A) Fishing with a net in an inland pond B) Collecting shells from the beach during low tide C) Harvesting seaweed manually D) Using a simple hook and line to catch fish in a marine sanctuary
A) Documenting wild deer in a nature reserve B) Rescuing a critically endangered animal and transferring it to a private zoo without coordination with DENR C) Feeding birds in public parks D) Breeding native geckos in a private residence for personal observation
A) Using paper bags instead of plastic B) Dumping segregated biodegradable waste on a private lot without an environmental clearance C) Donating recyclables to a junk shop D) Burning leaves in a compost pit
A) Personal belief that air quality is poor B) Absence of a business permit alone C) Presence of smoke but no scientific data D) Violation of National Ambient Air Quality Standards through documented emissions
A) Treating wastewater on-site before discharge B) Submitting quarterly self-monitoring reports C) Failing to report a chemical spill that flowed into a nearby creek D) Discharging effluents within the allowable limits
A) A witness testimony from a third-party observer B) A social media post showing wildlife photos C) A confiscated live specimen with transport documents lacking perinits D) Verbal confession without supporting physical evidence
A) Partnering with a certified private hauler for waste disposal B) Storing recyclables in a warehouse with LGU permission C) Openly dumping untreated hospital waste along a riverbank D) Separating garbage in color-coded bins
A) RA 8550 Fisheries Code B) RA 9275-Philippine Clean Water Act C) RA 9003-Solid Waste Management Act D) RA 9147- Wildlife Act
A) A violation of RA 8550 due to intrusion and unauthorized fishing gear use B) legal act under the Clean Water Act C) A violation of RA 9003 for coastal solid waste issues D) A civil offense only under local ordinances
A) Environmental Compliance Certificate (ECC) on record B) Testimony of a resident who smelled fumes C) Technical data proving emission limits were exceeded and failure failure to act despite notice D) Business registration of the offending com
A) specialized appellate courts B) specialized cybercrime C) municipal trial courts D) designated regional trial courts
A) 10 days B) 5 days C) 15 days D) 30 days
A) Supreme Court B) Municipal Trial Courts C) designated cybercrime court with jurisdiction D) Office of the Ombudsman
A) Presidential Decree No. 1829 B) Republic Act No. 10175 C) Republic Act No. 8484 D) Republic Act No. 4200
A) 12 months from the date of the transaction B) 12 months from the date of receipt of the order C) 6 months from the date of the transaction D) 6 mouths from the date of receipt of the order
A) at their own discretion B) within 72 hours of receiving the order C) within 48 hours of the incident D) upon receipt of complaint
A) 30 days B) 45 days C) 20 days D) 15 days
A) to provide evidence for the court B) to request further investigation C) to inform the defendant of the activities D) to seek judicial approval for the interception
A) listening to electronic communications B) examining data from a lawful arrest C) searching a specific location for items to be seized and/or examined D) intercepting real-time data transfers
A) Warrant to Intercept Computer Data B) Warrant to Disclose Computer Data C) Warrant to Examine Computer Data D) . Warrant to Search, Seize and Examine Computer Data
A) human witnesses' accounts B) physical evidence left unconsciously C) emotions and stress D) psychological profiling
A) immediate disconnection of devices B) physical search of the area C) identification of potential evidence D) engagement of digital forensic exarniner
A) Conduct a "bag and tag" procedure B) Immediately turn it on to assess content. C) Disconnect the internet for security D) Inform the OIC of its presence
A) Technology and Online Crime B) Tactical Operations Center C) Technical Offense Control D) Telecommunications and Communications
A) The power supply is disconnected B) A warrant has been issued C) An expert is consulted D) They are free from malware
A) Conduct a thorough examination B) Remove the power supply C) Leave it off to avoid altering evidence D) Turn it off on briefly for documentation
A) Verify installation of anti-forensic systems B) Proceed with forensic analysis right away C) Pull the power cable or remove the battery. D) Disconnect from all networks immediately.
A) Promptly turn it on for data retrieval B) Avoid turning it on until processed with guarantees C) Consult the suspect for access codes D) Initiate immediate forensic analysis
A) Documenting incidents arising during copying of document B) Checking for encryption systems. C) Switching device off without proper authorization. D) Moving equipment that is operational.
A) sworn statement by a competent person B) presentation by the prosecutor C) testimony by a witness D) authentication by the judge
A) the judge B) the prosecutor C) the court clerk D) the person who made the recording
A) It should be not displayed in court. B) it must be shown, identified, and authenticated by competent person. C) It should be explained by the defense attorney D) It should be presented only to the prosecutor.
A) by submitting it directly to the court clerk B) by presenting the evidence to the judge C) by the testimony of someone involved or with personal knowledge D) by testifying the accuracy by the defense lawyer
A) name of the investigator B) manner of storage C) reliability of the originator D) manner of generation |