ThatQuiz Test Library Take this test now
Introduction to Cybercrime and Environmental Law
Contributed by: FELIZARTE
  • 1. Under R.A. 10173 (Data Privacy Act), which act constitutes a violation when a law enforcement officer unlawfully discloses personal data collected during an investigation without consent or legal basis?
A) Unauthorized disclosure of sensitive personal information, breaching privacy rights and security principles.
B) Storing data securely for future reference, without immediate use.
C) Collecting data with proper warrants, as it aligns with public interest.
D) Unauthorized disclosure of sensitive personal information, breaching privacy rights and security principles.
E) Processing data for legitimate law enforcement purposes, provided safeguards are in place.
  • 2. In R.A. 10175 (Cybercrime Prevention Act), which act constitutes a violation involving the unauthorized access to computer systems for espionage purposes?
A) Hacking into government databases to steal classified information, constituting cyber espionage.
B) Hacking into government databases to steal classified information, constituting cyber espionage.
C) Sharing public information online without malice.
D) Using encryption for personal data protection
E) Accessing systems with owner consent for maintenance.
  • 3. Under the Philippine Fisheries Code of 1998 (R.A. 8550), which act constitutes a violation when dynamite is used to catch fish in municipal waters?
A) Employing destructive methods like explosives, destroying habitats and violating conservation rules.
B) Employing destructive methods like explosives, destroying habitats and violating conservation rules.
C) Harvesting seaweed for aquaculture purposes.
D) Using sustainable fishing gear like nets in designated areas.
E) Reporting catch volumes to local authorities.
  • 4. In R.A. 9147 (Wildlife Act), which act constitutes a violation involving the illegal trade of endangered species like Philippine eagles?
A) Selling or transporting endangered wildlife without permits, threatening biodiversity.
B) Breeding protected species in captivity for conservation
C) Educating the public on wildlife preservation
D) Selling or transporting endangered wildlife without permits, threatening biodiversity.
E) Educating the public on wildlife preservation
  • 5. Under R.A. 9003 (Solid Waste Management Act), which act constitutes a violation when industrial waste is dumped in open areas without segregation?
A) Collecting waste for composting programs.
B) Educating communities on waste reduction.
C) Improper disposal of hazardous waste, polluting land and violating segregation mandates.
D) Recycling materials in designated facilities.
E) Improper disposal of hazardous waste, polluting land and violating segregation mandates.
  • 6. In R.A. 8749 (Clean Air Act), which act constitutes a violation when a factory emits pollutants exceeding emission standards without permits?
A) Releasing excessive pollutants into the atmosphere, violating emission limits and health standards.
B) Using renewable energy sources for operations.
C) Installing air quality monitoring devices.
D) Releasing excessive pollutants into the atmosphere, violating emission limits and health standards.
E) Reporting emissions to environmental agencies.
  • 7. Under R.A. 9275 (Clean Water Act), which act constitutes a violation when untreated sewage is discharged into rivers without permits?
A) Implementing watershed management plans.
B) Discharging pollutants directly into waterways, breaching water quality standards.
C) Treating wastewater before release into bodies of water.
D) Discharging pollutants directly into waterways, breaching water quality standards.
E) Monitoring water quality in protected areas.
  • 8. Under R.A. 10173, which act constitutes a violation when a law enforcement database is hacked, leading to unauthorized data processing?
A) Encrypting data for security purposes.
B) Unauthorized processing or alteration of personal data, compromising privacy.
C) Obtaining consent for data collection
D) Deleting outdated records securely
E) Unauthorized processing or alteration of personal data, compromising privacy.
  • 9. In R.A. 10175, which act constitutes a violation involving the creation and distribution of child pornography online?
A) Encrypting communications for privacy.
B) Using social media for lawful advocacy
C) Producing or distributing child sexual abuse material, constituting a severe cybercrime.
D) Producing or distributing child sexual abuse material, constituting a severe cybercrime.
E) Sharing educational content on internet safety.
  • 10. Under the Fisheries Code, which act constitutes a violation when commercial fishing occurs in marine sanctuaries without authorization?
A) Conducting research in protected areas with permits.
B) Implementing community-based fisheries management.
C) Fishing in no-take zones, destroying marine biodiversity.
D) Reporting illegal activities to authorities.
E) Fishing in no-take zones, destroying marine biodiversity.
  • 11. In R.A. 9147, which act constitutes a violation involving the destruction of critical habitats for wildlife?
A) Restoring degraded habitats legally.
B) Establishing eco-tourism zones.
C) Clearing forests for development, endangering species and violating habitat protection.
D) Monitoring wildlife populations.
E) Clearing forests for development, endangering species and violating habitat protection.
  • 12. Under R.A. 9003, which act constitutes a violation when open burning of waste is conducted in residential areas?
A) Composting organic waste properly.
B) Segregating waste for recycling.
C) Burning waste openly, releasing toxins and violating anti-burning provisions.
D) Burning waste openly, releasing toxins and violating anti-burning provisions.
E) Educating on waste segregation.
  • 13. In R.A. 8749, which act constitutes a violation when vehicles operate without emission testing in urban zones?
A) Using public transportation to reduce emissions.
B) Operating without valid emission compliance certificates, contributing to air pollution.
C) Operating without valid emission compliance certificates, contributing to air pollution.
D) Reporting vehicle maintenance.
E) Retrofitting vehicles with emission controls.
  • 14. Under R.A. 9275, which act constitutes a violation when industrial effluents are released into coastal waters without treatment?
A) Implementing pollution prevention plans.
B) Treating wastewater before release into bodies of water.
C) Discharging untreated pollutants, degrading marine ecosystems.
D) Discharging untreated pollutants, degrading marine ecosystems.
E) Monitoring effluent quality.
  • 15. Under R.A. 10173, which act constitutes a violation when personal data is collected without informing the data subject?
A) Obtaining consent for processing.
B) Providing privacy notices as required.
C) Collecting data surreptitiously, breaching transparency principles.
D) Limiting data retention periods.
E) Collecting data surreptitiously, breaching transparency principles.
  • 16. In R.A. 10175, which act constitutes a violation involving identity theft through online fraud?
A) Verifying identities securely.
B) Using secure authentication.
C) Stealing personal information for fraudulent purposes, constituting cybercrime.
D) Sharing public profiles online.
E) Stealing personal information for fraudulent purposes, constituting cybercrime.
  • 17. Under the Fisheries Code, which act constitutes a violation when cyanide is used in fishing operations?
A) Enforcing fishing bans.
B) Applying poisons to stun fish, harming ecosystems.
C) Using non-toxic methods for aquaculture.
D) Applying poisons to stun fish, harming ecosystems.
E) Monitoring fish stocks.
  • 18. In R.A. 9147, which act constitutes a violation involving poaching endangered animals for trophies?
A) Killing protected species illegally, threatening populations.
B) Conducting wildlife censuses.
C) Hunting with permits in controlled areas
D) Promoting anti-poaching campaigns.
E) Killing protected species illegally, threatening populations.
  • 19. Under R.A. 9003, which act constitutes a violation when hazardous waste is mixed with regular municipal waste?
A) Recycling hazardous materials.
B) Storing hazardous waste separately.
C) Reporting waste generation.
D) Mixing wastes improperly, increasing pollution risks.
E) Mixing wastes improperly, increasing pollution risks.
  • 20. In R.A. 8749, which act constitutes a violation when smoke-belching vehicles are allowed to operate unchecked?
A) Promoting electric vehicles
B) Monitoring air pollution levels.
C) Permitting excessive smoke emissions, violating air quality rules.
D) Enforcing emission standards.
E) Permitting excessive smoke emissions, violating air quality rules.
  • 21. Under R.A. 9275, which act constitutes a violation when oil spills occur from ships without cleanup?
A) Implementing spill prevention measures
B) Using biodegradable oils
C) Failing to contain and remediate oil discharges, polluting water bodies
D) Reporting spills immediately
E) Failing to contain and remediate oil discharges, polluting water bodies
  • 22. Under R.A. 10173, which act constitutes a violation when data is retained beyond necessary periods?
A) Auditing data inventories.
B) Obtaining consent for retention.
C) Excessive retention without justification, breaching minimization principles
D) Excessive retention without justification, breaching minimization principles
E) Deleting data after use.
  • 23. In R.A. 10175, which act constitutes a violation involving libelous online posts?
A) Fact-checking information
B) Publishing defamatory content online, constituting cyber libel.
C) Publishing defamatory content online, constituting cyber libel.
D) Using anonymous accounts legally.
E) Expressing opinions freely.
  • 24. Under the Fisheries Code, which act constitutes a violation when fishing beyond allowable catch limits?
A) Reporting catches accurately
B) Adhering to quotas.
C) Using selective gear
D) Exceeding limits, leading to overfishing.
E) Exceeding limits, leading to overfishing.
  • 25. In R.A. 9147, which act constitutes a violation involving illegal logging in wildlife reserves?
A) Enforcing logging bans.
B) Cutting trees in protected areas, destroying habitats.
C) Sustainable logging with permits.
D) Cutting trees in protected areas, destroying habitats.
E) Reforestation efforts.
  • 26. During a cybercrime investigation, an officer collects a suspect’s laptop without a warrant, citing urgency to prevent data deletion. Under the Rules on Cybercrime Warrants, which is the most proper legal justification for this action?
A) Consent of the suspect is implied during cybercrime operations.
B) Exigent circumstances justify warrantless seizure if evidence is at risk of destruction.
C) Exigent circumstances justify warrantless seizure if evidence is at risk of destruction.
D) Warrant is unnecessary for digital evidence.
E) The officer’s authority under RA 10175 supersedes all other laws.
  • 27. Which type of warrant is specifically used to authorize the collection of computer data from an online account?
A) Warrant to Disclose Computer Data (WDCD)
B) Warrant to Intercept Computer Data (WICD)
C) Warrant to Search, Seize, and Examine Computer Data (WSSECD)
D) Warrant to Examine Computer Data (WECD)
E) Warrant to Disclose Computer Data (WDCD)
  • 28. In the chain of custody for digital evidence, which step ensures the authenticity of the evidence during trial?
A) Use of the latest antivirus software
B) Electronic signature by the prosecutor
C) Proper labeling and sealing of the storage device
D) Presentation by the arresting officer
E) Proper labeling and sealing of the storage device
  • 29. Which of the following best differentiates a Warrant to Intercept Computer Data (WICD) from a Warrant to Examine Computer Data (WECD)?
A) WICD Involves real-time data interception; WECD involves stored data examination.
B) WICD applies to physical devices; WECD applies to social media accounts
C) WECD is issued only by the DOJ; WICD is issued by courts.
D) WICD Involves real-time data interception; WECD involves stored data examination.
E) Both are identical under RA 10175.
  • 30. A police cyber investigator copies the contents of a USB drive using personal software. The hash value changes after copying. What is the most likely procedural error?
A) Improper use of forensic imaging tools
B) Absence of a search warrant
C) Lack of data backup
D) Failure to decrypt the files
E) Improper use of forensic imaging tools
  • 31. Which rule primarily governs the admissibility of digital evidence in Philippine courts?
A) Rule on Cybercrime Warrants (A.M. No. 17-11-03-SC)
B) Rule 115, Rules of Criminal Procedure
C) Rule on Electronic Evidence (A.M. No. 01-7-01-SC)
D) Evidence Act of 1989
E) Rule on Electronic Evidence (A.M. No. 01-7-01-SC)
  • 32. Which best describes the scope of the Warrant to Search, Seize, and Examine Computer Data (WSSECD)?
A) Used exclusively for interception of live chats.
B) Combines the authority to search, seize, and examine physical and digital evidence.
C) Applies only to social media posts.
D) Combines the authority to search, seize, and examine physical and digital evidence.
E) Limited only to physical seizure of hardware.
  • 33. A cybercrime warrant was issued for a desktop computer but law enforcers also seized a tablet found near it. Which principle determines if such seizure is valid?
A) Adverse inference rule
B) Exclusionary rule
C) Plain view doctrine
D) Plain view doctrine
E) Fruit of the poisonous tree
  • 34. In the digital chain of custody, the first person to receive and mark the evidence is known as the:
A) First responder
B) First responder
C) Evidence analyst
D) Evidence originator
E) Evidence custodian
  • 35. When a court determines authenticity of digital evidence, it mainly requires proof of:
A) The reliability of the data source and integrity of the process used
B) The volume of data stored
C) The number of digital copies produced
D) The encryption software used
E) The reliability of the data source and integrity of the process used
  • 36. If an officer seizes a smartphone without isolating it from the network, what risk is most likely to compromise the investigation?
A) Device encryption failure
B) Delay in data extraction
C) Increase in battery temperature
D) Remote wiping or alteration of data
E) Remote wiping or alteration of data
  • 37. The hash value in digital forensics functions primarily to:
A) Compress the file for storage
B) Translate binary codes to text
C) Encrypt the data for security
D) Verify that data has not been altered
E) Verify that data has not been altered
  • 38. Which statement about incident response is most accurate?
A) It involves detection, containment, eradication, and recovery.
B) It excludes coordination with service providers.
C) It is optional if a warrant has been issued.
D) It starts only after evidence collection.
E) It involves detection, containment, eradication, and recovery.
  • 39. When law enforcement requests user data from an ISP, which warrant is required?
A) WDCD
B) WICD
C) WECD
D) WSSECD
E) WDCD
  • 40. An officer extracts only partial logs from a computer due to limited time. During trial, the defense argues incompleteness. What principle governs admissibility here?
A) Best evidence rule
B) Plain view rule
C) Res gestae rule
D) Best evidence rule
E) Chain of custody rule
  • 41. The primary goal of incident response in cybercrime is to:
A) Immediately prosecute the offender.
B) Disconnect all systems permanently.
C) Contain the incident while preserving evidence integrity.
D) Delete malicious data.
E) Contain the incident while preserving evidence integrity.
  • 42. A law enforcement agent fails to record the serial number of a seized device. What is compromised?
A) Jurisdiction of the court
B) Chain of custody documentation
C) Authority of the warrant
D) Chain of custody documentation
E) Admissibility under RA 10175
  • 43. When must a Warrant to Intercept Computer Data be executed after issuance?
A) Within one (1) year
B) Within twenty (20) days
C) Within ten (10) days from issuance, unless extended by the court
D) Immediately and without limit
E) Within ten (10) days from issuance, unless extended by the court
  • 44. Under the Rule on Electronic Evidence, how may the authenticity of an electronic document be proven?
A) By digital signature or other security procedures proving identity.
B) By oral testimony of a witness alone.
C) By submission of printed copies.
D) By digital signature or other security procedures proving identity.
E) By certification from the ISP.
  • 45. Which among the following is NOT a valid type of Cybercrime Warrant under A.M. No. 17-11-03-SC?
A) Warrant to Block Access
B) Warrant to Intercept Computer Data
C) Warrant to Delete Computer Data
D) Warrant to Delete Computer Data
E) Warrant to Disclose Computer Data
  • 46. What procedural safeguard must be followed when presenting digital evidence in court?
A) Maintenance of chain of custody with documentation and signatures.
B) Certification by a foreign expert.
C) Inclusion of suspect’s consent form.
D) Submission of encrypted files only.
E) Maintenance of chain of custody with documentation and signatures.
  • 47. A seized laptop was analyzed without a forensic image. What is the evidentiary consequence?
A) Potential inadmissibility due to alteration risk.
B) Potential inadmissibility due to alteration risk.
C) No consequence if warrant exists.
D) Automatically admissible if signed by investigator.
E) Accepted as secondary evidence.
  • 48. Which situation demonstrates improper execution of a cybercrime warrant?
A) Accessing unrelated folders outside the warrant’s scope.
B) Accessing unrelated folders outside the warrant’s scope.
C) Hashing all collected data.
D) Seizing a USB found in plain view.
E) Submitting the report within ten days.
  • 49. Digital evidence presented in court must satisfy which three criteria for admissibility?
A) Relevance, authenticity, and integrity
B) Relevance, authenticity, and integrity
C) Consent, jurisdiction, and value
D) Reliability, importance, and format
E) Quantity, quality, and accessibility
  • 50. If the evidence was obtained through an invalid cybercrime warrant, which doctrine applies to exclude it?
A) Exclusionary clause exception
B) Plain view doctrine
C) De minimis rule
D) Fruit of the poisonous tree doctrine
E) Fruit of the poisonous tree doctrine
  • 51. Under the Philippine Fisheries Code of 1998, when filing a case for illegal fishing, the law enforcement officer must first conduct a preliminary investigation. Analyze the procedural step of gathering evidence during this phase and evaluate its importance in ensuring a successful prosecution. Which of the following best describes the officer's obligation to document chain of custody for seized fishing gear?
A) The officer must establish a complete chain of custody to prevent tampering, ensuring evidentiary integrity.
B) Documentation is only required if the suspect confesses
C) The officer must photograph and label the gear but not seal it.
D) Documentation is optional if the gear is perishable.
E) The officer must establish a complete chain of custody to prevent tampering, ensuring evidentiary integrity.
  • 52. Evaluate the procedure for filing a complaint under the Fisheries Code when a violation involves dynamite fishing. If the officer determines probable cause after inspection, what is the next evaluative step in deciding whether to proceed to court, and why is this step essential for resource protection?
A) Transfer the case to a non-governmental organization.
B) Assess environmental impact to prioritize cases affecting marine ecosystems.
C) Immediately arrest the violator without further evaluation
D) Assess environmental impact to prioritize cases affecting marine ecosystems.
E) Dismiss the case if the violator offers compensation.
  • 53. In filing cases under the Fisheries Code for unauthorized aquaculture, explain the role of coordination with the Bureau of Fisheries and Aquatic Resources (BFAR) during the investigation phase. Evaluate how this coordination enhances procedural effectiveness in multi-agency enforcement.
A) Coordination only involves sharing suspect information.
B) BFAR provides technical expertise, improving evidence accuracy and case strength.
C) BFAR provides technical expertise, improving evidence accuracy and case strength.
D) Coordination is unnecessary as local officers handle all aspects.
E) It delays the process by requiring additional approvals.
  • 54. Analyze the procedure for seizing fish catch in violation of size limits under the Fisheries Code. Evaluate the officer's discretion in deciding whether to destroy perishable evidence versus preserving it, and explain the legal implications of this choice.
A) Destruction requires court approval first.
B) Preservation is preferred, but destruction is allowed with documentation to maintain chain of custody.
C) Destruction is always mandatory to avoid spoilage.
D) Preservation is preferred, but destruction is allowed with documentation to maintain chain of custody.
E) The officer has no discretion; all evidence must be preserved
  • 55. Evaluate the timeline for filing a case after detecting a Fisheries Code violation, such as illegal trawling. Explain why adhering to a 48-hour rule for preliminary reports strengthens the procedure's integrity and outcomes.
A) The rule applies only to minor violations.
B) It ensures timely evidence collection, preventing loss and upholding accountability.
C) The rule is flexible and not strictly enforced.
D) It ensures timely evidence collection, preventing loss and upholding accountability.
E) It allows indefinite delays for complex cases.
  • 56. In filing environmental cases under the Fisheries Code for coral reef destruction, analyze the requirement for environmental impact assessment during investigation. Evaluate its contribution to the overall procedure's robustness in proving culpability.
A) It provides scientific basis, enhancing evidential weight and judicial outcomes.
B) Assessment is optional and not required for filing.
C) It is only for civil, not criminal, cases.
D) It provides scientific basis, enhancing evidential weight and judicial outcomes.
E) Assessment delays filing unnecessarily.
  • 57. Explain the procedure for involving barangay officials in Fisheries Code violations like poaching. Evaluate the effectiveness of this participatory approach in community-based enforcement and its impact on case resolution.
A) Barangay involvement is mandatory for all cases.
B) Officials only witness arrests.
C) It facilitates local cooperation, improving detection and resolution rates.
D) It facilitates local cooperation, improving detection and resolution rates.
E) It complicates procedures without benefits.
  • 58. Analyze the procedural requirement for issuing a notice of violation under the Fisheries Code before formal filing. Evaluate its role in promoting compliance versus punitive action, and explain potential drawbacks in enforcement.
A) Notice is issued only after arrest.
B) Notice delays prosecution indefinitely
C) It allows violators to correct behavior, balancing deterrence with rehabilitation.
D) It allows violators to correct behavior, balancing deterrence with rehabilitation.
E) It is mandatory for all violations without exceptions.
  • 59. Evaluate the procedure for consolidating multiple Fisheries Code violations in a single case, such as combined illegal fishing and habitat destruction. Explain how this consolidation affects evidentiary analysis and judicial efficiency.
A) It requires separate filings for each violation.
B) It streamlines evidence presentation, reducing court time and strengthening linkages.
C) Consolidation only applies to civil penalties.
D) It streamlines evidence presentation, reducing court time and strengthening linkages.
E) Consolidation is prohibited to avoid complexity
  • 60. In the context of the Fisheries Code, analyze the post-filing procedure for monitoring compliance after a case is filed. Evaluate its importance in preventing recidivism and ensuring long-term environmental protection.
A) It is handled solely by the court.
B) Monitoring is optional and not enforced.
C) It involves follow-up inspections, deterring future violations through accountability.
D) It involves follow-up inspections, deterring future violations through accountability.
E) Monitoring occurs only during trial.
  • 61. Under R.A. 9147, analyze the initial step in filing a case for illegal wildlife trade, involving seizure of endangered species. Evaluate the officer's duty to consult with the Department of Environment and Natural Resources (DENR) and its impact on procedural accuracy.
A) It requires approval before any action.
B) DENR expertise ensures proper identification, enhancing case validity.
C) Consultation only involves paperwork.
D) DENR expertise ensures proper identification, enhancing case validity.
E) Consultation is optional for routine seizures.
  • 62. Evaluate the procedure for documenting wildlife confiscation under the Wildlife Act. Explain how photographic and video evidence strengthens admissibility and evaluates the procedure's role in combating poaching networks.
A) Visual evidence provides irrefutable proof, aiding in network disruption.
B) It is unnecessary if the animal is alive.
C) Documentation is limited to written reports
D) Visual evidence provides irrefutable proof, aiding in network disruption.
E) Documentation delays seizure.
  • 63. Analyze the coordination with Protected Area Management Boards (PAMBs) in filing Wildlife Act cases for habitat encroachment. Evaluate this step's effectiveness in integrating local governance and its implications for case outcomes.
A) PAMBs have no role in enforcement.
B) Coordination leverages local knowledge, improving detection and resolution.
C) It complicates jurisdiction.
D) Coordination leverages local knowledge, improving detection and resolution
E) PAMBs only approve permits.
  • 64. Evaluate the timeline for filing a complaint after wildlife seizure under R.A. 9147. Explain the rationale for a 72-hour filing rule and its evaluation in maintaining evidence integrity.
A) It prevents evidence degradation, ensuring timely prosecution.
B) Filing can be delayed indefinitely
C) It prevents evidence degradation, ensuring timely prosecution.
D) It applies only to dead specimens.
E) The rule is discretionary.
  • 65. In filing cases for illegal possession of wildlife products, analyze the requirement for forensic analysis. Evaluate its contribution to proving intent and the procedure's overall robustness.
A) Analysis requires court order first.
B) It only identifies species.
C) Analysis is optional for common species
D) It establishes origin and illegality, strengthening culpability.
E) It establishes origin and illegality, strengthening culpability.
  • 66. Explain the procedure for involving NGOs in Wildlife Act enforcement. Evaluate the benefits and potential conflicts in this participatory approach for filing cases.
A) NGOs are excluded from procedures.
B) They provide resources, enhancing capacity but risking bias.
C) Involvement is mandatory.
D) NGOs only handle rehabilitation.
E) They provide resources, enhancing capacity but risking bias.
  • 67. Analyze the post-seizure procedure for wildlife rehabilitation under R.A. 9147. Evaluate its integration into case filing and impact on judicial outcomes.
A) It delays prosecution.
B) It ensures animal welfare, potentially influencing plea deals.
C) It ensures animal welfare, potentially influencing plea deals.
D) Rehabilitation is separate from filing.
E) Rehabilitation is not required.
  • 68. Evaluate the procedure for assessing penalties in Wildlife Act cases. Explain how environmental impact evaluation influences filing decisions and promotes deterrence.
A) Assessment is post-trial
B) It only considers economic loss
C) Impact assessment tailors penalties, deterring severe violations.
D) Impact assessment tailors penalties, deterring severe violations.
E) Penalties are fixed.
  • 69. Analyze the role of chain of custody in Wildlife Act seizures. Evaluate its necessity in preventing tampering and ensuring procedural integrity.
A) Custody is court-managed
B) Strict documentation maintains evidence reliability
C) Custody is informal
D) Strict documentation maintains evidence reliability
E) It applies only to live animals
  • 70. Evaluate the procedure for filing joint cases with other agencies under R.A. 9147. Explain its effectiveness in addressing cross-border wildlife trafficking
A) It pools resources, improving transnational enforcement
B) It pools resources, improving transnational enforcement
C) Joint cases are rare
D) Joint filing is prohibited
E) It complicates jurisdiction
  • 71. Under R.A. 9003, analyze the procedure for inspecting illegal dumpsites. Evaluate the officer's use of sampling in evidence gathering and its role in proving violations.
A) It provides representative evidence, strengthening cases
B) Sampling requires lab approval
C) It only identifies waste types
D) It provides representative evidence, strengthening cases
E) Sampling is unnecessary
  • 72. Evaluate the filing procedure for non-compliance with waste segregation under the Act. Explain the notice-to-comply step and its evaluative impact on voluntary correction.
A) It is mandatory for all cases.
B) It promotes compliance, reducing litigation
C) It promotes compliance, reducing litigation
D) Notice is issued post-arrest
E) Notice is punitive
  • 73. Analyze coordination with local government units (LGUs) in filing Solid Waste Act cases. Evaluate its effectiveness in decentralized enforcement
A) LGUs have no role
B) LGUs only issue permits.
C) Coordination ensures local implementation, improving outcomes
D) Coordination ensures local implementation, improving outcomes
E) It creates overlaps
  • 74. Evaluate the timeline for reporting violations under R.A. 9003. Explain the 24-hour rule's rationale and its evaluation in evidence preservation
A) It ensures prompt action, maintaining integrity
B) Reporting can be delayed
C) The rule is flexible
D) It ensures prompt action, maintaining integrity
E) It applies to minor issues only
  • 75. Analyze the procedure for seizing hazardous waste. Evaluate documentation requirements and their impact on admissibility.
A) Seizure requires court order
B) Documentation is minimal
C) Documentation is post-seizure
D) Detailed records ensure evidentiary strength
E) Detailed records ensure evidentiary strength
  • 76. Explain the role of environmental monitoring in filing cases. Evaluate its contribution to ongoing compliance under the Act.
A) Monitoring is optional
B) It is court-ordered
C) Monitoring delays filing.
D) It detects violations early, aiding prevention
E) It detects violations early, aiding prevention
  • 77. Evaluate the procedure for involving waste generators in corrective actions. Explain its evaluative role in case resolution.
A) Involvement encourages responsibility, resolving issues
B) Involvement encourages responsibility, resolving issues
C) Generators are not involved
D) It complicates procedures
E) Generators only pay fines
  • 78. Analyze chain of custody for waste samples. Evaluate its necessity in forensic analysis and procedural integrity
A) It applies to non-hazardous waste only
B) Custody is lab-managed
C) Strict tracking prevents contamination
D) Strict tracking prevents contamination
E) Custody is informal
  • 79. Evaluate the filing of cases for illegal waste transport. Explain the inspection protocol and its impact on proving intent
A) They delay transport
B) Inspections are random
C) Protocol establishes violations, strengthening cases
D) Inspections require permits
E) Protocol establishes violations, strengthening cases
  • 80. Analyze post-filing monitoring under R.A. 9003. Evaluate its role in preventing recidivism and long-term waste management
A) It is handled by courts
B) Monitoring occurs during trial
C) Monitoring is not required
D) It ensures sustained compliance
E) It ensures sustained compliance
  • 81. During a cybercrime investigation, an officer collects a suspect’s laptop without a warrant, citing urgency to prevent data deletion. Under the Rules on Cybercrime Warrants, which is the most proper legal justification for this action?
A) Exigent circumstances justify warrantless seizure if evidence is at risk of destruction
B) Warrant is unnecessary for digital evidence
C) Consent of the suspect is implied during cybercrime operations
D) The officer’s authority under RA 10175 supersedes all other laws
E) Exigent circumstances justify warrantless seizure if evidence is at risk of destruction
  • 82. Which type of warrant is specifically used to authorize the collection of computer data from an online account?
A) Warrant to Disclose Computer Data (WDCD)
B) Warrant to Intercept Computer Data (WICD)
C) Warrant to Search, Seize, and Examine Computer Data (WSSECD)
D) Warrant to Examine Computer Data (WECD)
E) Warrant to Disclose Computer Data (WDCD)
  • 83. In the chain of custody for digital evidence, which step ensures the authenticity of the evidence during trial?
A) Presentation by the arresting officer
B) Electronic signature by the prosecutor
C) Proper labeling and sealing of the storage device
D) Use of the latest antivirus software
E) Proper labeling and sealing of the storage device
  • 84. Which of the following best differentiates a Warrant to Intercept Computer Data (WICD) from a Warrant to Examine Computer Data (WECD)?
A) WECD is issued only by the DOJ; WICD is issued by courts
B) WICD applies to physical devices; WECD applies to social media accounts
C) Both are identical under RA 10175
D) WICD involves real-time data interception; WECD involves stored data examination.
E) WICD involves real-time data interception; WECD involves stored data examination.
  • 85. A police cyber investigator copies the contents of a USB drive using personal software. The hash value changes after copying. What is the most likely procedural error?
A) Failure to decrypt the files
B) Improper use of forensic imaging tools
C) Lack of data backup
D) Improper use of forensic imaging tools
E) Absence of a search warrant
  • 86. Which rule primarily governs the admissibility of digital evidence in Philippine courts?
A) Rule on Electronic Evidence (A.M. No. 01-7-01-SC)
B) Evidence Act of 1989
C) Rule 115, Rules of Criminal Procedure
D) Rule on Cybercrime Warrants (A.M. No. 17-11-03-SC)
E) Rule on Electronic Evidence (A.M. No. 01-7-01-SC)
  • 87. Which best describes the scope of the Warrant to Search, Seize, and Examine Computer Data (WSSECD)?
A) Combines the authority to search, seize, and examine physical and digital evidence.
B) Combines the authority to search, seize, and examine physical and digital evidence.
C) Limited only to physical seizure of hardware
D) Used exclusively for interception of live chats
E) Applies only to social media posts
  • 88. A cybercrime warrant was issued for a desktop computer but law enforcers also seized a tablet found near it. Which principle determines if such seizure is valid?
A) Plain view doctrine
B) Fruit of the poisonous tree
C) Plain view doctrine
D) Adverse inference rule
E) Exclusionary rule
  • 89. In the digital chain of custody, the first person to receive and mark the evidence is known as the:
A) Evidence custodian
B) First responder
C) First responder
D) Evidence originator
E) Evidence analyst
  • 90. When a court determines authenticity of digital evidence, it mainly requires proof of:
A) The reliability of the data source and integrity of the process used
B) The encryption software used
C) The number of digital copies produced
D) The volume of data stored
E) The reliability of the data source and integrity of the process used
  • 91. If an officer seizes a smartphone without isolating it from the network, what risk is most likely to compromise the investigation?
A) Remote wiping or alteration of data
B) Delay in data extraction
C) Device encryption failure
D) Increase in battery temperature
E) Remote wiping or alteration of data
  • 92. The hash value in digital forensics functions primarily to:
A) Verify that data has not been altered
B) Verify that data has not been altered
C) Translate binary codes to text
D) Encrypt the data for security
E) Compress the file for storage
  • 93. Which statement about incident response is most accurate?
A) It is optional if a warrant has been issued
B) It involves detection, containment, eradication, and recovery
C) It involves detection, containment, eradication, and recovery
D) It starts only after evidence collection
E) It excludes coordination with service providers
  • 94. When law enforcement requests user data from an ISP, which warrant is required?
A) WDCD
B) WDCD
C) WSSECD
D) WICD
E) WECD
  • 95. An officer extracts only partial logs from a computer due to limited time. During trial, the defense argues incompleteness. What principle governs admissibility here?
A) Best evidence rule
B) Res gestae rule
C) Best evidence rule
D) Plain view rule
E) Chain of custody rule
  • 96. The primary goal of incident response in cybercrime is to:
A) Disconnect all systems permanently
B) Immediately prosecute the offender
C) Delete malicious data
D) Contain the incident while preserving evidence integrity.
E) Contain the incident while preserving evidence integrity.
  • 97. A law enforcement agent fails to record the serial number of a seized device. What is compromised?
A) Jurisdiction of the court
B) Chain of custody documentation
C) Authority of the warrant
D) Chain of custody documentation
E) Admissibility under RA 10175
  • 98. When must a Warrant to Intercept Computer Data be executed after issuance?
A) Immediately and without limit
B) Within twenty (20) days
C) Within one (1) year
D) Within ten (10) days from issuance, unless extended by the court
E) Within ten (10) days from issuance, unless extended by the court
  • 99. Under the Rule on Electronic Evidence, how may the authenticity of an electronic document be proven?
A) By submission of printed copies
B) By digital signature or other security procedures proving identity
C) By oral testimony of a witness alone
D) By digital signature or other security procedures proving identity
E) By certification from the ISP
  • 100. Which among the following is NOT a valid type of Cybercrime Warrant under A.M. No. 17-11-03-SC?
A) Warrant to Delete Computer Data
B) Warrant to Block Access
C) Warrant to Disclose Computer Data
D) Warrant to Intercept Computer Data
E) Warrant to Delete Computer Data
Created with That Quiz — where test making and test taking are made easy for math and other subject areas.