A) Harvesting seaweed manually B) Fishing with a net in an inland pond C) Collecting shells from the beach during low tide D) Using a simple hook and line to catch fish in a marine sanctuary
A) Feeding birds in public parks B) Breeding native geckos in a private residence for personal observation C) Rescuing a critically endangered animal and transferring it to a private zoo without coordination with DENR D) Documenting wild deer in a nature reserve
A) Dumping segregated biodegradable waste on a private lot without an environmental clearance B) Donating recyclables to a junk shop C) Burning leaves in a compost pit D) Using paper bags instead of plastic
A) Absence of a business permit alone B) Presence of smoke but no scientific data C) Violation of National Ambient Air Quality Standards through documented emissions D) Personal belief that air quality is poor
A) Submitting quarterly self-monitoring reports B) Discharging effluents within the allowable limits C) Failing to report a chemical spill that flowed into a nearby creek D) Treating wastewater on-site before discharge
A) A confiscated live specimen with transport documents lacking perinits B) A witness testimony from a third-party observer C) A social media post showing wildlife photos D) Verbal confession without supporting physical evidence
A) Separating garbage in color-coded bins B) Storing recyclables in a warehouse with LGU permission C) Partnering with a certified private hauler for waste disposal D) Openly dumping untreated hospital waste along a riverbank
A) RA 9147- Wildlife Act B) RA 9275-Philippine Clean Water Act C) RA 8550 Fisheries Code D) RA 9003-Solid Waste Management Act
A) A violation of RA 9003 for coastal solid waste issues B) legal act under the Clean Water Act C) A civil offense only under local ordinances D) A violation of RA 8550 due to intrusion and unauthorized fishing gear use
A) Testimony of a resident who smelled fumes B) Environmental Compliance Certificate (ECC) on record C) Technical data proving emission limits were exceeded and failure failure to act despite notice D) Business registration of the offending com
A) specialized appellate courts B) municipal trial courts C) designated regional trial courts D) specialized cybercrime
A) 10 days B) 5 days C) 15 days D) 30 days
A) designated cybercrime court with jurisdiction B) Supreme Court C) Municipal Trial Courts D) Office of the Ombudsman
A) Republic Act No. 10175 B) Presidential Decree No. 1829 C) Republic Act No. 8484 D) Republic Act No. 4200
A) 12 months from the date of the transaction B) 6 mouths from the date of receipt of the order C) 6 months from the date of the transaction D) 12 months from the date of receipt of the order
A) within 72 hours of receiving the order B) within 48 hours of the incident C) upon receipt of complaint D) at their own discretion
A) 45 days B) 30 days C) 15 days D) 20 days
A) to seek judicial approval for the interception B) to request further investigation C) to provide evidence for the court D) to inform the defendant of the activities
A) listening to electronic communications B) examining data from a lawful arrest C) intercepting real-time data transfers D) searching a specific location for items to be seized and/or examined
A) . Warrant to Search, Seize and Examine Computer Data B) Warrant to Intercept Computer Data C) Warrant to Disclose Computer Data D) Warrant to Examine Computer Data
A) human witnesses' accounts B) psychological profiling C) physical evidence left unconsciously D) emotions and stress
A) engagement of digital forensic exarniner B) immediate disconnection of devices C) identification of potential evidence D) physical search of the area
A) Inform the OIC of its presence B) Conduct a "bag and tag" procedure C) Immediately turn it on to assess content. D) Disconnect the internet for security
A) Telecommunications and Communications B) Tactical Operations Center C) Technology and Online Crime D) Technical Offense Control
A) The power supply is disconnected B) A warrant has been issued C) An expert is consulted D) They are free from malware
A) Remove the power supply B) Leave it off to avoid altering evidence C) Turn it off on briefly for documentation D) Conduct a thorough examination
A) Verify installation of anti-forensic systems B) Pull the power cable or remove the battery. C) Proceed with forensic analysis right away D) Disconnect from all networks immediately.
A) Consult the suspect for access codes B) Initiate immediate forensic analysis C) Avoid turning it on until processed with guarantees D) Promptly turn it on for data retrieval
A) Checking for encryption systems. B) Switching device off without proper authorization. C) Moving equipment that is operational. D) Documenting incidents arising during copying of document
A) authentication by the judge B) presentation by the prosecutor C) sworn statement by a competent person D) testimony by a witness
A) the court clerk B) the prosecutor C) the judge D) the person who made the recording
A) It should be explained by the defense attorney B) It should be presented only to the prosecutor. C) It should be not displayed in court. D) it must be shown, identified, and authenticated by competent person.
A) by testifying the accuracy by the defense lawyer B) by submitting it directly to the court clerk C) by the testimony of someone involved or with personal knowledge D) by presenting the evidence to the judge
A) manner of storage B) reliability of the originator C) manner of generation D) name of the investigator |