A) Encrypting sensitive customer data B) Sharing personal information of clients without consent C) Archiving old company records securely D) Creating a privacy policy for a company
A) Updating software regularly B) Sending spam emails with malicious links C) Installing anti-virus software D) Using secure passwords for accounts
A) RA 9003 – Solid Waste Management Act B) RA 9275 – Philippine Clean Water Act C) RA 8749 – Clean Air Act D) RA 9147 – Wildlife Act
A) RA 9003 B) RA 9147 C) RA 10175 D) RA 8749
A) Releasing fingerlings into a river B) Using dynamite for fishing C) Observing closed fishing season D) Practicing sustainable aquaculture
A) RA 8749 B) RA 9275 C) RA 9003 D) RA 10173
A) RA 8749 B) RA 9147 C) RA 9275 D) .RA 9003
A) RA 9003 B) RA 10175 C) RA 9275 D) RA 10173
A) RA 9147 B) Philippine Fisheries Code of 1998 C) RA 9003 D) RA 9275
A) RA 9275 B) RA 8749 C) RA 9147 D) RA 9003
A) RA 9275 B) RA 10173 C) RA 8749 D) RA 9003
A) RA 10175 B) RA 10173 C) RA 9003 D) RA 9147
A) RA 9147 B) RA 9275 C) RA 8749 D) RA 9003
A) RA 9003 B) RA 9147 C) RA 9275 D) RA 8749
A) RA 9147 B) RA 8749 C) Philippine Fisheries Code of 1998 D) RA 9003
A) RA 10173 B) RA 9275 C) RA 9003 D) RA 8749
A) RA 10175 B) RA 9275 C) RA 10173 D) RA 8749
A) RA 9275 B) RA 8749 C) RA 9147 D) RA 9003
A) RA 9275 B) RA 9147 C) RA 8749 D) RA 9003
A) RA 8749 B) RA 10175 C) RA 9003 D) RA 10173
A) RA 9003 B) RA 9147 C) Philippine Fisheries Code of 1998 D) RA 9275
A) RA 10173 B) RA 8749 C) RA 9275 D) RA 9003
A) RA 8749 B) RA 9147 C) RA 9275 D) RA 9003
A) RA 8749 B) RA 10173 C) RA 10175 D) RA 9003
A) RA 9003 B) RA 8749 C) RA 9147 D) RA 9275
A) RA 8749 B) RA 9003 C) RA 9147 D) RA 9275
A) RA 10173 B) RA 10175 C) RA 9003 D) RA 8749
A) RA 8749 B) RA 9147 C) RA 9003 D) RA 9275
A) RA 9275 B) RA 8749 C) RA 9003 D) RA 9147
A) RA 9275 B) RA 10173 C) RA 8749 D) RA 9003
A) Philippine Fisheries Code of 1998 B) RA 9147 C) RA 8749 D) RA 9003
A) To publicly announce the investigation B) To punish suspects before trial C) To authorize the seizure or inspection of digital devices and data D) To allow law enforcement to monitor email accounts indefinitely
A) Barangay Captain B) Any government agency head C) A judge of competent jurisdiction D) Any law enforcement officer
A) CCTV footage stored on a cloud server B) Written confession C) Fingerprints D) Blood sample
A) Immediately open files for inspection B) Disconnect the device from all networks C) Make a copy for personal use D) Post about it on social media
A) Miranda rights B) Chain of custody C) Habeas corpus D) Procedural fairness
A) To maintain accurate records for admissibility in court B) To create reports for training purposes only C) To justify the investigator’s presence D) To intimidate suspects
A) Using write-blockers to copy data B) Recording serial numbers of devices C) Altering file timestamps without documentation D) Photographing hardware before seizure
A) Evidence must be obtained legally and integrity preserved B) Evidence must be from a government server C) Evidence must be analyzed within 24 hours D) Evidence must be published online
A) Recovery B) Containment C) Erasure of all logs D) Identification
A) To install new software B) To delete malicious files permanently C) To allow analysis without altering the original device D) To speed up the investigation
A) Access the data through personal accounts B) Obtain legal authorization to access the data C) Ignore jurisdictional issues D) Share credentials with third parties
A) Notify media outlets B) Identify and contain the threat C) Disconnect all company systems permanently D) Arrest the suspect immediately
A) To permanently delete files B) To accelerate data transmission C) To encrypt the hard drive D) To prevent modification of original evidence
A) To impose fines on suspected hackers B) To monitor all internet activity without probable cause C) To search and seize evidence of cybercrime D) To perform routine maintenance on someone’s computer
A) To maintain chain of custody and evidence integrity B) To reduce paperwork C) To make the process faster D) To sell items later
A) Names of witnesses only B) Market value of the seized devices C) Details of the alleged offense and description of the device or data to be seized D) Investigator’s personal opinion
A) Printed documents B) Archived emails C) Hard drive files D) RAM (Random Access Memory) contents
A) Police blotter B) Chain of custody C) Affidavit of complaint D) Incident report
A) To display in court as visual proof B) To make shipping cheaper C) To prevent unauthorized access or physical damage D) To ensure suspect cooperation
A) Publicize the attack online B) Share credentials with third parties C) Erase old logs D) Establish roles and responsibilities
A) Using force to access encrypted data B) Confiscating all digital devices in a location C) Arresting as many suspects as possible D) Minimizing disruption to non-involved systems during seizure
A) Chain of custody and proper collection procedures B) Suspect’s admission only C) Investigator’s personal judgment D) Internet publication of the evidence
A) Disconnecting affected systems from the network B) Shutting down unrelated computers randomly C) Ignoring minor system alerts D) Deleting suspicious files immediately
A) Let it remain on and connected to Wi-Fi B) Return the phone to the owner after copying files casually C) Access messages immediately D) Power it off and remove the SIM and memory card if possible
A) Encryption, documentation, and controlled access B) Using personal USB drives C) Deleting irrelevant files before analysis D) Public sharing of all files
A) Search and seizure warrant B) Arrest warrant C) Summons D) Wiretap/interception order
A) Restore systems to normal operation securely B) Disconnect from all communication permanently C) Delete logs to hide evidence D) Share confidential data externally
A) To prevent tampering and environmental damage B) To allow unrestricted access C) To impress court officials D) To reduce storage costs
A) Ensuring all files are deleted automatically B) Sharing passwords among staff C) Avoiding logging all activities D) Preparing systems to enable rapid and effective investigation when incidents occur
A) Using personal analysis tools without documentation B) Presenting files in any order C) Altering timestamps for clarity D) Demonstrating that collection followed legal procedures and integrity was preserved
A) Filing a complaint with the Philippine National Police or BFAR B) Conducting a public hearing C) Imposing fines directly D) Arresting the suspect immediately
A) Arresting the suspect immediately B) Bureau of Fisheries and Aquatic Resources (BFAR) C) Department of Environment and Natural Resources (DENR) only D) Civil Society Organizations
A) Suspect’s verbal admission only B) News reports of the incident C) Witness testimony only D) Physical evidence, witness statements, and official inspection reports
A) Certification of Fisheries Permit B) Warrant of Arrest C) Barangay Resolution D) Complaint-Affidavit
A) Municipal Trial Court B) Department of Justice C) Regional Trial Court D) Barangay Council
A) Capture the suspected poacher first B) Notify the local police only C) Submit a complaint to the DENR Wildlife Management Bureau D) Wait for media coverage
A) Newspaper clippings B) Personal assumptions C) Anonymous letters D) Animal carcass, photographs, or seizure receipts
A) Only non-government organizations B) Any person with personal knowledge of the violation C) Only government officers D) Only Barangay Captains
A) Issuance of a cease and desist order B) Public demonstration C) Mediation between parties D) Filing of a verified complaint with supporting evidence
A) RA 8749 B) RA 9275 C) RA 9003 D) RA 9147
A) Conducting a clean-up drive B) Posting a notice on social media C) Issuing a summons directly D) Filing a written complaint with the LGU’s Environmental Office
A) Social media posts without verification B) Photos of improper dumping, witness affidavits, inspection reports C) Personal opinion D) Verbal complaints only
A) Department of Health B) Bureau of Fire Protection C) Court of Appeals D) Barangay Environmental Officer
A) Community approval B) Environmental Impact Statement C) Mayor’s verbal order D) Sworn complaint specifying violation
A) Department of Interior and Local Government (DILG) B) Local Government Unit (LGU) or municipal/city courts C) Supreme Court D) National Bureau of Investigation (NBI)
A) Informing the media B) Issuing a cease and desist order C) Filing a complaint with the DENR or LGU D) Conducting an ambient air quality test
A) Local Barangay Council B) Bureau of Fire Protection C) Department of Environment and Natural Resources (DENR) D) Philippine Coast Guard
A) Public notice B) News article C) Police blotter D) Written and verified complaint with evidence
A) Only the mayor B) Only environmental NGOs C) Any person with knowledge of the violation D) Only DENR officers
A) Hearsay statements only B) Emission monitoring results, photos, official inspection reports C) Personal opinion D) Social media posts
A) Direct action against polluters B) Written complaint to DENR or LGU detailing the violation C) Letter to the President D) Posting flyers in the affected area
A) Department of Environment and Natural Resources B) Bureau of Fisheries C) Department of Agriculture D) Civil Society Organizations
A) Water sampling results, photos, witness affidavits B) Community rumor C) Newspaper articles D) Personal opinion
A) Wait for media coverage B) Include only verbal statements C) Identify the violator and the act committed D) Describe the color of the water only
A) Philippine Navy B) Barangay Tanod C) DENR or LGU offices with jurisdiction D) Local Police only
A) Evict the violator immediately B) Publicize the violation C) Initiate investigation and legal proceedings D) Collect donations for the case
A) Direct execution of fines by complainant B) Media announcement C) Written complaint with supporting evidence D) Public protest
A) Any person with knowledge of violation may file B) Only the mayor can authorize filing C) Filing is optional if evidence exists D) Only government officers can file complaints
A) Impose fines without trial B) Publish on social media C) Conduct inspection or gather evidence D) Immediately arrest the violator
A) Random citizens B) Media personnel C) Private counsel or government prosecutor D) Only the complainant personally
A) Blotter is filed after verdict; complaint is filed after media report B) Blotter is filed only by NGOs C) Blotter records the incident; complaint initiates prosecution D) Blotter is evidence in court; complaint is optional
A) Social media post B) Sworn statement under oath C) Verbal notice to neighbor D) Petition signed by friends
A) Receive complaints and conduct preliminary investigation B) Publish complaints nationwide C) Issue fishing licenses only D) Impose life imprisonment
A) Evidence showing violation B) Only verbal testimony C) Social media posts D) None of the above
A) Only media coverage B) Only public notice C) Only witness statements D) Verified complaint and supporting evidence
A) Conduct media campaigns B) Provide firsthand accounts supporting the complaint C) Arrest violators personally D) Announce violations on social media
A) Lead to immediate conviction B) Be dismissed by the court C) Automatically impose fines D) Require public hearing
A) RA 9147 B) RA 9003 C) RA 9275 D) RA 8749
A) Publicizing the complainant B) Media sensationalism C) Evicting residents forcibly D) Preventing environmental degradation and promoting compliance |