A) Encrypting sensitive customer data B) Sharing personal information of clients without consent C) Creating a privacy policy for a company D) Archiving old company records securely
A) Sending spam emails with malicious links B) Updating software regularly C) Installing anti-virus software D) Using secure passwords for accounts
A) RA 9147 – Wildlife Act B) RA 9275 – Philippine Clean Water Act C) RA 8749 – Clean Air Act D) RA 9003 – Solid Waste Management Act
A) RA 9147 B) RA 10175 C) RA 9003 D) RA 8749
A) Using dynamite for fishing B) Releasing fingerlings into a river C) Observing closed fishing season D) Practicing sustainable aquaculture
A) RA 8749 B) RA 10173 C) RA 9275 D) RA 9003
A) RA 8749 B) RA 9147 C) RA 9275 D) .RA 9003
A) RA 10175 B) RA 10173 C) RA 9003 D) RA 9275
A) RA 9003 B) RA 9275 C) Philippine Fisheries Code of 1998 D) RA 9147
A) RA 9147 B) RA 8749 C) RA 9003 D) RA 9275
A) RA 9275 B) RA 10173 C) RA 9003 D) RA 8749
A) RA 9147 B) RA 10175 C) RA 9003 D) RA 10173
A) RA 9147 B) RA 9003 C) RA 8749 D) RA 9275
A) RA 8749 B) RA 9147 C) RA 9003 D) RA 9275
A) Philippine Fisheries Code of 1998 B) RA 9003 C) RA 9147 D) RA 8749
A) RA 9275 B) RA 9003 C) RA 10173 D) RA 8749
A) RA 9275 B) RA 10173 C) RA 10175 D) RA 8749
A) RA 9275 B) RA 9147 C) RA 8749 D) RA 9003
A) RA 9003 B) RA 8749 C) RA 9147 D) RA 9275
A) RA 8749 B) RA 9003 C) RA 10173 D) RA 10175
A) RA 9003 B) Philippine Fisheries Code of 1998 C) RA 9147 D) RA 9275
A) RA 9275 B) RA 9003 C) RA 10173 D) RA 8749
A) RA 9147 B) RA 9003 C) RA 9275 D) RA 8749
A) RA 10175 B) RA 10173 C) RA 9003 D) RA 8749
A) RA 8749 B) RA 9003 C) RA 9147 D) RA 9275
A) RA 9147 B) RA 9275 C) RA 9003 D) RA 8749
A) RA 10173 B) RA 9003 C) RA 8749 D) RA 10175
A) RA 9003 B) RA 8749 C) RA 9147 D) RA 9275
A) RA 8749 B) RA 9147 C) RA 9003 D) RA 9275
A) RA 10173 B) RA 9275 C) RA 8749 D) RA 9003
A) RA 9147 B) Philippine Fisheries Code of 1998 C) RA 8749 D) RA 9003
A) To allow law enforcement to monitor email accounts indefinitely B) To publicly announce the investigation C) To authorize the seizure or inspection of digital devices and data D) To punish suspects before trial
A) Any government agency head B) A judge of competent jurisdiction C) Any law enforcement officer D) Barangay Captain
A) CCTV footage stored on a cloud server B) Written confession C) Blood sample D) Fingerprints
A) Immediately open files for inspection B) Make a copy for personal use C) Disconnect the device from all networks D) Post about it on social media
A) Habeas corpus B) Miranda rights C) Chain of custody D) Procedural fairness
A) To create reports for training purposes only B) To maintain accurate records for admissibility in court C) To intimidate suspects D) To justify the investigator’s presence
A) Using write-blockers to copy data B) Recording serial numbers of devices C) Altering file timestamps without documentation D) Photographing hardware before seizure
A) Evidence must be from a government server B) Evidence must be obtained legally and integrity preserved C) Evidence must be published online D) Evidence must be analyzed within 24 hours
A) Recovery B) Containment C) Identification D) Erasure of all logs
A) To allow analysis without altering the original device B) To delete malicious files permanently C) To install new software D) To speed up the investigation
A) Ignore jurisdictional issues B) Share credentials with third parties C) Obtain legal authorization to access the data D) Access the data through personal accounts
A) Disconnect all company systems permanently B) Notify media outlets C) Identify and contain the threat D) Arrest the suspect immediately
A) To prevent modification of original evidence B) To encrypt the hard drive C) To accelerate data transmission D) To permanently delete files
A) To search and seize evidence of cybercrime B) To monitor all internet activity without probable cause C) To perform routine maintenance on someone’s computer D) To impose fines on suspected hackers
A) To sell items later B) To make the process faster C) To maintain chain of custody and evidence integrity D) To reduce paperwork
A) Details of the alleged offense and description of the device or data to be seized B) Investigator’s personal opinion C) Market value of the seized devices D) Names of witnesses only
A) Archived emails B) Printed documents C) RAM (Random Access Memory) contents D) Hard drive files
A) Police blotter B) Incident report C) Chain of custody D) Affidavit of complaint
A) To ensure suspect cooperation B) To make shipping cheaper C) To display in court as visual proof D) To prevent unauthorized access or physical damage
A) Establish roles and responsibilities B) Share credentials with third parties C) Erase old logs D) Publicize the attack online
A) Confiscating all digital devices in a location B) Using force to access encrypted data C) Arresting as many suspects as possible D) Minimizing disruption to non-involved systems during seizure
A) Internet publication of the evidence B) Suspect’s admission only C) Investigator’s personal judgment D) Chain of custody and proper collection procedures
A) Deleting suspicious files immediately B) Shutting down unrelated computers randomly C) Disconnecting affected systems from the network D) Ignoring minor system alerts
A) Let it remain on and connected to Wi-Fi B) Power it off and remove the SIM and memory card if possible C) Access messages immediately D) Return the phone to the owner after copying files casually
A) Using personal USB drives B) Deleting irrelevant files before analysis C) Public sharing of all files D) Encryption, documentation, and controlled access
A) Summons B) Search and seizure warrant C) Arrest warrant D) Wiretap/interception order
A) Delete logs to hide evidence B) Disconnect from all communication permanently C) Restore systems to normal operation securely D) Share confidential data externally
A) To allow unrestricted access B) To prevent tampering and environmental damage C) To impress court officials D) To reduce storage costs
A) Ensuring all files are deleted automatically B) Preparing systems to enable rapid and effective investigation when incidents occur C) Avoiding logging all activities D) Sharing passwords among staff
A) Presenting files in any order B) Demonstrating that collection followed legal procedures and integrity was preserved C) Using personal analysis tools without documentation D) Altering timestamps for clarity
A) Arresting the suspect immediately B) Filing a complaint with the Philippine National Police or BFAR C) Conducting a public hearing D) Imposing fines directly
A) Arresting the suspect immediately B) Civil Society Organizations C) Bureau of Fisheries and Aquatic Resources (BFAR) D) Department of Environment and Natural Resources (DENR) only
A) News reports of the incident B) Witness testimony only C) Physical evidence, witness statements, and official inspection reports D) Suspect’s verbal admission only
A) Certification of Fisheries Permit B) Barangay Resolution C) Warrant of Arrest D) Complaint-Affidavit
A) Municipal Trial Court B) Regional Trial Court C) Department of Justice D) Barangay Council
A) Submit a complaint to the DENR Wildlife Management Bureau B) Capture the suspected poacher first C) Notify the local police only D) Wait for media coverage
A) Newspaper clippings B) Animal carcass, photographs, or seizure receipts C) Anonymous letters D) Personal assumptions
A) Only Barangay Captains B) Only government officers C) Any person with personal knowledge of the violation D) Only non-government organizations
A) Filing of a verified complaint with supporting evidence B) Issuance of a cease and desist order C) Public demonstration D) Mediation between parties
A) RA 9003 B) RA 8749 C) RA 9275 D) RA 9147
A) Filing a written complaint with the LGU’s Environmental Office B) Posting a notice on social media C) Conducting a clean-up drive D) Issuing a summons directly
A) Verbal complaints only B) Personal opinion C) Photos of improper dumping, witness affidavits, inspection reports D) Social media posts without verification
A) Court of Appeals B) Barangay Environmental Officer C) Department of Health D) Bureau of Fire Protection
A) Mayor’s verbal order B) Sworn complaint specifying violation C) Environmental Impact Statement D) Community approval
A) National Bureau of Investigation (NBI) B) Supreme Court C) Local Government Unit (LGU) or municipal/city courts D) Department of Interior and Local Government (DILG)
A) Informing the media B) Filing a complaint with the DENR or LGU C) Issuing a cease and desist order D) Conducting an ambient air quality test
A) Bureau of Fire Protection B) Department of Environment and Natural Resources (DENR) C) Philippine Coast Guard D) Local Barangay Council
A) Written and verified complaint with evidence B) News article C) Police blotter D) Public notice
A) Only environmental NGOs B) Any person with knowledge of the violation C) Only DENR officers D) Only the mayor
A) Personal opinion B) Emission monitoring results, photos, official inspection reports C) Hearsay statements only D) Social media posts
A) Written complaint to DENR or LGU detailing the violation B) Letter to the President C) Direct action against polluters D) Posting flyers in the affected area
A) Civil Society Organizations B) Department of Agriculture C) Bureau of Fisheries D) Department of Environment and Natural Resources
A) Water sampling results, photos, witness affidavits B) Newspaper articles C) Community rumor D) Personal opinion
A) Describe the color of the water only B) Include only verbal statements C) Wait for media coverage D) Identify the violator and the act committed
A) Philippine Navy B) Local Police only C) DENR or LGU offices with jurisdiction D) Barangay Tanod
A) Publicize the violation B) Initiate investigation and legal proceedings C) Evict the violator immediately D) Collect donations for the case
A) Direct execution of fines by complainant B) Media announcement C) Public protest D) Written complaint with supporting evidence
A) Only government officers can file complaints B) Any person with knowledge of violation may file C) Only the mayor can authorize filing D) Filing is optional if evidence exists
A) Conduct inspection or gather evidence B) Publish on social media C) Impose fines without trial D) Immediately arrest the violator
A) Media personnel B) Random citizens C) Only the complainant personally D) Private counsel or government prosecutor
A) Blotter is filed after verdict; complaint is filed after media report B) Blotter is evidence in court; complaint is optional C) Blotter records the incident; complaint initiates prosecution D) Blotter is filed only by NGOs
A) Sworn statement under oath B) Petition signed by friends C) Social media post D) Verbal notice to neighbor
A) Impose life imprisonment B) Publish complaints nationwide C) Receive complaints and conduct preliminary investigation D) Issue fishing licenses only
A) Only verbal testimony B) Evidence showing violation C) Social media posts D) None of the above
A) Only witness statements B) Verified complaint and supporting evidence C) Only public notice D) Only media coverage
A) Announce violations on social media B) Conduct media campaigns C) Arrest violators personally D) Provide firsthand accounts supporting the complaint
A) Lead to immediate conviction B) Automatically impose fines C) Require public hearing D) Be dismissed by the court
A) RA 8749 B) RA 9003 C) RA 9275 D) RA 9147
A) Publicizing the complainant B) Preventing environmental degradation and promoting compliance C) Evicting residents forcibly D) Media sensationalism |