A) Creating a privacy policy for a company B) Encrypting sensitive customer data C) Sharing personal information of clients without consent D) Archiving old company records securely
A) Using secure passwords for accounts B) Sending spam emails with malicious links C) Updating software regularly D) Installing anti-virus software
A) RA 9003 – Solid Waste Management Act B) RA 8749 – Clean Air Act C) RA 9147 – Wildlife Act D) RA 9275 – Philippine Clean Water Act
A) RA 9147 B) RA 10175 C) RA 8749 D) RA 9003
A) Releasing fingerlings into a river B) Observing closed fishing season C) Using dynamite for fishing D) Practicing sustainable aquaculture
A) RA 9003 B) RA 8749 C) RA 9275 D) RA 10173
A) RA 9147 B) .RA 9003 C) RA 8749 D) RA 9275
A) RA 9275 B) RA 9003 C) RA 10173 D) RA 10175
A) RA 9147 B) Philippine Fisheries Code of 1998 C) RA 9275 D) RA 9003
A) RA 8749 B) RA 9147 C) RA 9003 D) RA 9275
A) RA 9003 B) RA 9275 C) RA 8749 D) RA 10173
A) RA 10175 B) RA 10173 C) RA 9147 D) RA 9003
A) RA 9147 B) RA 8749 C) RA 9003 D) RA 9275
A) RA 9147 B) RA 9003 C) RA 8749 D) RA 9275
A) RA 9003 B) RA 8749 C) RA 9147 D) Philippine Fisheries Code of 1998
A) RA 10173 B) RA 9003 C) RA 9275 D) RA 8749
A) RA 9275 B) RA 10173 C) RA 10175 D) RA 8749
A) RA 9147 B) RA 9275 C) RA 8749 D) RA 9003
A) RA 9003 B) RA 9147 C) RA 9275 D) RA 8749
A) RA 10175 B) RA 10173 C) RA 8749 D) RA 9003
A) RA 9275 B) RA 9147 C) RA 9003 D) Philippine Fisheries Code of 1998
A) RA 9003 B) RA 10173 C) RA 8749 D) RA 9275
A) RA 9147 B) RA 9275 C) RA 8749 D) RA 9003
A) RA 10173 B) RA 9003 C) RA 8749 D) RA 10175
A) RA 9003 B) RA 9275 C) RA 8749 D) RA 9147
A) RA 9275 B) RA 8749 C) RA 9147 D) RA 9003
A) RA 8749 B) RA 10175 C) RA 10173 D) RA 9003
A) RA 9147 B) RA 8749 C) RA 9275 D) RA 9003
A) RA 8749 B) RA 9147 C) RA 9275 D) RA 9003
A) RA 9275 B) RA 10173 C) RA 8749 D) RA 9003
A) RA 8749 B) RA 9147 C) RA 9003 D) Philippine Fisheries Code of 1998
A) To punish suspects before trial B) To authorize the seizure or inspection of digital devices and data C) To allow law enforcement to monitor email accounts indefinitely D) To publicly announce the investigation
A) Barangay Captain B) Any law enforcement officer C) Any government agency head D) A judge of competent jurisdiction
A) Blood sample B) Fingerprints C) CCTV footage stored on a cloud server D) Written confession
A) Post about it on social media B) Disconnect the device from all networks C) Immediately open files for inspection D) Make a copy for personal use
A) Habeas corpus B) Chain of custody C) Procedural fairness D) Miranda rights
A) To maintain accurate records for admissibility in court B) To justify the investigator’s presence C) To intimidate suspects D) To create reports for training purposes only
A) Using write-blockers to copy data B) Photographing hardware before seizure C) Altering file timestamps without documentation D) Recording serial numbers of devices
A) Evidence must be obtained legally and integrity preserved B) Evidence must be from a government server C) Evidence must be published online D) Evidence must be analyzed within 24 hours
A) Identification B) Containment C) Recovery D) Erasure of all logs
A) To delete malicious files permanently B) To install new software C) To speed up the investigation D) To allow analysis without altering the original device
A) Ignore jurisdictional issues B) Share credentials with third parties C) Obtain legal authorization to access the data D) Access the data through personal accounts
A) Disconnect all company systems permanently B) Arrest the suspect immediately C) Notify media outlets D) Identify and contain the threat
A) To accelerate data transmission B) To prevent modification of original evidence C) To permanently delete files D) To encrypt the hard drive
A) To impose fines on suspected hackers B) To monitor all internet activity without probable cause C) To perform routine maintenance on someone’s computer D) To search and seize evidence of cybercrime
A) To sell items later B) To make the process faster C) To maintain chain of custody and evidence integrity D) To reduce paperwork
A) Investigator’s personal opinion B) Details of the alleged offense and description of the device or data to be seized C) Market value of the seized devices D) Names of witnesses only
A) Hard drive files B) RAM (Random Access Memory) contents C) Printed documents D) Archived emails
A) Police blotter B) Incident report C) Affidavit of complaint D) Chain of custody
A) To prevent unauthorized access or physical damage B) To ensure suspect cooperation C) To make shipping cheaper D) To display in court as visual proof
A) Establish roles and responsibilities B) Erase old logs C) Publicize the attack online D) Share credentials with third parties
A) Arresting as many suspects as possible B) Confiscating all digital devices in a location C) Minimizing disruption to non-involved systems during seizure D) Using force to access encrypted data
A) Investigator’s personal judgment B) Chain of custody and proper collection procedures C) Suspect’s admission only D) Internet publication of the evidence
A) Shutting down unrelated computers randomly B) Ignoring minor system alerts C) Disconnecting affected systems from the network D) Deleting suspicious files immediately
A) Access messages immediately B) Return the phone to the owner after copying files casually C) Let it remain on and connected to Wi-Fi D) Power it off and remove the SIM and memory card if possible
A) Public sharing of all files B) Deleting irrelevant files before analysis C) Encryption, documentation, and controlled access D) Using personal USB drives
A) Wiretap/interception order B) Search and seizure warrant C) Arrest warrant D) Summons
A) Share confidential data externally B) Delete logs to hide evidence C) Restore systems to normal operation securely D) Disconnect from all communication permanently
A) To prevent tampering and environmental damage B) To allow unrestricted access C) To impress court officials D) To reduce storage costs
A) Sharing passwords among staff B) Ensuring all files are deleted automatically C) Avoiding logging all activities D) Preparing systems to enable rapid and effective investigation when incidents occur
A) Altering timestamps for clarity B) Demonstrating that collection followed legal procedures and integrity was preserved C) Using personal analysis tools without documentation D) Presenting files in any order
A) Imposing fines directly B) Arresting the suspect immediately C) Filing a complaint with the Philippine National Police or BFAR D) Conducting a public hearing
A) Bureau of Fisheries and Aquatic Resources (BFAR) B) Department of Environment and Natural Resources (DENR) only C) Civil Society Organizations D) Arresting the suspect immediately
A) Witness testimony only B) News reports of the incident C) Physical evidence, witness statements, and official inspection reports D) Suspect’s verbal admission only
A) Complaint-Affidavit B) Warrant of Arrest C) Certification of Fisheries Permit D) Barangay Resolution
A) Municipal Trial Court B) Barangay Council C) Department of Justice D) Regional Trial Court
A) Notify the local police only B) Wait for media coverage C) Submit a complaint to the DENR Wildlife Management Bureau D) Capture the suspected poacher first
A) Anonymous letters B) Animal carcass, photographs, or seizure receipts C) Personal assumptions D) Newspaper clippings
A) Any person with personal knowledge of the violation B) Only Barangay Captains C) Only government officers D) Only non-government organizations
A) Mediation between parties B) Filing of a verified complaint with supporting evidence C) Issuance of a cease and desist order D) Public demonstration
A) RA 9275 B) RA 9003 C) RA 8749 D) RA 9147
A) Posting a notice on social media B) Issuing a summons directly C) Filing a written complaint with the LGU’s Environmental Office D) Conducting a clean-up drive
A) Social media posts without verification B) Personal opinion C) Verbal complaints only D) Photos of improper dumping, witness affidavits, inspection reports
A) Bureau of Fire Protection B) Department of Health C) Barangay Environmental Officer D) Court of Appeals
A) Community approval B) Sworn complaint specifying violation C) Environmental Impact Statement D) Mayor’s verbal order
A) Local Government Unit (LGU) or municipal/city courts B) Supreme Court C) Department of Interior and Local Government (DILG) D) National Bureau of Investigation (NBI)
A) Filing a complaint with the DENR or LGU B) Informing the media C) Conducting an ambient air quality test D) Issuing a cease and desist order
A) Local Barangay Council B) Bureau of Fire Protection C) Philippine Coast Guard D) Department of Environment and Natural Resources (DENR)
A) News article B) Public notice C) Written and verified complaint with evidence D) Police blotter
A) Only DENR officers B) Only environmental NGOs C) Any person with knowledge of the violation D) Only the mayor
A) Social media posts B) Emission monitoring results, photos, official inspection reports C) Personal opinion D) Hearsay statements only
A) Written complaint to DENR or LGU detailing the violation B) Posting flyers in the affected area C) Direct action against polluters D) Letter to the President
A) Civil Society Organizations B) Department of Environment and Natural Resources C) Bureau of Fisheries D) Department of Agriculture
A) Newspaper articles B) Water sampling results, photos, witness affidavits C) Personal opinion D) Community rumor
A) Include only verbal statements B) Describe the color of the water only C) Identify the violator and the act committed D) Wait for media coverage
A) Barangay Tanod B) DENR or LGU offices with jurisdiction C) Local Police only D) Philippine Navy
A) Evict the violator immediately B) Publicize the violation C) Collect donations for the case D) Initiate investigation and legal proceedings
A) Direct execution of fines by complainant B) Public protest C) Media announcement D) Written complaint with supporting evidence
A) Only government officers can file complaints B) Filing is optional if evidence exists C) Any person with knowledge of violation may file D) Only the mayor can authorize filing
A) Immediately arrest the violator B) Impose fines without trial C) Publish on social media D) Conduct inspection or gather evidence
A) Media personnel B) Random citizens C) Only the complainant personally D) Private counsel or government prosecutor
A) Blotter is filed only by NGOs B) Blotter is evidence in court; complaint is optional C) Blotter is filed after verdict; complaint is filed after media report D) Blotter records the incident; complaint initiates prosecution
A) Verbal notice to neighbor B) Petition signed by friends C) Social media post D) Sworn statement under oath
A) Issue fishing licenses only B) Impose life imprisonment C) Publish complaints nationwide D) Receive complaints and conduct preliminary investigation
A) Only verbal testimony B) Evidence showing violation C) Social media posts D) None of the above
A) Verified complaint and supporting evidence B) Only public notice C) Only media coverage D) Only witness statements
A) Conduct media campaigns B) Provide firsthand accounts supporting the complaint C) Arrest violators personally D) Announce violations on social media
A) Be dismissed by the court B) Lead to immediate conviction C) Automatically impose fines D) Require public hearing
A) RA 9003 B) RA 8749 C) RA 9275 D) RA 9147
A) Evicting residents forcibly B) Media sensationalism C) Preventing environmental degradation and promoting compliance D) Publicizing the complainant |