A) Storing data securely for future reference, without immediate use. B) Processing data for legitimate law enforcement purposes, provided safeguards are in place. C) Unauthorized disclosure of sensitive personal information, breaching privacy rights and security principles. D) Collecting data with proper warrants, as it aligns with public interest. E) Unauthorized disclosure of sensitive personal information, breaching privacy rights and security principles.
A) Hacking into government databases to steal classified information, constituting cyber espionage. B) Sharing public information online without malice. C) Accessing systems with owner consent for maintenance. D) Hacking into government databases to steal classified information, constituting cyber espionage. E) Using encryption for personal data protection
A) Reporting catch volumes to local authorities. B) Using sustainable fishing gear like nets in designated areas. C) Harvesting seaweed for aquaculture purposes. D) Employing destructive methods like explosives, destroying habitats and violating conservation rules. E) Employing destructive methods like explosives, destroying habitats and violating conservation rules.
A) Educating the public on wildlife preservation B) Breeding protected species in captivity for conservation C) Educating the public on wildlife preservation D) Selling or transporting endangered wildlife without permits, threatening biodiversity. E) Selling or transporting endangered wildlife without permits, threatening biodiversity.
A) Collecting waste for composting programs. B) Improper disposal of hazardous waste, polluting land and violating segregation mandates. C) Educating communities on waste reduction. D) Improper disposal of hazardous waste, polluting land and violating segregation mandates. E) Recycling materials in designated facilities.
A) Installing air quality monitoring devices. B) Releasing excessive pollutants into the atmosphere, violating emission limits and health standards. C) Reporting emissions to environmental agencies. D) Releasing excessive pollutants into the atmosphere, violating emission limits and health standards. E) Using renewable energy sources for operations.
A) Treating wastewater before release into bodies of water. B) Discharging pollutants directly into waterways, breaching water quality standards. C) Discharging pollutants directly into waterways, breaching water quality standards. D) Monitoring water quality in protected areas. E) Implementing watershed management plans.
A) Encrypting data for security purposes. B) Unauthorized processing or alteration of personal data, compromising privacy. C) Unauthorized processing or alteration of personal data, compromising privacy. D) Deleting outdated records securely E) Obtaining consent for data collection
A) Using social media for lawful advocacy B) Sharing educational content on internet safety. C) Producing or distributing child sexual abuse material, constituting a severe cybercrime. D) Producing or distributing child sexual abuse material, constituting a severe cybercrime. E) Encrypting communications for privacy.
A) Implementing community-based fisheries management. B) Reporting illegal activities to authorities. C) Fishing in no-take zones, destroying marine biodiversity. D) Fishing in no-take zones, destroying marine biodiversity. E) Conducting research in protected areas with permits.
A) Clearing forests for development, endangering species and violating habitat protection. B) Restoring degraded habitats legally. C) Monitoring wildlife populations. D) Establishing eco-tourism zones. E) Clearing forests for development, endangering species and violating habitat protection.
A) Burning waste openly, releasing toxins and violating anti-burning provisions. B) Composting organic waste properly. C) Segregating waste for recycling. D) Burning waste openly, releasing toxins and violating anti-burning provisions. E) Educating on waste segregation.
A) Reporting vehicle maintenance. B) Operating without valid emission compliance certificates, contributing to air pollution. C) Using public transportation to reduce emissions. D) Retrofitting vehicles with emission controls. E) Operating without valid emission compliance certificates, contributing to air pollution.
A) Treating wastewater before release into bodies of water. B) Discharging untreated pollutants, degrading marine ecosystems. C) Discharging untreated pollutants, degrading marine ecosystems. D) Implementing pollution prevention plans. E) Monitoring effluent quality.
A) Providing privacy notices as required. B) Obtaining consent for processing. C) Collecting data surreptitiously, breaching transparency principles. D) Collecting data surreptitiously, breaching transparency principles. E) Limiting data retention periods.
A) Sharing public profiles online. B) Stealing personal information for fraudulent purposes, constituting cybercrime. C) Stealing personal information for fraudulent purposes, constituting cybercrime. D) Using secure authentication. E) Verifying identities securely.
A) Using non-toxic methods for aquaculture. B) Applying poisons to stun fish, harming ecosystems. C) Applying poisons to stun fish, harming ecosystems. D) Monitoring fish stocks. E) Enforcing fishing bans.
A) Promoting anti-poaching campaigns. B) Conducting wildlife censuses. C) Killing protected species illegally, threatening populations. D) Hunting with permits in controlled areas E) Killing protected species illegally, threatening populations.
A) Storing hazardous waste separately. B) Mixing wastes improperly, increasing pollution risks. C) Reporting waste generation. D) Recycling hazardous materials. E) Mixing wastes improperly, increasing pollution risks.
A) Monitoring air pollution levels. B) Permitting excessive smoke emissions, violating air quality rules. C) Enforcing emission standards. D) Permitting excessive smoke emissions, violating air quality rules. E) Promoting electric vehicles
A) Failing to contain and remediate oil discharges, polluting water bodies B) Reporting spills immediately C) Failing to contain and remediate oil discharges, polluting water bodies D) Using biodegradable oils E) Implementing spill prevention measures
A) Excessive retention without justification, breaching minimization principles B) Auditing data inventories. C) Obtaining consent for retention. D) Deleting data after use. E) Excessive retention without justification, breaching minimization principles
A) Using anonymous accounts legally. B) Publishing defamatory content online, constituting cyber libel. C) Fact-checking information D) Expressing opinions freely. E) Publishing defamatory content online, constituting cyber libel.
A) Reporting catches accurately B) Exceeding limits, leading to overfishing. C) Using selective gear D) Adhering to quotas. E) Exceeding limits, leading to overfishing.
A) Enforcing logging bans. B) Reforestation efforts. C) Cutting trees in protected areas, destroying habitats. D) Sustainable logging with permits. E) Cutting trees in protected areas, destroying habitats.
A) Exigent circumstances justify warrantless seizure if evidence is at risk of destruction. B) Warrant is unnecessary for digital evidence. C) Exigent circumstances justify warrantless seizure if evidence is at risk of destruction. D) Consent of the suspect is implied during cybercrime operations. E) The officer’s authority under RA 10175 supersedes all other laws.
A) Warrant to Disclose Computer Data (WDCD) B) Warrant to Disclose Computer Data (WDCD) C) Warrant to Examine Computer Data (WECD) D) Warrant to Search, Seize, and Examine Computer Data (WSSECD) E) Warrant to Intercept Computer Data (WICD)
A) Presentation by the arresting officer B) Proper labeling and sealing of the storage device C) Use of the latest antivirus software D) Electronic signature by the prosecutor E) Proper labeling and sealing of the storage device
A) WICD applies to physical devices; WECD applies to social media accounts B) Both are identical under RA 10175. C) WICD Involves real-time data interception; WECD involves stored data examination. D) WICD Involves real-time data interception; WECD involves stored data examination. E) WECD is issued only by the DOJ; WICD is issued by courts.
A) Improper use of forensic imaging tools B) Failure to decrypt the files C) Lack of data backup D) Absence of a search warrant E) Improper use of forensic imaging tools
A) Rule on Electronic Evidence (A.M. No. 01-7-01-SC) B) Rule 115, Rules of Criminal Procedure C) Rule on Electronic Evidence (A.M. No. 01-7-01-SC) D) Rule on Cybercrime Warrants (A.M. No. 17-11-03-SC) E) Evidence Act of 1989
A) Limited only to physical seizure of hardware. B) Applies only to social media posts. C) Combines the authority to search, seize, and examine physical and digital evidence. D) Combines the authority to search, seize, and examine physical and digital evidence. E) Used exclusively for interception of live chats.
A) Fruit of the poisonous tree B) Exclusionary rule C) Plain view doctrine D) Plain view doctrine E) Adverse inference rule
A) Evidence custodian B) First responder C) Evidence originator D) Evidence analyst E) First responder
A) The number of digital copies produced B) The encryption software used C) The reliability of the data source and integrity of the process used D) The volume of data stored E) The reliability of the data source and integrity of the process used
A) Delay in data extraction B) Increase in battery temperature C) Remote wiping or alteration of data D) Remote wiping or alteration of data E) Device encryption failure
A) Verify that data has not been altered B) Compress the file for storage C) Verify that data has not been altered D) Encrypt the data for security E) Translate binary codes to text
A) It excludes coordination with service providers. B) It involves detection, containment, eradication, and recovery. C) It involves detection, containment, eradication, and recovery. D) It is optional if a warrant has been issued. E) It starts only after evidence collection.
A) WECD B) WDCD C) WICD D) WSSECD E) WDCD
A) Plain view rule B) Chain of custody rule C) Best evidence rule D) Res gestae rule E) Best evidence rule
A) Contain the incident while preserving evidence integrity. B) Contain the incident while preserving evidence integrity. C) Disconnect all systems permanently. D) Immediately prosecute the offender. E) Delete malicious data.
A) Chain of custody documentation B) Jurisdiction of the court C) Admissibility under RA 10175 D) Authority of the warrant E) Chain of custody documentation
A) Within ten (10) days from issuance, unless extended by the court B) Within ten (10) days from issuance, unless extended by the court C) Within one (1) year D) Immediately and without limit E) Within twenty (20) days
A) By submission of printed copies. B) By digital signature or other security procedures proving identity. C) By digital signature or other security procedures proving identity. D) By oral testimony of a witness alone. E) By certification from the ISP.
A) Warrant to Disclose Computer Data B) Warrant to Delete Computer Data C) Warrant to Delete Computer Data D) Warrant to Intercept Computer Data E) Warrant to Block Access
A) Certification by a foreign expert. B) Maintenance of chain of custody with documentation and signatures. C) Inclusion of suspect’s consent form. D) Maintenance of chain of custody with documentation and signatures. E) Submission of encrypted files only.
A) Accepted as secondary evidence. B) Potential inadmissibility due to alteration risk. C) No consequence if warrant exists. D) Potential inadmissibility due to alteration risk. E) Automatically admissible if signed by investigator.
A) Accessing unrelated folders outside the warrant’s scope. B) Seizing a USB found in plain view. C) Submitting the report within ten days. D) Accessing unrelated folders outside the warrant’s scope. E) Hashing all collected data.
A) Relevance, authenticity, and integrity B) Reliability, importance, and format C) Relevance, authenticity, and integrity D) Quantity, quality, and accessibility E) Consent, jurisdiction, and value
A) Fruit of the poisonous tree doctrine B) Fruit of the poisonous tree doctrine C) De minimis rule D) Exclusionary clause exception E) Plain view doctrine
A) The officer must establish a complete chain of custody to prevent tampering, ensuring evidentiary integrity. B) The officer must establish a complete chain of custody to prevent tampering, ensuring evidentiary integrity. C) Documentation is optional if the gear is perishable. D) The officer must photograph and label the gear but not seal it. E) Documentation is only required if the suspect confesses
A) Assess environmental impact to prioritize cases affecting marine ecosystems. B) Dismiss the case if the violator offers compensation. C) Transfer the case to a non-governmental organization. D) Immediately arrest the violator without further evaluation E) Assess environmental impact to prioritize cases affecting marine ecosystems.
A) BFAR provides technical expertise, improving evidence accuracy and case strength. B) It delays the process by requiring additional approvals. C) Coordination is unnecessary as local officers handle all aspects. D) Coordination only involves sharing suspect information. E) BFAR provides technical expertise, improving evidence accuracy and case strength.
A) Preservation is preferred, but destruction is allowed with documentation to maintain chain of custody. B) Destruction requires court approval first. C) Preservation is preferred, but destruction is allowed with documentation to maintain chain of custody. D) The officer has no discretion; all evidence must be preserved E) Destruction is always mandatory to avoid spoilage.
A) The rule is flexible and not strictly enforced. B) It allows indefinite delays for complex cases. C) It ensures timely evidence collection, preventing loss and upholding accountability. D) It ensures timely evidence collection, preventing loss and upholding accountability. E) The rule applies only to minor violations.
A) Assessment delays filing unnecessarily. B) It provides scientific basis, enhancing evidential weight and judicial outcomes. C) It provides scientific basis, enhancing evidential weight and judicial outcomes. D) It is only for civil, not criminal, cases. E) Assessment is optional and not required for filing.
A) Officials only witness arrests. B) It complicates procedures without benefits. C) It facilitates local cooperation, improving detection and resolution rates. D) It facilitates local cooperation, improving detection and resolution rates. E) Barangay involvement is mandatory for all cases.
A) It is mandatory for all violations without exceptions. B) Notice delays prosecution indefinitely C) It allows violators to correct behavior, balancing deterrence with rehabilitation. D) It allows violators to correct behavior, balancing deterrence with rehabilitation. E) Notice is issued only after arrest.
A) It requires separate filings for each violation. B) Consolidation is prohibited to avoid complexity C) Consolidation only applies to civil penalties. D) It streamlines evidence presentation, reducing court time and strengthening linkages. E) It streamlines evidence presentation, reducing court time and strengthening linkages.
A) Monitoring is optional and not enforced. B) It involves follow-up inspections, deterring future violations through accountability. C) Monitoring occurs only during trial. D) It is handled solely by the court. E) It involves follow-up inspections, deterring future violations through accountability.
A) Consultation only involves paperwork. B) Consultation is optional for routine seizures. C) DENR expertise ensures proper identification, enhancing case validity. D) DENR expertise ensures proper identification, enhancing case validity. E) It requires approval before any action.
A) Documentation is limited to written reports B) It is unnecessary if the animal is alive. C) Visual evidence provides irrefutable proof, aiding in network disruption. D) Visual evidence provides irrefutable proof, aiding in network disruption. E) Documentation delays seizure.
A) It complicates jurisdiction. B) Coordination leverages local knowledge, improving detection and resolution. C) PAMBs have no role in enforcement. D) PAMBs only approve permits. E) Coordination leverages local knowledge, improving detection and resolution
A) It prevents evidence degradation, ensuring timely prosecution. B) The rule is discretionary. C) It applies only to dead specimens. D) It prevents evidence degradation, ensuring timely prosecution. E) Filing can be delayed indefinitely
A) It establishes origin and illegality, strengthening culpability. B) Analysis requires court order first. C) It establishes origin and illegality, strengthening culpability. D) Analysis is optional for common species E) It only identifies species.
A) NGOs only handle rehabilitation. B) They provide resources, enhancing capacity but risking bias. C) They provide resources, enhancing capacity but risking bias. D) Involvement is mandatory. E) NGOs are excluded from procedures.
A) Rehabilitation is not required. B) It delays prosecution. C) It ensures animal welfare, potentially influencing plea deals. D) Rehabilitation is separate from filing. E) It ensures animal welfare, potentially influencing plea deals.
A) Penalties are fixed. B) Assessment is post-trial C) Impact assessment tailors penalties, deterring severe violations. D) Impact assessment tailors penalties, deterring severe violations. E) It only considers economic loss
A) Strict documentation maintains evidence reliability B) Strict documentation maintains evidence reliability C) It applies only to live animals D) Custody is informal E) Custody is court-managed
A) It pools resources, improving transnational enforcement B) It pools resources, improving transnational enforcement C) Joint filing is prohibited D) It complicates jurisdiction E) Joint cases are rare
A) Sampling is unnecessary B) Sampling requires lab approval C) It provides representative evidence, strengthening cases D) It only identifies waste types E) It provides representative evidence, strengthening cases
A) It promotes compliance, reducing litigation B) Notice is punitive C) It promotes compliance, reducing litigation D) It is mandatory for all cases. E) Notice is issued post-arrest
A) It creates overlaps B) LGUs only issue permits. C) Coordination ensures local implementation, improving outcomes D) Coordination ensures local implementation, improving outcomes E) LGUs have no role
A) The rule is flexible B) Reporting can be delayed C) It ensures prompt action, maintaining integrity D) It applies to minor issues only E) It ensures prompt action, maintaining integrity
A) Seizure requires court order B) Documentation is minimal C) Detailed records ensure evidentiary strength D) Detailed records ensure evidentiary strength E) Documentation is post-seizure
A) Monitoring is optional B) It is court-ordered C) It detects violations early, aiding prevention D) It detects violations early, aiding prevention E) Monitoring delays filing.
A) Involvement encourages responsibility, resolving issues B) It complicates procedures C) Involvement encourages responsibility, resolving issues D) Generators are not involved E) Generators only pay fines
A) It applies to non-hazardous waste only B) Strict tracking prevents contamination C) Custody is informal D) Strict tracking prevents contamination E) Custody is lab-managed
A) They delay transport B) Protocol establishes violations, strengthening cases C) Protocol establishes violations, strengthening cases D) Inspections are random E) Inspections require permits
A) It ensures sustained compliance B) It ensures sustained compliance C) It is handled by courts D) Monitoring is not required E) Monitoring occurs during trial
A) The officer’s authority under RA 10175 supersedes all other laws B) Consent of the suspect is implied during cybercrime operations C) Exigent circumstances justify warrantless seizure if evidence is at risk of destruction D) Warrant is unnecessary for digital evidence E) Exigent circumstances justify warrantless seizure if evidence is at risk of destruction
A) Warrant to Intercept Computer Data (WICD) B) Warrant to Disclose Computer Data (WDCD) C) Warrant to Search, Seize, and Examine Computer Data (WSSECD) D) Warrant to Examine Computer Data (WECD) E) Warrant to Disclose Computer Data (WDCD)
A) Proper labeling and sealing of the storage device B) Proper labeling and sealing of the storage device C) Electronic signature by the prosecutor D) Use of the latest antivirus software E) Presentation by the arresting officer
A) WICD involves real-time data interception; WECD involves stored data examination. B) WICD applies to physical devices; WECD applies to social media accounts C) Both are identical under RA 10175 D) WICD involves real-time data interception; WECD involves stored data examination. E) WECD is issued only by the DOJ; WICD is issued by courts
A) Failure to decrypt the files B) Improper use of forensic imaging tools C) Absence of a search warrant D) Improper use of forensic imaging tools E) Lack of data backup
A) Rule 115, Rules of Criminal Procedure B) Evidence Act of 1989 C) Rule on Electronic Evidence (A.M. No. 01-7-01-SC) D) Rule on Cybercrime Warrants (A.M. No. 17-11-03-SC) E) Rule on Electronic Evidence (A.M. No. 01-7-01-SC)
A) Combines the authority to search, seize, and examine physical and digital evidence. B) Limited only to physical seizure of hardware C) Applies only to social media posts D) Combines the authority to search, seize, and examine physical and digital evidence. E) Used exclusively for interception of live chats
A) Exclusionary rule B) Fruit of the poisonous tree C) Adverse inference rule D) Plain view doctrine E) Plain view doctrine
A) First responder B) Evidence originator C) Evidence custodian D) Evidence analyst E) First responder
A) The reliability of the data source and integrity of the process used B) The reliability of the data source and integrity of the process used C) The volume of data stored D) The number of digital copies produced E) The encryption software used
A) Device encryption failure B) Remote wiping or alteration of data C) Remote wiping or alteration of data D) Increase in battery temperature E) Delay in data extraction
A) Verify that data has not been altered B) Compress the file for storage C) Encrypt the data for security D) Translate binary codes to text E) Verify that data has not been altered
A) It involves detection, containment, eradication, and recovery B) It starts only after evidence collection C) It excludes coordination with service providers D) It is optional if a warrant has been issued E) It involves detection, containment, eradication, and recovery
A) WDCD B) WECD C) WSSECD D) WICD E) WDCD
A) Best evidence rule B) Res gestae rule C) Plain view rule D) Chain of custody rule E) Best evidence rule
A) Contain the incident while preserving evidence integrity. B) Delete malicious data C) Immediately prosecute the offender D) Contain the incident while preserving evidence integrity. E) Disconnect all systems permanently
A) Jurisdiction of the court B) Chain of custody documentation C) Admissibility under RA 10175 D) Authority of the warrant E) Chain of custody documentation
A) Within ten (10) days from issuance, unless extended by the court B) Within ten (10) days from issuance, unless extended by the court C) Within twenty (20) days D) Within one (1) year E) Immediately and without limit
A) By digital signature or other security procedures proving identity B) By digital signature or other security procedures proving identity C) By oral testimony of a witness alone D) By certification from the ISP E) By submission of printed copies
A) Warrant to Block Access B) Warrant to Disclose Computer Data C) Warrant to Delete Computer Data D) Warrant to Intercept Computer Data E) Warrant to Delete Computer Data |