ThatQuiz Test Library Take this test now
CDI #8 TECWRI 2
Contributed by: APPI
  • 1. Which law is known as the Cybercrime Prevention Act of 2012?
A) RA 9484
B) RA 9995
C) RA 10175
D) RA 10173
  • 2. Which law protects personal information and regulates its processing?
A) RA 10175
B) RA 4200
C) RA 9995
D) RA 10173
  • 3. Unauthorized access to another person’s computer system is known as:
A) Data Interference
B) Cyber-sabotage
C) Illegal Access
D) Cyber-libel
  • 4. Which of the following is a violation of RA 10173?
A) Hacking a Wi-Fi password
B) Posting fake news online
C) Stealing personal data without consent
D) Unauthorized fishing activities
  • 5. Cyber-libel under RA 10175 refers to libel committed through:
A) Computer system or online platform
B) Radio broadcast
C) Personal letters
D) Text messages
  • 6. Which is NOT protected under the Data Privacy Act?
A) Anonymous data with no identifiers
B) Privileged information
C) Statistical raw data with identity
D) Personal information
  • 7. Who is the chief implementing agency of RA 10173?
A) NBI
B) NPC (National Privacy Commission)
C) DICT
D) PNP-ACG
  • 8. Cybersex is punishable under:
A) RA 9208
B) RA 9262
C) RA 9995
D) RA 10175
  • 9. Which is considered “computer-related identity theft”?
A) Changing online photos
B) Using another’s personal data without authority
C) Posting insults online
D) Downloading pirated movies
  • 10. The destruction of computer data is called:
A) Cyber-libel
B) System interference
C) Illegal access
D) Data interference
  • 11. RA 10173 applies to personal information processed by:
A) Private companies
B) All of the above
C) Government agencies
D) Individuals
  • 12. Phishing is best described as:
A) Tracking IP addresses
B) Unauthorized CCTV monitoring
C) Using malware to crash systems
D) Fraudulently acquiring personal information
  • 13. Highly sensitive personal information includes:
A) Nickname
B) Health information
C) Age
D) Citizenship
  • 14. Child pornography online is punishable under:
A) RA 9003
B) RA 9165
C) RA 9775 and RA 10175
D) RA 9262
  • 15. “Spoofing” refers to:
A) DNS corruption
B) Destroying data
C) Using fake identity or email headers
D) Unauthorized surveillance
  • 16. The unauthorized alteration of computer data is:
A) Cyber fraud
B) Computer forgery
C) System interference
D) Data interference
  • 17. The use of a computer to commit fraud is punishable under:
A) Content-related offense
B) All of the above
C) Device misuse
D) Computer-related offense
  • 18. The Data Privacy Act primarily protects:
A) Digital files
B) Corporate records
C) Rights of data subjects
D) Government databases
  • 19. Which is NOT required under Data Privacy Act?
A) Consent for data processing
B) Data privacy officer
C) Data retention policy
D) Unlimited free access to data
  • 20. Who is responsible for securing personal data within an organization?
A) IT staff
B) All employees
C) CEO
D) Data Privacy Officer
  • 21. “Digital evidence” refers to information stored or transferred using:
A) Newspapers
B) Digital devices
C) Radio
D) Books
  • 22. A cybercrime search warrant is needed when accessing:
A) Blogs
B) Private computer files
C) Bulletin boards
D) Public social media posts
  • 23. Failing to secure personal information resulting in a data breach is a:
A) All of the above
B) Criminal offense
C) Administrative offense
D) Civil offense
  • 24. Which is an example of “content-related offense”?
A) Child pornography
B) Cyber fraud
C) Illegal access
D) Data interference
  • 25. Under RA 10175, aiding in the commission of a cybercrime results in:
A) No liability
B) Penalty reduction
C) Administrative charge
D) Same penalty as principal
  • 26. RA 9147 is known as:
A) Fisheries Code
B) Solid Waste Management Act
C) Clean Air Act
D) Wildlife Resources Conservation and Protection Act
  • 27. RA 9003 focuses on:
A) Wildlife protection
B) Air pollution control
C) Solid waste management
D) Water pollution
  • 28. RA 8749 regulates:
A) Water quality
B) Mining operations
C) Air quality
D) Toxic chemicals
  • 29. RA 9275 deals with:
A) Marine wildlife
B) Clean air regulation
C) Clean water regulation
D) Hazardous waste
  • 30. The Philippine Fisheries Code prohibits:
A) Handline fishing
B) Using nets
C) Using dynamite in fishing
D) Using bamboo traps
  • 31. Possession of wildlife without permit violates:
A) RA 8749
B) RA 9003
C) RA 9275
D) RA 9147
  • 32. Open dumping is prohibited under:
A) RA 9147
B) RA 9003
C) RA 9275
D) RA 8749
  • 33. Smoke belching vehicles violate:
A) RA 8749
B) RA 9003
C) RA 9147
D) RA 8749
  • 34. Discharging untreated wastewater into rivers violates:
A) RA 9275
B) RA 9147
C) RA 8749
D) RA 9003
  • 35. Which activity violates the Fisheries Code?
A) Culturing fish in ponds
B) Using fine-mesh nets
C) Handline fishing
D) Harvesting seaweeds
  • 36. Burning garbage is prohibited in:
A) RA 9003 and RA 8749
B) RA 9003
C) RA 9147
D) RA 8749
  • 37. Killing endangered species is punishable under:
A) RA 8749
B) RA 9275
C) RA 9147
D) RA 9003
  • 38. A barangay is required to establish a materials recovery facility (MRF) under:
A) RA 9003
B) RA 8749
C) RA 9275
D) RA 9147
  • 39. Monitoring air quality is mandated under:
A) RA 9003
B) RA 9147
C) RA 9275
D) RA 8749
  • 40. Illegal trading of wildlife is punished under:
A) RA 9275
B) RA 8749
C) RA 9147
D) RA 9003
  • 41. RA 9275 regulates discharges from:
A) All of the above
B) Commercial establishments
C) Households
D) Industrial plants
  • 42. Use of cyanide in fishing violates:
A) RA 9147
B) RA 8749
C) RA 9003
D) Fisheries Code
  • 43. Operating factories without wastewater treatment is a violation of:
A) RA 9147
B) RA 8749
C) RA 9003
D) RA 9275
  • 44. Burning plastics violates:
A) RA 9147
B) RA 9275
C) RA 9003 and RA 8749
  • 45. Importation of wildlife without a permit violates:
A) RA 9275
B) RA 8749
C) RA 9003
D) RA 9147
  • 46. River contamination with toxic chemicals violates:
A) RA 9275
B) Fisheries code
C) RA 8749
D) RA 9003
  • 47. Factories emitting excessive black smoke violate:
A) RA 9275
B) RA 8749
C) RA 9003
D) RA 9147
  • 48. Anti-littering measures are part of:
A) RA 9003
B) RA 8749
C) RA 9147
D) RA 9275
  • 49. Hunting wildlife inside protected areas violates:
A) RA 9003
B) RA 8749
C) RA 9147
D) RA 9275
  • 50. Dumping waste into bodies of water violates:
A) All of the above
B) RA 9275
C) RA 8749
D) RA 9003
  • 51. Fishing within closed seasons violates:
A) RA 9003
B) RA 9147
C) Fisheries Code
D) RA 8749
  • 52. Hazardous waste disposal is regulated under:
A) RA 9003
B) RA 9275
C) RA 9147
D) RA 8749
  • 53. Killing critically endangered animals is punishable by:
A) Administrative penalty only
B) Community service
C) Fine and imprisonment
D) Fine only
  • 54. Open burning of household waste violates:
A) RA 9275
B) RA 9147
C) Fisheries Code
D) RA 8749 and RA 9003
  • 55. Establishments must secure a discharge permit under:
A) RA 8749
B) RA 9147
C) RA 9003
D) RA 9275
  • 56. Wildlife trafficking involves:
A) Selling aquarium fish
B) Selling domestic dogs
C) Selling common livestock
D) Selling endangered wildlife
  • 57. Health effects from smog relate to violations of:
A) RA 9003
B) RA 9275
C) RA 8749
D) RA 9147
  • 58. Drying fish on beaches violates:
A) Fisheries Code
B) RA 9003
C) RA 8749
D) No law
  • 59. Improper segregation of garbage violates:
A) RA 8749
B) RA 9147
C) RA 9003
D) RA 9275
  • 60. Fishing with explosives violates:
A) Clean Air Act
B) Solid Waste Management Act
C) Wildlife Act
D) Fisheries Code
  • 61. A Cybercrime Search Warrant is issued under:
A) Rules on Cybercrime Warrants
B) NBI guidelines
C) Data Privacy Act
D) Rules of Court
  • 62. Which requires a Cybercrime Warrant?
A) Accessing private emails
B) Checking CCTV
C) Interviewing witnesses
D) Viewing public Facebook posts
  • 63. “Basic incident response” begins with:
A) Seizing devices
B) Threat hunting
C) Identification of the incident
D) Arresting suspects
  • 64. Digital evidence must be collected using:
A) Forensically sound procedures
B) Verbal descriptions
C) Random methods
D) Handwritten notes
  • 65. A write-blocker is used to:
A) Prevent data alteration
B) Encrypt drives
C) Speed up copying
D) Delete malicious files
  • 66. Chain of custody documents:
A) Interrogation details
B) Police assignments
C) Criminal profiles
D) Evidence handling history
  • 67. Seizure of digital evidence requires:
A) Cyber Warrant
B) Consent of suspect
C) Judge’s certification only
D) Verbal permission
  • 68. Seizure of digital evidence requires:
A) Preventing data alteration
B) Arresting suspects
C) Packing devices
D) Photographing the scene
  • 69. Volatile data is found in:
A) RAM
B) Hard drives
C) Memory cards
D) USB drives
  • 70. Which is NOT volatile evidence?
A) Hard drive files
B) Running processes
C) RAM data
D) Network connections
  • 71. Hash values ensure:
A) Network security
B) Encryption
C) Data authenticity
D) Data deletion
  • 72. Imaging a drive creates:
A) Compressed folder
B) A complete bit-for-bit copy
C) Partial copy
D) Password-protected file
  • 73. Emergency disclosure of data by a service provider requires:
A) Court warrant
B) Executive order
C) Subpoena only
D) Imminent danger
  • 74. Evidence is inadmissible if:
A) Tampered or altered
B) Authenticated
C) Acquired legally
D) Properly documented
  • 75. Capturing screenshots of ongoing cybercrime activity is part of:
A) Examination
B) Analysis
C) Collection
D) Preservation
  • 76. Incident containment aims to:
A) Arrest hackers
B) Erase malware
C) Identify motives
D) Stop further damage
  • 77. “Live forensics” is done when the device is:
A) Turned off
B) Destroyed
C) In use / powered on
D) Corrupt
  • 78. Which is NOT part of incident response?
A) Identification
B) Containment
C) Punishment
D) Eradication
  • 79. Search Warrant for Subscriber Information is called:
A) SW-ARA
B) SW-DI
C) SW-CL
D) SW-SI
  • 80. ISP logs are an example of:
A) Physical data
B) Non-content data
C) None
D) Content data
  • 81. Forensic analysis must be done in:
A) Anywhere
B) Home office
C) Police car
D) Laboratory
  • 82. Password cracking should be done using:
A) Forensic tools
B) Guessing
C) Brute-force methods
D) Social media
  • 83. Examination of digital evidence must produce:
A) None
B) Deleted data
C) Reports
D) Altered copies
  • 84. Which is considered digital evidence?
A) All of these
B) Hard drives
C) Emails
D) Cellphones
  • 85. Final phase of incident response:
A) Eradication
B) Recovery
C) Lessons learned
D) Containment
  • 86. Environmental cases use the:
A) Rules of Court
B) Civil Code
C) Special Penal Laws
D) Rules of Procedure for Environmental Cases
  • 87. Who may file an environmental complaint?
A) Only direct victims
B) Only police
C) Only government agencies
D) NGOs and citizens
  • 88. Fisheries violations are filed before:
A) Regular trial courts
B) Family courts
C) Labor courts
D) Sandiganbayan
  • 89. Chain of custody is essential for:
A) All environmental evidence
B) Water samples
C) Seized explosives
D) Wildlife evidence
  • 90. Writ of Kalikasan protects:
A) Large-scale environmental rights
B) Private contracts
C) Property disputes
D) Individuals only
  • 91. An MRF must be maintained under:
A) Clean Water Act
B) Fisheries Code
C) Clean Air Act
D) RA 9003
  • 92. Wildlife violations require documents from:
A) DICT
B) DENR
C) DA
D) DOH
  • 93. Water pollution cases are filed under:
A) RA 8749
B) RA 9003
C) RA 9275
D) RA 9147
  • 94. Evidence for wildlife trafficking includes:
A) Transport documents
B) All of the above
C) Confiscated cages
D) Specimens
  • 95. LGUs must prepare a 10-year solid waste plan under:
A) RA 9003
B) Fisheries Code
C) RA 8749
D) RA 9275
  • 96. Imprisonment for wildlife killing depends on:
A) Species classification
B) Age of violator
C) Weather condition
D) Municipality type
  • 97. Evidence collection in environmental crimes must follow:
A) Guesswork
B) No documentation needed
C) Scientific protocols
D) Verbal timelines
  • 98. Pollution cases usually require:
A) DNA tests
B) Lie detector tests
C) Laboratory tests
D) None
  • 99. Confiscated explosives in fishing cases are handled by:
A) Bureau of Fisheries
B) PNP EOD
C) DA
D) DENR
  • 100. Final step in filing environmental cases:
A) Collection only
B) Laboratory test
C) Filing complaint and evidence with prosecutor
D) Arrest
Created with That Quiz — the site for test creation and grading in math and other subjects.