A) Sharing personal information of clients without consent B) Creating a privacy policy for a company C) Encrypting sensitive customer data D) Archiving old company records securely
A) Installing anti-virus software B) Using secure passwords for accounts C) Updating software regularly D) Sending spam emails with malicious links
A) RA 9275 – Philippine Clean Water Act B) RA 8749 – Clean Air Act C) RA 9003 – Solid Waste Management Act D) RA 9147 – Wildlife Act
A) RA 8749 B) RA 9003 C) RA 9147 D) RA 10175
A) Releasing fingerlings into a river B) Using dynamite for fishing C) Observing closed fishing season D) Practicing sustainable aquaculture
A) RA 9275 B) RA 8749 C) RA 10173 D) RA 9003
A) RA 9275 B) RA 8749 C) RA 9147 D) .RA 9003
A) RA 10173 B) RA 10175 C) RA 9003 D) RA 9275
A) RA 9275 B) RA 9003 C) Philippine Fisheries Code of 1998 D) RA 9147
A) RA 9003 B) RA 9147 C) RA 9275 D) RA 8749
A) RA 10173 B) RA 9003 C) RA 8749 D) RA 9275
A) RA 9147 B) RA 9003 C) RA 10175 D) RA 10173
A) RA 9147 B) RA 8749 C) RA 9003 D) RA 9275
A) RA 9003 B) RA 8749 C) RA 9275 D) RA 9147
A) Philippine Fisheries Code of 1998 B) RA 8749 C) RA 9003 D) RA 9147
A) RA 10173 B) RA 8749 C) RA 9275 D) RA 9003
A) RA 9275 B) RA 10173 C) RA 8749 D) RA 10175
A) RA 9003 B) RA 9275 C) RA 9147 D) RA 8749
A) RA 9275 B) RA 9003 C) RA 9147 D) RA 8749
A) RA 10173 B) RA 9003 C) RA 10175 D) RA 8749
A) RA 9275 B) RA 9147 C) RA 9003 D) Philippine Fisheries Code of 1998
A) RA 8749 B) RA 9003 C) RA 10173 D) RA 9275
A) RA 9147 B) RA 9003 C) RA 9275 D) RA 8749
A) RA 10175 B) RA 10173 C) RA 8749 D) RA 9003
A) RA 9003 B) RA 9275 C) RA 8749 D) RA 9147
A) RA 8749 B) RA 9275 C) RA 9003 D) RA 9147
A) RA 8749 B) RA 9003 C) RA 10175 D) RA 10173
A) RA 9147 B) RA 9275 C) RA 9003 D) RA 8749
A) RA 9275 B) RA 9147 C) RA 8749 D) RA 9003
A) RA 9275 B) RA 8749 C) RA 10173 D) RA 9003
A) RA 8749 B) RA 9003 C) Philippine Fisheries Code of 1998 D) RA 9147
A) To authorize the seizure or inspection of digital devices and data B) To punish suspects before trial C) To allow law enforcement to monitor email accounts indefinitely D) To publicly announce the investigation
A) A judge of competent jurisdiction B) Any law enforcement officer C) Barangay Captain D) Any government agency head
A) CCTV footage stored on a cloud server B) Written confession C) Blood sample D) Fingerprints
A) Make a copy for personal use B) Post about it on social media C) Disconnect the device from all networks D) Immediately open files for inspection
A) Miranda rights B) Procedural fairness C) Chain of custody D) Habeas corpus
A) To maintain accurate records for admissibility in court B) To intimidate suspects C) To create reports for training purposes only D) To justify the investigator’s presence
A) Altering file timestamps without documentation B) Using write-blockers to copy data C) Photographing hardware before seizure D) Recording serial numbers of devices
A) Evidence must be published online B) Evidence must be obtained legally and integrity preserved C) Evidence must be analyzed within 24 hours D) Evidence must be from a government server
A) Erasure of all logs B) Recovery C) Identification D) Containment
A) To delete malicious files permanently B) To speed up the investigation C) To allow analysis without altering the original device D) To install new software
A) Ignore jurisdictional issues B) Share credentials with third parties C) Access the data through personal accounts D) Obtain legal authorization to access the data
A) Notify media outlets B) Arrest the suspect immediately C) Disconnect all company systems permanently D) Identify and contain the threat
A) To permanently delete files B) To accelerate data transmission C) To encrypt the hard drive D) To prevent modification of original evidence
A) To search and seize evidence of cybercrime B) To monitor all internet activity without probable cause C) To perform routine maintenance on someone’s computer D) To impose fines on suspected hackers
A) To make the process faster B) To maintain chain of custody and evidence integrity C) To sell items later D) To reduce paperwork
A) Names of witnesses only B) Investigator’s personal opinion C) Details of the alleged offense and description of the device or data to be seized D) Market value of the seized devices
A) Printed documents B) RAM (Random Access Memory) contents C) Archived emails D) Hard drive files
A) Affidavit of complaint B) Chain of custody C) Incident report D) Police blotter
A) To make shipping cheaper B) To ensure suspect cooperation C) To display in court as visual proof D) To prevent unauthorized access or physical damage
A) Erase old logs B) Publicize the attack online C) Establish roles and responsibilities D) Share credentials with third parties
A) Minimizing disruption to non-involved systems during seizure B) Confiscating all digital devices in a location C) Arresting as many suspects as possible D) Using force to access encrypted data
A) Internet publication of the evidence B) Investigator’s personal judgment C) Suspect’s admission only D) Chain of custody and proper collection procedures
A) Disconnecting affected systems from the network B) Shutting down unrelated computers randomly C) Deleting suspicious files immediately D) Ignoring minor system alerts
A) Let it remain on and connected to Wi-Fi B) Power it off and remove the SIM and memory card if possible C) Return the phone to the owner after copying files casually D) Access messages immediately
A) Deleting irrelevant files before analysis B) Encryption, documentation, and controlled access C) Using personal USB drives D) Public sharing of all files
A) Wiretap/interception order B) Search and seizure warrant C) Arrest warrant D) Summons
A) Restore systems to normal operation securely B) Share confidential data externally C) Disconnect from all communication permanently D) Delete logs to hide evidence
A) To prevent tampering and environmental damage B) To impress court officials C) To reduce storage costs D) To allow unrestricted access
A) Preparing systems to enable rapid and effective investigation when incidents occur B) Sharing passwords among staff C) Avoiding logging all activities D) Ensuring all files are deleted automatically
A) Using personal analysis tools without documentation B) Presenting files in any order C) Demonstrating that collection followed legal procedures and integrity was preserved D) Altering timestamps for clarity
A) Conducting a public hearing B) Filing a complaint with the Philippine National Police or BFAR C) Arresting the suspect immediately D) Imposing fines directly
A) Bureau of Fisheries and Aquatic Resources (BFAR) B) Civil Society Organizations C) Department of Environment and Natural Resources (DENR) only D) Arresting the suspect immediately
A) Suspect’s verbal admission only B) News reports of the incident C) Physical evidence, witness statements, and official inspection reports D) Witness testimony only
A) Barangay Resolution B) Warrant of Arrest C) Certification of Fisheries Permit D) Complaint-Affidavit
A) Department of Justice B) Regional Trial Court C) Barangay Council D) Municipal Trial Court
A) Submit a complaint to the DENR Wildlife Management Bureau B) Notify the local police only C) Wait for media coverage D) Capture the suspected poacher first
A) Personal assumptions B) Animal carcass, photographs, or seizure receipts C) Anonymous letters D) Newspaper clippings
A) Only non-government organizations B) Only Barangay Captains C) Only government officers D) Any person with personal knowledge of the violation
A) Issuance of a cease and desist order B) Public demonstration C) Filing of a verified complaint with supporting evidence D) Mediation between parties
A) RA 8749 B) RA 9147 C) RA 9003 D) RA 9275
A) Filing a written complaint with the LGU’s Environmental Office B) Issuing a summons directly C) Posting a notice on social media D) Conducting a clean-up drive
A) Photos of improper dumping, witness affidavits, inspection reports B) Social media posts without verification C) Personal opinion D) Verbal complaints only
A) Barangay Environmental Officer B) Bureau of Fire Protection C) Department of Health D) Court of Appeals
A) Sworn complaint specifying violation B) Environmental Impact Statement C) Community approval D) Mayor’s verbal order
A) Supreme Court B) National Bureau of Investigation (NBI) C) Department of Interior and Local Government (DILG) D) Local Government Unit (LGU) or municipal/city courts
A) Filing a complaint with the DENR or LGU B) Informing the media C) Conducting an ambient air quality test D) Issuing a cease and desist order
A) Philippine Coast Guard B) Local Barangay Council C) Bureau of Fire Protection D) Department of Environment and Natural Resources (DENR)
A) Police blotter B) News article C) Public notice D) Written and verified complaint with evidence
A) Only DENR officers B) Only environmental NGOs C) Only the mayor D) Any person with knowledge of the violation
A) Hearsay statements only B) Emission monitoring results, photos, official inspection reports C) Social media posts D) Personal opinion
A) Written complaint to DENR or LGU detailing the violation B) Direct action against polluters C) Posting flyers in the affected area D) Letter to the President
A) Bureau of Fisheries B) Civil Society Organizations C) Department of Environment and Natural Resources D) Department of Agriculture
A) Personal opinion B) Newspaper articles C) Water sampling results, photos, witness affidavits D) Community rumor
A) Wait for media coverage B) Include only verbal statements C) Identify the violator and the act committed D) Describe the color of the water only
A) Barangay Tanod B) DENR or LGU offices with jurisdiction C) Local Police only D) Philippine Navy
A) Initiate investigation and legal proceedings B) Collect donations for the case C) Publicize the violation D) Evict the violator immediately
A) Direct execution of fines by complainant B) Public protest C) Media announcement D) Written complaint with supporting evidence
A) Any person with knowledge of violation may file B) Only government officers can file complaints C) Filing is optional if evidence exists D) Only the mayor can authorize filing
A) Conduct inspection or gather evidence B) Impose fines without trial C) Immediately arrest the violator D) Publish on social media
A) Private counsel or government prosecutor B) Random citizens C) Media personnel D) Only the complainant personally
A) Blotter is evidence in court; complaint is optional B) Blotter is filed only by NGOs C) Blotter is filed after verdict; complaint is filed after media report D) Blotter records the incident; complaint initiates prosecution
A) Petition signed by friends B) Social media post C) Sworn statement under oath D) Verbal notice to neighbor
A) Receive complaints and conduct preliminary investigation B) Issue fishing licenses only C) Publish complaints nationwide D) Impose life imprisonment
A) None of the above B) Social media posts C) Evidence showing violation D) Only verbal testimony
A) Verified complaint and supporting evidence B) Only public notice C) Only media coverage D) Only witness statements
A) Announce violations on social media B) Arrest violators personally C) Provide firsthand accounts supporting the complaint D) Conduct media campaigns
A) Lead to immediate conviction B) Require public hearing C) Be dismissed by the court D) Automatically impose fines
A) RA 8749 B) RA 9147 C) RA 9275 D) RA 9003
A) Media sensationalism B) Preventing environmental degradation and promoting compliance C) Evicting residents forcibly D) Publicizing the complainant |