A) Unauthorized access to personal data B) Informing data subjects of their rights C) Requesting consent before data processing D) Secure data storage practices
A) Updating operating systems regularly B) Intentional or reckless alteration or damaging of computer data C) Installing antivirus software D) Sending emails to consenting recipients
A) Using eco-friendly fishing gear B) Registering fishing vessels properly C) Reporting daily catch accurately D) Unauthorized fishing in protected bays
A) Participating in authorized wildlife conservation B) Hunting endangered species without a permit C) Observing protected species from a distance D) Reporting wildlife sightings responsibly
A) Open burning of solid waste B) Proper segregation of recyclable materials C) Composting biodegradable waste at home D) Using eco-friendly trash bins
A) Reporting air emissions regularly B) Using approved air pollution control devices C) Operating emission-intensive business without clearance D) Conducting regular equipment maintenance
A) Discharging untreated wastewater into bodies of water B) Filing water quality reports on time C) Participating in river clean-up drives D) Treating wastewater before discharge
A) Allowing access to authorized personnel only B) Encrypting personal data C) Conducting data protection impact assessments D) Using data beyond the scope of consent
A) Selling software designed to commit cybercrimes B) Reporting discovered vulnerabilities C) Regular software updates D) Deploying legitimate software for business operations
A) Avoiding endangered species catch B) Obtaining fishing licenses C) Fishing during closed seasons D) Complying with catch limits
A) Protecting breeding sites B) Dumping waste in critical habitats C) Monitoring habitats for research D) Educating communities about wildlife
A) Providing recycling education B) Using designated garbage collection days C) Segregating waste at source D) Mixing recyclable materials with general waste
A) Conducting ambient air quality monitoring B) Using outdated or non-compliant pollution control technology C) Installing modern scrubbers D) Emitting controlled levels of pollutant
A) Adhering to effluent standards B) Failing to submit water quality reports as require C) Participating in water conservation programs D) Installing treatment facilities
A) Informing data subjects about data use B) Unauthorized disclosure of personal information C) Sharing aggregate, anonymized data D) Using data encryption method
A) Protecting online accounts with strong passwords B) Creating personal social media profiles C) Using someone’s identity without consent to commit fraud D) Reporting suspected identity theft promptly
A) Inspecting fishing equipment regularly B) Use of illegal fishing nets and explosives C) Use of registered gear as per regulations D) Using fish aggregating devices legally
A) Promoting legal wildlife tourism B) Licensing of wildlife handlers C) Trading products made from protected species without permit D) Participating in wildlife rescue operations
A) Reporting landfill operations to authorities B) Encouraging waste recycling C) Using controlled disposal facilities D) Establishing or operating open dumpsites
A) eeking clearance for emission source B) Falsifying emission test results C) Reporting emissions accurately D) Maintaining pollution control devices
A) Performing scheduled water sampling B) Refusing to designate pollution control officers when required C) Submitting monitoring data timely D) Training designated pollution control officers
A) Informing affected individuals B) Strengthening cybersecurity measures C) Reporting breaches to authorities promptly D) Concealing security breaches involving personal data
A) Posting respectful comments B) Reporting cybercrime cases C) Sending threatening or harassing messages online D) Blocking abusive users
A) Collecting or harvesting fry or fingerlings without permit B) Implementing sustainable fishing practices C) Protecting breeding grounds D) Reporting breeding activities
A) Reporting illegal dumping sightings B) Dumping waste detrimental to wildlife habitats C) Promoting community clean-up drives D) Participating in habitat restoration projects
A) Squatting in open dumpsites or landfills B) Using authorized waste disposal services C) Composting biodegradable waste D) Segregating waste properly
A) Maintaining emission-controlling technologies B) Monitoring air quality regularly C) Emitting concentrations of pollutants above permissible limits D) Reporting emissions to environmental agencies
A) Routine water quality testing B) Regular maintenance of water supply systems C) Reporting contamination events D) Tampering with water quality by unauthorized booster pump use
A) Reporting truthful data breaches B) Notifying authorities of violations C) Knowingly sharing false or unwarranted personal information D) Securing personal data with encryption
A) Installing security patches B) Performing authorized system maintenance C) Intentionally causing interruption or damage to computer systems D) Monitoring system performance
A) Reporting fish catch data B) Employing legal fishing gear C) Following catch quotas D) Using explosives or poison for fishing
A) Rescue and protection activities B) Inflicting injury that cripples or impairs reproductive systems C) Rehabilitation of injured wildlife D) Legal scientific research involving wildlife
A) Unauthorized removal of recyclable materials B) Selling recyclable materials to authorized collectors C) Proper disposal of hazardous waste D) Segregation of recyclables at source
A) Operating without required environmental clearance B) Using clean technologies C) Implementing pollution prevention measures D) Submitting air pollution control reports
A) Timely submission of monitoring data B) Accurate recordkeeping C) Refusal to submit reports as required D) Cooperation with environmental agencies
A) Securing data storage facilities B) Notifying breaches promptly C) Processing personal data without data subject consent D) Informing data subjects about purposes of data processing
A) Creating original domain name B) Using domains legally obtained C) Reporting registered domains D) Registering domain names to profit from trademarks
A) Using approved fishing methods B) Abstaining from fishing in closed seasons C) Reporting vessel positions accurately D) Fishing without valid licenses
A) Controlled landfill operations B) Removing garbage from protected areas C) Removing waste responsibly D) Dumping of toxic waste into wildlife habitats
A) Controlled incineration in compliant facilities B) Burning solid waste in open areas without control C) Recycling of plastics D) Composting organic waste
A) To detain suspects without trial B) To approve business use of the internet C) To authorize law enforcement to search and seize digital devices D) To prohibit use of technology in investigations
A) Identification and logging of the incident B) Shutting down the entire network permanently C) Ignoring the incident if no damage is visible D) Immediately deleting all data on the system
A) Logging out all users immediately B) Simply turning off the device without documentation C) The device or storage medium without altering data D) Using software to modify evidence before seizing
A) Downloading data to personal devices without logging B) Documenting the chain of custody and using write-blockers C) Allowing unauthorized personnel access D) Powering on the device repeatedly before seizing
A) Proper collection, preservation, and expert testimony on handling B) Evidence collected without warrant C) Evidence altered for clarity D) Data shared freely on social media
A) Until the search or seizure is completed or as specified in the warrant B) For one year regardless of activity C) For 24 hours only regardless of process D) Indefinitely until the investigation ends
A) Isolating affected systems B) Changing passwords or deleting logs before documentation C) Communicating with key stakeholders D) Monitoring ongoing attacks
A) It deletes unnecessary files B) It encrypts the data automatically C) It prevents alteration of the original data D) It speeds up data transfer
A) At any time during the investigation B) After data is copied to another device C) Before disconnecting or moving any devices D) After logging into the system
A) External vendors only B) Law enforcement only after the fact C) Any available staff member D) The designated incident response team or officer
A) To encrypt evidence B) To allow free access to evidence to many personnel C) To speed up the investigation process D) To prove evidence has not been tampered with or altered
A) Just general suspicion without specifics B) Description of the places, persons, or objects to be searched or seized C) A verbal request without documentation D) Only the name of the suspect
A) Backups stored off-site B) Archived email data C) Data that can be lost quickly such as RAM contents or running processes D) Data that is permanently stored on a hard drive
A) Whenever requested by a third party B) Only during exigent circumstances with probable cause C) Under general suspicion of a crime D) Whenever law enforcement arrives at the scene
A) Ordinary text editors B) Social media platforms C) Manual paperwork only D) Network traffic analyzers and forensic software
A) Left attached to the device without documentation B) Taken by unauthorized personnel for analysis C) Copied multiple times without authorization D) Removed safely and stored in anti-static bags with proper labeling
A) Republic Act 10175 B) Philippine Clean Air Act C) Data Privacy Act only D) The Philippine Fisheries Code
A) Popularity online B) If it is published on social media C) Authenticity, relevancy, and proper handling D) If it supports the prosecution only
A) Deleting non-relevant files B) Leaving devices unattended C) Using secure, tamper-evident packaging and documentation D) Sending via regular mail without labeling
A) To ignore non-digital evidence B) To act as legal counsel C) To coordinate evidence collection, incident analysis, and reporting D) To prosecute suspects
A) Only government agencies B) Only private individuals with affected property C) Only the Department of Environment and Natural Resources (DENR) D) Any real party in interest, including citizens and organizations
A) A verbal notice only B) An informal letter C) A copy of the complaint D) No need to notify before filing
A) Environmental NGOs B) Local Barangay Hall C) Municipal Treasury Office D) Provincial Prosecutor’s Office
A) The accused party immediately surrenders B) The government automatically dismisses the case C) The complainant must pay a fine D) The court assigns the case by raffle
A) A permit for polluters to continue operations B) An order issued to prevent or stop environmental damage pending case resolution C) A certification of environmental compliance D) A permanent ban on all construction activities
A) Thirty (30) days B) No specific time limit C) Ten (10) days, non-extendable D) Five (5) days
A) Local Police Department B) Department of Environment and Natural Resources (DENR) C) Department of Agriculture only D) Department of Tourism
A) Illegal wildlife trading B) Violations related to solid waste management and illegal dumping C) Air pollution violations D) Water pollution complaints
A) Only environmental organizations B) Only government personnel C) Any person affected or on behalf of public interest D) Polluting companies themselves
A) Department of Health B) Department of Agriculture C) Local government units only D) Department of Environment and Natural Resources (DENR), through the Environmental Management Bureau (EMB)
A) Only opinion letters B) Sufficient factual and legal basis in the complaint C) Verbal complaints without documentation D) Consent of the accused party
A) A default judgment may be issued B) The case is dismissed automatically C) The case is transferred to a different court D) The complaint is returned to the complainant
A) No hearing required for environmental cases B) Hearing scheduled based on court availability only C) Scheduled after one year D) Priority hearing within 60 days
A) Secret evidence gathering B) Ocular inspections and production of documents C) No discovery tools allowed D) Only written interrogatories
A) Arrest the offender B) Conduct an investigation C) File a complaint with the Bureau of Fisheries and Aquatic Resources (BFAR) D) Issue a notice of violation
A) Private citizens B) Department of Environment and Natural Resources (DENR) C) Barangay officials D) Philippine National Police only
A) Proof of payment for fees B) List of hazardous waste C) Affidavit of complaint detailing the violation D) Waste disposal plan only
A) Department of Health B) Environmental Management Bureau (EMB) C) Barangay captain D) Local police station
A) Water utility companies only B) Any individual or group C) Government agencies only D) Local government units only
A) Conduct formal investigations B) Receive complaints initially and forward to proper agencies C) Prosecute cases D) No role
A) List of fishing vessels B) Approved fishing seasons C) Description of illegal fishing activity D) Names of community members
A) No specified period but timely action is required B) 1 month C) 6 months D) 1 week
A) Proof of injury B) Community consultation C) Payment of fees D) Prior notice to violator
A) NGOs only B) DENR and PNP C) Only DENR D) Local governments only
A) Appeal or refile with additional evidence B) File suit directly C) Do nothing D) Report to mayor
A) Air pollution B) Noise pollution C) Illegal logging D) Unauthorized waste dumping into water bodies
A) Release of violator B) Public announcement C) Community campaign D) Court hearing and resolution
A) Yes, by filing in barangay B) No, agency involvement is mandatory C) Yes, with NGOs only D) Yes, directly in court
A) Immediate closure without hearing B) Community cleanup C) Administrative charges and penalties D) Fine only
A) 1 year B) No limitation, but prompt filing advised C) 6 months D) 3 months
A) No affidavit required B) Species list only C) Details of incident and involved persons D) Proof of ownership
A) No verification B) Statements only C) Public hearings D) Laboratory tests and field inspections
A) Coordination with DENR and EMB B) None C) Awareness only D) Main enforcement agency
A) Community service B) License revocation only C) Imprisonment and fines D) Warning only
A) Bureau of Fisheries only B) Local government only C) Private investigators D) DENR with other agencies
A) Barangay hall B) Environmental Court or regular courts C) Police station D) DENR regional office
A) Accusation alone B) Confiscated wildlife or evidence linking accused C) Verbal complaint only D) Witnesses only
A) RA 9147 B) RA 9275 C) RA 9003 D) RA 8749
A) PNP B) Bureau of Fisheries C) Environmental Management Bureau (EMB) D) Barangay councils
A) Formal complaint or affidavit stating the violation B) Community petition C) Certificate of environmental compliance D) Government clearance |