant is unnecessary for digital evidence C) Consent of the suspect is implied during cybercrime operations D) Exigent circumstances justify warrantless seizure if evidence is at risk of destruction E) The officer’s authority under RA 10175 supersedes all other laws
A) Warrant to Disclose Computer Data (WDCD) B) Warrant to Search, Seize, and Examine Computer Data (WSSECD) C) Warrant to Disclose Computer Data (WDCD) D) Warrant to Examine Computer Data (WECD) E) Warrant to Intercept Computer Data (WICD)
A) Presentation by the arresting officer B) Electronic signature by the prosecutor C) Proper labeling and sealing of the storage device D) Proper labeling and sealing of the storage device E) Use of the latest antivirus software
A) Both are identical under RA 10175 B) WICD involves real-time data interception; WECD involves stored data examination. C) WECD is issued only by the DOJ; WICD is issued by courts D) WICD involves real-time data interception; WECD involves stored data examination. E) WICD applies to physical devices; WECD applies to social media accounts
A) Lack of data backup B) Failure to decrypt the files C) Absence of a search warrant D) Improper use of forensic imaging tools E) Improper use of forensic imaging tools
A) Rule on Cybercrime Warrants (A.M. No. 17-11-03-SC) B) Rule on Electronic Evidence (A.M. No. 01-7-01-SC) C) Evidence Act of 1989 D) Rule 115, Rules of Criminal Procedure E) Rule on Electronic Evidence (A.M. No. 01-7-01-SC)
A) Used exclusively for interception of live chats B) Combines the authority to search, seize, and examine physical and digital evidence. C) Limited only to physical seizure of hardware D) Combines the authority to search, seize, and examine physical and digital evidence. E) Applies only to social media posts
A) Plain view doctrine B) Plain view doctrine C) Adverse inference rule D) Fruit of the poisonous tree E) Exclusionary rule
A) Evidence analyst B) Evidence custodian C) Evidence originator D) First responder E) First responder
A) The reliability of the data source and integrity of the process used B) The reliability of the data source and integrity of the process used C) The encryption software used D) The number of digital copies produced E) The volume of data stored
A) Increase in battery temperature B) Remote wiping or alteration of data C) Device encryption failure D) Remote wiping or alteration of data E) Delay in data extraction
A) Translate binary codes to text B) Compress the file for storage C) Verify that data has not been altered D) Verify that data has not been altered E) Encrypt the data for security
A) It is optional if a warrant has been issued B) It involves detection, containment, eradication, and recovery C) It excludes coordination with service providers D) It involves detection, containment, eradication, and recovery E) It starts only after evidence collection
A) WICD B) WDCD C) WDCD D) WSSECD E) WECD
A) Res gestae rule B) Best evidence rule C) Chain of custody rule D) Plain view rule E) Best evidence rule
A) Immediately prosecute the offender B) Contain the incident while preserving evidence integrity. C) Delete malicious data D) Disconnect all systems permanently E) Contain the incident while preserving evidence integrity.
A) Chain of custody documentation B) Authority of the warrant C) Jurisdiction of the court D) Chain of custody documentation E) Admissibility under RA 10175
A) Within ten (10) days from issuance, unless extended by the court B) Within one (1) year C) Within ten (10) days from issuance, unless extended by the court D) Immediately and without limit E) Within twenty (20) days
A) By submission of printed copies B) By digital signature or other security procedures proving identity C) By oral testimony of a witness alone D) By digital signature or other security procedures proving identity E) By certification from the ISP
A) Warrant to Block Access B) Warrant to Delete Computer Data C) Warrant to Disclose Computer Data D) Warrant to Delete Computer Data E) Warrant to Intercept Computer Data |