A) Collecting data with proper warrants, as it aligns with public interest. B) Unauthorized disclosure of sensitive personal information, breaching privacy rights and security principles. C) Unauthorized disclosure of sensitive personal information, breaching privacy rights and security principles. D) Storing data securely for future reference, without immediate use. E) Processing data for legitimate law enforcement purposes, provided safeguards are in place.
A) Hacking into government databases to steal classified information, constituting cyber espionage. B) Sharing public information online without malice. C) Accessing systems with owner consent for maintenance. D) Using encryption for personal data protection E) Hacking into government databases to steal classified information, constituting cyber espionage.
A) Employing destructive methods like explosives, destroying habitats and violating conservation rules. B) Reporting catch volumes to local authorities. C) Employing destructive methods like explosives, destroying habitats and violating conservation rules. D) Using sustainable fishing gear like nets in designated areas. E) Harvesting seaweed for aquaculture purposes.
A) Educating the public on wildlife preservation B) Educating the public on wildlife preservation C) Selling or transporting endangered wildlife without permits, threatening biodiversity. D) Breeding protected species in captivity for conservation E) Selling or transporting endangered wildlife without permits, threatening biodiversity.
A) Collecting waste for composting programs. B) Improper disposal of hazardous waste, polluting land and violating segregation mandates. C) Improper disposal of hazardous waste, polluting land and violating segregation mandates. D) Educating communities on waste reduction. E) Recycling materials in designated facilities.
A) Reporting emissions to environmental agencies. B) Releasing excessive pollutants into the atmosphere, violating emission limits and health standards. C) Using renewable energy sources for operations. D) Installing air quality monitoring devices. E) Releasing excessive pollutants into the atmosphere, violating emission limits and health standards.
A) Treating wastewater before release into bodies of water. B) Discharging pollutants directly into waterways, breaching water quality standards. C) Discharging pollutants directly into waterways, breaching water quality standards. D) Implementing watershed management plans. E) Monitoring water quality in protected areas.
A) Unauthorized processing or alteration of personal data, compromising privacy. B) Unauthorized processing or alteration of personal data, compromising privacy. C) Encrypting data for security purposes. D) Obtaining consent for data collection E) Deleting outdated records securely
A) Using social media for lawful advocacy B) Encrypting communications for privacy. C) Producing or distributing child sexual abuse material, constituting a severe cybercrime. D) Producing or distributing child sexual abuse material, constituting a severe cybercrime. E) Sharing educational content on internet safety.
A) Implementing community-based fisheries management. B) Conducting research in protected areas with permits. C) Fishing in no-take zones, destroying marine biodiversity. D) Fishing in no-take zones, destroying marine biodiversity. E) Reporting illegal activities to authorities.
A) Monitoring wildlife populations. B) Clearing forests for development, endangering species and violating habitat protection. C) Restoring degraded habitats legally. D) Establishing eco-tourism zones. E) Clearing forests for development, endangering species and violating habitat protection.
A) Burning waste openly, releasing toxins and violating anti-burning provisions. B) Composting organic waste properly. C) Burning waste openly, releasing toxins and violating anti-burning provisions. D) Segregating waste for recycling. E) Educating on waste segregation.
A) Reporting vehicle maintenance. B) Retrofitting vehicles with emission controls. C) Using public transportation to reduce emissions. D) Operating without valid emission compliance certificates, contributing to air pollution. E) Operating without valid emission compliance certificates, contributing to air pollution.
A) Discharging untreated pollutants, degrading marine ecosystems. B) Treating wastewater before release into bodies of water. C) Discharging untreated pollutants, degrading marine ecosystems. D) Monitoring effluent quality. E) Implementing pollution prevention plans.
A) Limiting data retention periods. B) Providing privacy notices as required. C) Obtaining consent for processing. D) Collecting data surreptitiously, breaching transparency principles. E) Collecting data surreptitiously, breaching transparency principles.
A) Verifying identities securely. B) Stealing personal information for fraudulent purposes, constituting cybercrime. C) Stealing personal information for fraudulent purposes, constituting cybercrime. D) Sharing public profiles online. E) Using secure authentication.
A) Applying poisons to stun fish, harming ecosystems. B) Monitoring fish stocks. C) Applying poisons to stun fish, harming ecosystems. D) Using non-toxic methods for aquaculture. E) Enforcing fishing bans.
A) Killing protected species illegally, threatening populations. B) Promoting anti-poaching campaigns. C) Killing protected species illegally, threatening populations. D) Conducting wildlife censuses. E) Hunting with permits in controlled areas
A) Recycling hazardous materials. B) Mixing wastes improperly, increasing pollution risks. C) Storing hazardous waste separately. D) Mixing wastes improperly, increasing pollution risks. E) Reporting waste generation.
A) Permitting excessive smoke emissions, violating air quality rules. B) Monitoring air pollution levels. C) Permitting excessive smoke emissions, violating air quality rules. D) Promoting electric vehicles E) Enforcing emission standards.
A) Failing to contain and remediate oil discharges, polluting water bodies B) Implementing spill prevention measures C) Using biodegradable oils D) Failing to contain and remediate oil discharges, polluting water bodies E) Reporting spills immediately
A) Obtaining consent for retention. B) Auditing data inventories. C) Excessive retention without justification, breaching minimization principles D) Deleting data after use. E) Excessive retention without justification, breaching minimization principles
A) Expressing opinions freely. B) Using anonymous accounts legally. C) Publishing defamatory content online, constituting cyber libel. D) Fact-checking information E) Publishing defamatory content online, constituting cyber libel.
A) Reporting catches accurately B) Using selective gear C) Adhering to quotas. D) Exceeding limits, leading to overfishing. E) Exceeding limits, leading to overfishing.
A) Cutting trees in protected areas, destroying habitats. B) Cutting trees in protected areas, destroying habitats. C) Reforestation efforts. D) Enforcing logging bans. E) Sustainable logging with permits.
A) Exigent circumstances justify warrantless seizure if evidence is at risk of destruction. B) The officer’s authority under RA 10175 supersedes all other laws. C) Warrant is unnecessary for digital evidence. D) Consent of the suspect is implied during cybercrime operations. E) Exigent circumstances justify warrantless seizure if evidence is at risk of destruction.
A) Warrant to Examine Computer Data (WECD) B) Warrant to Search, Seize, and Examine Computer Data (WSSECD) C) Warrant to Disclose Computer Data (WDCD) D) Warrant to Disclose Computer Data (WDCD) E) Warrant to Intercept Computer Data (WICD)
A) Electronic signature by the prosecutor B) Use of the latest antivirus software C) Presentation by the arresting officer D) Proper labeling and sealing of the storage device E) Proper labeling and sealing of the storage device
A) WICD applies to physical devices; WECD applies to social media accounts B) WECD is issued only by the DOJ; WICD is issued by courts. C) WICD Involves real-time data interception; WECD involves stored data examination. D) WICD Involves real-time data interception; WECD involves stored data examination. E) Both are identical under RA 10175.
A) Improper use of forensic imaging tools B) Improper use of forensic imaging tools C) Lack of data backup D) Absence of a search warrant E) Failure to decrypt the files
A) Rule 115, Rules of Criminal Procedure B) Rule on Electronic Evidence (A.M. No. 01-7-01-SC) C) Evidence Act of 1989 D) Rule on Cybercrime Warrants (A.M. No. 17-11-03-SC) E) Rule on Electronic Evidence (A.M. No. 01-7-01-SC)
A) Limited only to physical seizure of hardware. B) Combines the authority to search, seize, and examine physical and digital evidence. C) Used exclusively for interception of live chats. D) Applies only to social media posts. E) Combines the authority to search, seize, and examine physical and digital evidence.
A) Adverse inference rule B) Plain view doctrine C) Fruit of the poisonous tree D) Exclusionary rule E) Plain view doctrine
A) First responder B) Evidence analyst C) Evidence originator D) First responder E) Evidence custodian
A) The reliability of the data source and integrity of the process used B) The volume of data stored C) The encryption software used D) The reliability of the data source and integrity of the process used E) The number of digital copies produced
A) Device encryption failure B) Remote wiping or alteration of data C) Delay in data extraction D) Increase in battery temperature E) Remote wiping or alteration of data
A) Translate binary codes to text B) Encrypt the data for security C) Verify that data has not been altered D) Compress the file for storage E) Verify that data has not been altered
A) It is optional if a warrant has been issued. B) It involves detection, containment, eradication, and recovery. C) It involves detection, containment, eradication, and recovery. D) It excludes coordination with service providers. E) It starts only after evidence collection.
A) WDCD B) WECD C) WICD D) WDCD E) WSSECD
A) Best evidence rule B) Best evidence rule C) Chain of custody rule D) Res gestae rule E) Plain view rule
A) Immediately prosecute the offender. B) Delete malicious data. C) Contain the incident while preserving evidence integrity. D) Disconnect all systems permanently. E) Contain the incident while preserving evidence integrity.
A) Chain of custody documentation B) Jurisdiction of the court C) Chain of custody documentation D) Admissibility under RA 10175 E) Authority of the warrant
A) Within one (1) year B) Within ten (10) days from issuance, unless extended by the court C) Within twenty (20) days D) Immediately and without limit E) Within ten (10) days from issuance, unless extended by the court
A) By submission of printed copies. B) By certification from the ISP. C) By digital signature or other security procedures proving identity. D) By digital signature or other security procedures proving identity. E) By oral testimony of a witness alone.
A) Warrant to Block Access B) Warrant to Disclose Computer Data C) Warrant to Intercept Computer Data D) Warrant to Delete Computer Data E) Warrant to Delete Computer Data
A) Certification by a foreign expert. B) Maintenance of chain of custody with documentation and signatures. C) Inclusion of suspect’s consent form. D) Maintenance of chain of custody with documentation and signatures. E) Submission of encrypted files only.
A) Automatically admissible if signed by investigator. B) Potential inadmissibility due to alteration risk. C) No consequence if warrant exists. D) Accepted as secondary evidence. E) Potential inadmissibility due to alteration risk.
A) Submitting the report within ten days. B) Seizing a USB found in plain view. C) Accessing unrelated folders outside the warrant’s scope. D) Accessing unrelated folders outside the warrant’s scope. E) Hashing all collected data.
A) Reliability, importance, and format B) Quantity, quality, and accessibility C) Consent, jurisdiction, and value D) Relevance, authenticity, and integrity E) Relevance, authenticity, and integrity
A) De minimis rule B) Exclusionary clause exception C) Fruit of the poisonous tree doctrine D) Plain view doctrine E) Fruit of the poisonous tree doctrine
A) The officer must photograph and label the gear but not seal it. B) The officer must establish a complete chain of custody to prevent tampering, ensuring evidentiary integrity. C) The officer must establish a complete chain of custody to prevent tampering, ensuring evidentiary integrity. D) Documentation is only required if the suspect confesses E) Documentation is optional if the gear is perishable.
A) Assess environmental impact to prioritize cases affecting marine ecosystems. B) Assess environmental impact to prioritize cases affecting marine ecosystems. C) Immediately arrest the violator without further evaluation D) Dismiss the case if the violator offers compensation. E) Transfer the case to a non-governmental organization.
A) BFAR provides technical expertise, improving evidence accuracy and case strength. B) Coordination only involves sharing suspect information. C) It delays the process by requiring additional approvals. D) Coordination is unnecessary as local officers handle all aspects. E) BFAR provides technical expertise, improving evidence accuracy and case strength.
A) The officer has no discretion; all evidence must be preserved B) Destruction is always mandatory to avoid spoilage. C) Preservation is preferred, but destruction is allowed with documentation to maintain chain of custody. D) Destruction requires court approval first. E) Preservation is preferred, but destruction is allowed with documentation to maintain chain of custody.
A) It allows indefinite delays for complex cases. B) The rule is flexible and not strictly enforced. C) It ensures timely evidence collection, preventing loss and upholding accountability. D) It ensures timely evidence collection, preventing loss and upholding accountability. E) The rule applies only to minor violations.
A) Assessment delays filing unnecessarily. B) It provides scientific basis, enhancing evidential weight and judicial outcomes. C) It is only for civil, not criminal, cases. D) Assessment is optional and not required for filing. E) It provides scientific basis, enhancing evidential weight and judicial outcomes.
A) It facilitates local cooperation, improving detection and resolution rates. B) Officials only witness arrests. C) It complicates procedures without benefits. D) Barangay involvement is mandatory for all cases. E) It facilitates local cooperation, improving detection and resolution rates.
A) It allows violators to correct behavior, balancing deterrence with rehabilitation. B) Notice delays prosecution indefinitely C) It allows violators to correct behavior, balancing deterrence with rehabilitation. D) It is mandatory for all violations without exceptions. E) Notice is issued only after arrest.
A) It streamlines evidence presentation, reducing court time and strengthening linkages. B) Consolidation only applies to civil penalties. C) It requires separate filings for each violation. D) Consolidation is prohibited to avoid complexity E) It streamlines evidence presentation, reducing court time and strengthening linkages.
A) It is handled solely by the court. B) Monitoring occurs only during trial. C) It involves follow-up inspections, deterring future violations through accountability. D) Monitoring is optional and not enforced. E) It involves follow-up inspections, deterring future violations through accountability.
A) DENR expertise ensures proper identification, enhancing case validity. B) Consultation only involves paperwork. C) It requires approval before any action. D) Consultation is optional for routine seizures. E) DENR expertise ensures proper identification, enhancing case validity.
A) It is unnecessary if the animal is alive. B) Visual evidence provides irrefutable proof, aiding in network disruption. C) Visual evidence provides irrefutable proof, aiding in network disruption. D) Documentation is limited to written reports E) Documentation delays seizure.
A) It complicates jurisdiction. B) Coordination leverages local knowledge, improving detection and resolution. C) PAMBs only approve permits. D) PAMBs have no role in enforcement. E) Coordination leverages local knowledge, improving detection and resolution
A) The rule is discretionary. B) It applies only to dead specimens. C) It prevents evidence degradation, ensuring timely prosecution. D) Filing can be delayed indefinitely E) It prevents evidence degradation, ensuring timely prosecution.
A) It establishes origin and illegality, strengthening culpability. B) It only identifies species. C) It establishes origin and illegality, strengthening culpability. D) Analysis is optional for common species E) Analysis requires court order first.
A) They provide resources, enhancing capacity but risking bias. B) Involvement is mandatory. C) NGOs only handle rehabilitation. D) NGOs are excluded from procedures. E) They provide resources, enhancing capacity but risking bias.
A) Rehabilitation is not required. B) It delays prosecution. C) It ensures animal welfare, potentially influencing plea deals. D) It ensures animal welfare, potentially influencing plea deals. E) Rehabilitation is separate from filing.
A) Impact assessment tailors penalties, deterring severe violations. B) Impact assessment tailors penalties, deterring severe violations. C) Assessment is post-trial D) Penalties are fixed. E) It only considers economic loss
A) Custody is court-managed B) Custody is informal C) It applies only to live animals D) Strict documentation maintains evidence reliability E) Strict documentation maintains evidence reliability
A) Joint cases are rare B) Joint filing is prohibited C) It complicates jurisdiction D) It pools resources, improving transnational enforcement E) It pools resources, improving transnational enforcement
A) It provides representative evidence, strengthening cases B) It only identifies waste types C) It provides representative evidence, strengthening cases D) Sampling is unnecessary E) Sampling requires lab approval
A) Notice is issued post-arrest B) It promotes compliance, reducing litigation C) Notice is punitive D) It promotes compliance, reducing litigation E) It is mandatory for all cases.
A) Coordination ensures local implementation, improving outcomes B) LGUs only issue permits. C) Coordination ensures local implementation, improving outcomes D) LGUs have no role E) It creates overlaps
A) Reporting can be delayed B) It applies to minor issues only C) It ensures prompt action, maintaining integrity D) It ensures prompt action, maintaining integrity E) The rule is flexible
A) Documentation is minimal B) Detailed records ensure evidentiary strength C) Seizure requires court order D) Documentation is post-seizure E) Detailed records ensure evidentiary strength
A) Monitoring delays filing. B) It detects violations early, aiding prevention C) It detects violations early, aiding prevention D) It is court-ordered E) Monitoring is optional
A) It complicates procedures B) Generators are not involved C) Generators only pay fines D) Involvement encourages responsibility, resolving issues E) Involvement encourages responsibility, resolving issues
A) Custody is lab-managed B) It applies to non-hazardous waste only C) Strict tracking prevents contamination D) Strict tracking prevents contamination E) Custody is informal
A) Protocol establishes violations, strengthening cases B) Inspections are random C) They delay transport D) Protocol establishes violations, strengthening cases E) Inspections require permits
A) It ensures sustained compliance B) It is handled by courts C) It ensures sustained compliance D) Monitoring occurs during trial E) Monitoring is not required
A) Exigent circumstances justify warrantless seizure if evidence is at risk of destruction B) Exigent circumstances justify warrantless seizure if evidence is at risk of destruction C) Consent of the suspect is implied during cybercrime operations D) Warrant is unnecessary for digital evidence E) The officer’s authority under RA 10175 supersedes all other laws
A) Warrant to Examine Computer Data (WECD) B) Warrant to Disclose Computer Data (WDCD) C) Warrant to Search, Seize, and Examine Computer Data (WSSECD) D) Warrant to Intercept Computer Data (WICD) E) Warrant to Disclose Computer Data (WDCD)
A) Proper labeling and sealing of the storage device B) Proper labeling and sealing of the storage device C) Presentation by the arresting officer D) Use of the latest antivirus software E) Electronic signature by the prosecutor
A) WECD is issued only by the DOJ; WICD is issued by courts B) WICD applies to physical devices; WECD applies to social media accounts C) WICD involves real-time data interception; WECD involves stored data examination. D) WICD involves real-time data interception; WECD involves stored data examination. E) Both are identical under RA 10175
A) Failure to decrypt the files B) Improper use of forensic imaging tools C) Improper use of forensic imaging tools D) Lack of data backup E) Absence of a search warrant
A) Rule on Electronic Evidence (A.M. No. 01-7-01-SC) B) Rule on Electronic Evidence (A.M. No. 01-7-01-SC) C) Rule on Cybercrime Warrants (A.M. No. 17-11-03-SC) D) Rule 115, Rules of Criminal Procedure E) Evidence Act of 1989
A) Combines the authority to search, seize, and examine physical and digital evidence. B) Limited only to physical seizure of hardware C) Applies only to social media posts D) Used exclusively for interception of live chats E) Combines the authority to search, seize, and examine physical and digital evidence.
A) Exclusionary rule B) Fruit of the poisonous tree C) Plain view doctrine D) Adverse inference rule E) Plain view doctrine
A) Evidence analyst B) First responder C) Evidence originator D) Evidence custodian E) First responder
A) The reliability of the data source and integrity of the process used B) The number of digital copies produced C) The reliability of the data source and integrity of the process used D) The encryption software used E) The volume of data stored
A) Increase in battery temperature B) Remote wiping or alteration of data C) Device encryption failure D) Remote wiping or alteration of data E) Delay in data extraction
A) Translate binary codes to text B) Verify that data has not been altered C) Encrypt the data for security D) Compress the file for storage E) Verify that data has not been altered
A) It is optional if a warrant has been issued B) It starts only after evidence collection C) It involves detection, containment, eradication, and recovery D) It involves detection, containment, eradication, and recovery E) It excludes coordination with service providers
A) WECD B) WICD C) WDCD D) WDCD E) WSSECD
A) Plain view rule B) Best evidence rule C) Best evidence rule D) Chain of custody rule E) Res gestae rule
A) Contain the incident while preserving evidence integrity. B) Disconnect all systems permanently C) Contain the incident while preserving evidence integrity. D) Delete malicious data E) Immediately prosecute the offender
A) Chain of custody documentation B) Jurisdiction of the court C) Authority of the warrant D) Chain of custody documentation E) Admissibility under RA 10175
A) Within twenty (20) days B) Immediately and without limit C) Within ten (10) days from issuance, unless extended by the court D) Within one (1) year E) Within ten (10) days from issuance, unless extended by the court
A) By submission of printed copies B) By digital signature or other security procedures proving identity C) By oral testimony of a witness alone D) By digital signature or other security procedures proving identity E) By certification from the ISP
A) Warrant to Delete Computer Data B) Warrant to Block Access C) Warrant to Disclose Computer Data D) Warrant to Delete Computer Data E) Warrant to Intercept Computer Data |