A) Storing data securely for future reference, without immediate use. B) Processing data for legitimate law enforcement purposes, provided safeguards are in place. C) Unauthorized disclosure of sensitive personal information, breaching privacy rights and security principles. D) Unauthorized disclosure of sensitive personal information, breaching privacy rights and security principles. E) Collecting data with proper warrants, as it aligns with public interest.
A) Accessing systems with owner consent for maintenance. B) Hacking into government databases to steal classified information, constituting cyber espionage. C) Sharing public information online without malice. D) Hacking into government databases to steal classified information, constituting cyber espionage. E) Using encryption for personal data protection
A) Harvesting seaweed for aquaculture purposes. B) Employing destructive methods like explosives, destroying habitats and violating conservation rules. C) Reporting catch volumes to local authorities. D) Employing destructive methods like explosives, destroying habitats and violating conservation rules. E) Using sustainable fishing gear like nets in designated areas.
A) Selling or transporting endangered wildlife without permits, threatening biodiversity. B) Breeding protected species in captivity for conservation C) Educating the public on wildlife preservation D) Selling or transporting endangered wildlife without permits, threatening biodiversity. E) Educating the public on wildlife preservation
A) Collecting waste for composting programs. B) Improper disposal of hazardous waste, polluting land and violating segregation mandates. C) Recycling materials in designated facilities. D) Educating communities on waste reduction. E) Improper disposal of hazardous waste, polluting land and violating segregation mandates.
A) Releasing excessive pollutants into the atmosphere, violating emission limits and health standards. B) Using renewable energy sources for operations. C) Releasing excessive pollutants into the atmosphere, violating emission limits and health standards. D) Reporting emissions to environmental agencies. E) Installing air quality monitoring devices.
A) Implementing watershed management plans. B) Discharging pollutants directly into waterways, breaching water quality standards. C) Treating wastewater before release into bodies of water. D) Discharging pollutants directly into waterways, breaching water quality standards. E) Monitoring water quality in protected areas.
A) Deleting outdated records securely B) Obtaining consent for data collection C) Encrypting data for security purposes. D) Unauthorized processing or alteration of personal data, compromising privacy. E) Unauthorized processing or alteration of personal data, compromising privacy.
A) Producing or distributing child sexual abuse material, constituting a severe cybercrime. B) Encrypting communications for privacy. C) Using social media for lawful advocacy D) Producing or distributing child sexual abuse material, constituting a severe cybercrime. E) Sharing educational content on internet safety.
A) Implementing community-based fisheries management. B) Fishing in no-take zones, destroying marine biodiversity. C) Fishing in no-take zones, destroying marine biodiversity. D) Conducting research in protected areas with permits. E) Reporting illegal activities to authorities.
A) Monitoring wildlife populations. B) Establishing eco-tourism zones. C) Clearing forests for development, endangering species and violating habitat protection. D) Clearing forests for development, endangering species and violating habitat protection. E) Restoring degraded habitats legally.
A) Composting organic waste properly. B) Educating on waste segregation. C) Burning waste openly, releasing toxins and violating anti-burning provisions. D) Segregating waste for recycling. E) Burning waste openly, releasing toxins and violating anti-burning provisions.
A) Operating without valid emission compliance certificates, contributing to air pollution. B) Retrofitting vehicles with emission controls. C) Reporting vehicle maintenance. D) Operating without valid emission compliance certificates, contributing to air pollution. E) Using public transportation to reduce emissions.
A) Treating wastewater before release into bodies of water. B) Discharging untreated pollutants, degrading marine ecosystems. C) Discharging untreated pollutants, degrading marine ecosystems. D) Implementing pollution prevention plans. E) Monitoring effluent quality.
A) Providing privacy notices as required. B) Collecting data surreptitiously, breaching transparency principles. C) Limiting data retention periods. D) Collecting data surreptitiously, breaching transparency principles. E) Obtaining consent for processing.
A) Using secure authentication. B) Stealing personal information for fraudulent purposes, constituting cybercrime. C) Stealing personal information for fraudulent purposes, constituting cybercrime. D) Verifying identities securely. E) Sharing public profiles online.
A) Enforcing fishing bans. B) Applying poisons to stun fish, harming ecosystems. C) Using non-toxic methods for aquaculture. D) Applying poisons to stun fish, harming ecosystems. E) Monitoring fish stocks.
A) Hunting with permits in controlled areas B) Promoting anti-poaching campaigns. C) Killing protected species illegally, threatening populations. D) Killing protected species illegally, threatening populations. E) Conducting wildlife censuses.
A) Mixing wastes improperly, increasing pollution risks. B) Mixing wastes improperly, increasing pollution risks. C) Storing hazardous waste separately. D) Recycling hazardous materials. E) Reporting waste generation.
A) Monitoring air pollution levels. B) Enforcing emission standards. C) Promoting electric vehicles D) Permitting excessive smoke emissions, violating air quality rules. E) Permitting excessive smoke emissions, violating air quality rules.
A) Failing to contain and remediate oil discharges, polluting water bodies B) Implementing spill prevention measures C) Using biodegradable oils D) Reporting spills immediately E) Failing to contain and remediate oil discharges, polluting water bodies
A) Auditing data inventories. B) Deleting data after use. C) Excessive retention without justification, breaching minimization principles D) Excessive retention without justification, breaching minimization principles E) Obtaining consent for retention.
A) Using anonymous accounts legally. B) Expressing opinions freely. C) Fact-checking information D) Publishing defamatory content online, constituting cyber libel. E) Publishing defamatory content online, constituting cyber libel.
A) Exceeding limits, leading to overfishing. B) Exceeding limits, leading to overfishing. C) Adhering to quotas. D) Reporting catches accurately E) Using selective gear
A) Reforestation efforts. B) Cutting trees in protected areas, destroying habitats. C) Cutting trees in protected areas, destroying habitats. D) Sustainable logging with permits. E) Enforcing logging bans.
A) Exigent circumstances justify warrantless seizure if evidence is at risk of destruction. B) The officer’s authority under RA 10175 supersedes all other laws. C) Consent of the suspect is implied during cybercrime operations. D) Exigent circumstances justify warrantless seizure if evidence is at risk of destruction. E) Warrant is unnecessary for digital evidence.
A) Warrant to Intercept Computer Data (WICD) B) Warrant to Examine Computer Data (WECD) C) Warrant to Disclose Computer Data (WDCD) D) Warrant to Search, Seize, and Examine Computer Data (WSSECD) E) Warrant to Disclose Computer Data (WDCD)
A) Use of the latest antivirus software B) Proper labeling and sealing of the storage device C) Proper labeling and sealing of the storage device D) Electronic signature by the prosecutor E) Presentation by the arresting officer
A) WECD is issued only by the DOJ; WICD is issued by courts. B) WICD applies to physical devices; WECD applies to social media accounts C) WICD Involves real-time data interception; WECD involves stored data examination. D) WICD Involves real-time data interception; WECD involves stored data examination. E) Both are identical under RA 10175.
A) Improper use of forensic imaging tools B) Failure to decrypt the files C) Absence of a search warrant D) Lack of data backup E) Improper use of forensic imaging tools
A) Rule on Electronic Evidence (A.M. No. 01-7-01-SC) B) Rule on Electronic Evidence (A.M. No. 01-7-01-SC) C) Rule on Cybercrime Warrants (A.M. No. 17-11-03-SC) D) Rule 115, Rules of Criminal Procedure E) Evidence Act of 1989
A) Combines the authority to search, seize, and examine physical and digital evidence. B) Combines the authority to search, seize, and examine physical and digital evidence. C) Limited only to physical seizure of hardware. D) Applies only to social media posts. E) Used exclusively for interception of live chats.
A) Adverse inference rule B) Fruit of the poisonous tree C) Exclusionary rule D) Plain view doctrine E) Plain view doctrine
A) Evidence custodian B) First responder C) Evidence originator D) Evidence analyst E) First responder
A) The number of digital copies produced B) The encryption software used C) The reliability of the data source and integrity of the process used D) The volume of data stored E) The reliability of the data source and integrity of the process used
A) Remote wiping or alteration of data B) Increase in battery temperature C) Remote wiping or alteration of data D) Delay in data extraction E) Device encryption failure
A) Compress the file for storage B) Translate binary codes to text C) Encrypt the data for security D) Verify that data has not been altered E) Verify that data has not been altered
A) It excludes coordination with service providers. B) It involves detection, containment, eradication, and recovery. C) It involves detection, containment, eradication, and recovery. D) It starts only after evidence collection. E) It is optional if a warrant has been issued.
A) WICD B) WECD C) WDCD D) WSSECD E) WDCD
A) Best evidence rule B) Plain view rule C) Res gestae rule D) Best evidence rule E) Chain of custody rule
A) Contain the incident while preserving evidence integrity. B) Contain the incident while preserving evidence integrity. C) Disconnect all systems permanently. D) Delete malicious data. E) Immediately prosecute the offender.
A) Jurisdiction of the court B) Chain of custody documentation C) Chain of custody documentation D) Authority of the warrant E) Admissibility under RA 10175
A) Immediately and without limit B) Within ten (10) days from issuance, unless extended by the court C) Within ten (10) days from issuance, unless extended by the court D) Within twenty (20) days E) Within one (1) year
A) By submission of printed copies. B) By oral testimony of a witness alone. C) By digital signature or other security procedures proving identity. D) By digital signature or other security procedures proving identity. E) By certification from the ISP.
A) Warrant to Delete Computer Data B) Warrant to Disclose Computer Data C) Warrant to Block Access D) Warrant to Delete Computer Data E) Warrant to Intercept Computer Data
A) Maintenance of chain of custody with documentation and signatures. B) Maintenance of chain of custody with documentation and signatures. C) Certification by a foreign expert. D) Inclusion of suspect’s consent form. E) Submission of encrypted files only.
A) No consequence if warrant exists. B) Accepted as secondary evidence. C) Automatically admissible if signed by investigator. D) Potential inadmissibility due to alteration risk. E) Potential inadmissibility due to alteration risk.
A) Submitting the report within ten days. B) Hashing all collected data. C) Accessing unrelated folders outside the warrant’s scope. D) Accessing unrelated folders outside the warrant’s scope. E) Seizing a USB found in plain view.
A) Relevance, authenticity, and integrity B) Consent, jurisdiction, and value C) Quantity, quality, and accessibility D) Relevance, authenticity, and integrity E) Reliability, importance, and format
A) Exclusionary clause exception B) Fruit of the poisonous tree doctrine C) De minimis rule D) Fruit of the poisonous tree doctrine E) Plain view doctrine
A) The officer must establish a complete chain of custody to prevent tampering, ensuring evidentiary integrity. B) The officer must photograph and label the gear but not seal it. C) Documentation is optional if the gear is perishable. D) Documentation is only required if the suspect confesses E) The officer must establish a complete chain of custody to prevent tampering, ensuring evidentiary integrity.
A) Assess environmental impact to prioritize cases affecting marine ecosystems. B) Transfer the case to a non-governmental organization. C) Dismiss the case if the violator offers compensation. D) Assess environmental impact to prioritize cases affecting marine ecosystems. E) Immediately arrest the violator without further evaluation
A) Coordination is unnecessary as local officers handle all aspects. B) BFAR provides technical expertise, improving evidence accuracy and case strength. C) BFAR provides technical expertise, improving evidence accuracy and case strength. D) It delays the process by requiring additional approvals. E) Coordination only involves sharing suspect information.
A) Preservation is preferred, but destruction is allowed with documentation to maintain chain of custody. B) Destruction requires court approval first. C) Destruction is always mandatory to avoid spoilage. D) The officer has no discretion; all evidence must be preserved E) Preservation is preferred, but destruction is allowed with documentation to maintain chain of custody.
A) The rule applies only to minor violations. B) It ensures timely evidence collection, preventing loss and upholding accountability. C) It allows indefinite delays for complex cases. D) It ensures timely evidence collection, preventing loss and upholding accountability. E) The rule is flexible and not strictly enforced.
A) It is only for civil, not criminal, cases. B) It provides scientific basis, enhancing evidential weight and judicial outcomes. C) Assessment delays filing unnecessarily. D) It provides scientific basis, enhancing evidential weight and judicial outcomes. E) Assessment is optional and not required for filing.
A) It complicates procedures without benefits. B) Barangay involvement is mandatory for all cases. C) Officials only witness arrests. D) It facilitates local cooperation, improving detection and resolution rates. E) It facilitates local cooperation, improving detection and resolution rates.
A) It allows violators to correct behavior, balancing deterrence with rehabilitation. B) It allows violators to correct behavior, balancing deterrence with rehabilitation. C) It is mandatory for all violations without exceptions. D) Notice is issued only after arrest. E) Notice delays prosecution indefinitely
A) It streamlines evidence presentation, reducing court time and strengthening linkages. B) It requires separate filings for each violation. C) Consolidation is prohibited to avoid complexity D) Consolidation only applies to civil penalties. E) It streamlines evidence presentation, reducing court time and strengthening linkages.
A) Monitoring occurs only during trial. B) It involves follow-up inspections, deterring future violations through accountability. C) Monitoring is optional and not enforced. D) It is handled solely by the court. E) It involves follow-up inspections, deterring future violations through accountability.
A) Consultation only involves paperwork. B) Consultation is optional for routine seizures. C) DENR expertise ensures proper identification, enhancing case validity. D) It requires approval before any action. E) DENR expertise ensures proper identification, enhancing case validity.
A) Documentation delays seizure. B) Visual evidence provides irrefutable proof, aiding in network disruption. C) Visual evidence provides irrefutable proof, aiding in network disruption. D) It is unnecessary if the animal is alive. E) Documentation is limited to written reports
A) It complicates jurisdiction. B) Coordination leverages local knowledge, improving detection and resolution C) PAMBs have no role in enforcement. D) Coordination leverages local knowledge, improving detection and resolution. E) PAMBs only approve permits.
A) Filing can be delayed indefinitely B) The rule is discretionary. C) It prevents evidence degradation, ensuring timely prosecution. D) It prevents evidence degradation, ensuring timely prosecution. E) It applies only to dead specimens.
A) It establishes origin and illegality, strengthening culpability. B) It establishes origin and illegality, strengthening culpability. C) Analysis is optional for common species D) Analysis requires court order first. E) It only identifies species.
A) NGOs only handle rehabilitation. B) NGOs are excluded from procedures. C) They provide resources, enhancing capacity but risking bias. D) Involvement is mandatory. E) They provide resources, enhancing capacity but risking bias.
A) Rehabilitation is not required. B) It delays prosecution. C) It ensures animal welfare, potentially influencing plea deals. D) It ensures animal welfare, potentially influencing plea deals. E) Rehabilitation is separate from filing.
A) Penalties are fixed. B) It only considers economic loss C) Assessment is post-trial D) Impact assessment tailors penalties, deterring severe violations. E) Impact assessment tailors penalties, deterring severe violations.
A) It applies only to live animals B) Custody is informal C) Strict documentation maintains evidence reliability D) Custody is court-managed E) Strict documentation maintains evidence reliability
A) It pools resources, improving transnational enforcement B) It complicates jurisdiction C) Joint filing is prohibited D) Joint cases are rare E) It pools resources, improving transnational enforcement
A) Sampling is unnecessary B) It provides representative evidence, strengthening cases C) It only identifies waste types D) Sampling requires lab approval E) It provides representative evidence, strengthening cases
A) It is mandatory for all cases. B) It promotes compliance, reducing litigation C) It promotes compliance, reducing litigation D) Notice is punitive E) Notice is issued post-arrest
A) Coordination ensures local implementation, improving outcomes B) LGUs only issue permits. C) LGUs have no role D) It creates overlaps E) Coordination ensures local implementation, improving outcomes
A) Reporting can be delayed B) It applies to minor issues only C) It ensures prompt action, maintaining integrity D) It ensures prompt action, maintaining integrity E) The rule is flexible
A) Detailed records ensure evidentiary strength B) Documentation is post-seizure C) Detailed records ensure evidentiary strength D) Seizure requires court order E) Documentation is minimal
A) Monitoring delays filing. B) It detects violations early, aiding prevention C) It is court-ordered D) Monitoring is optional E) It detects violations early, aiding prevention
A) It complicates procedures B) Involvement encourages responsibility, resolving issues C) Generators only pay fines D) Generators are not involved E) Involvement encourages responsibility, resolving issues
A) Strict tracking prevents contamination B) Strict tracking prevents contamination C) It applies to non-hazardous waste only D) Custody is lab-managed E) Custody is informal
A) Protocol establishes violations, strengthening cases B) Protocol establishes violations, strengthening cases C) Inspections require permits D) Inspections are random E) They delay transport
A) Monitoring is not required B) It ensures sustained compliance C) Monitoring occurs during trial D) It is handled by courts E) It ensures sustained compliance
A) Exigent circumstances justify warrantless seizure if evidence is at risk of destruction B) The officer’s authority under RA 10175 supersedes all other laws C) Warrant is unnecessary for digital evidence D) Consent of the suspect is implied during cybercrime operations E) Exigent circumstances justify warrantless seizure if evidence is at risk of destruction
A) Warrant to Examine Computer Data (WECD) B) Warrant to Intercept Computer Data (WICD) C) Warrant to Search, Seize, and Examine Computer Data (WSSECD) D) Warrant to Disclose Computer Data (WDCD) E) Warrant to Disclose Computer Data (WDCD)
A) Proper labeling and sealing of the storage device B) Presentation by the arresting officer C) Electronic signature by the prosecutor D) Proper labeling and sealing of the storage device E) Use of the latest antivirus software
A) WICD applies to physical devices; WECD applies to social media accounts B) WICD involves real-time data interception; WECD involves stored data examination. C) Both are identical under RA 10175 D) WECD is issued only by the DOJ; WICD is issued by courts E) WICD involves real-time data interception; WECD involves stored data examination.
A) Improper use of forensic imaging tools B) Improper use of forensic imaging tools C) Absence of a search warrant D) Failure to decrypt the files E) Lack of data backup
A) Rule on Electronic Evidence (A.M. No. 01-7-01-SC) B) Rule 115, Rules of Criminal Procedure C) Evidence Act of 1989 D) Rule on Electronic Evidence (A.M. No. 01-7-01-SC) E) Rule on Cybercrime Warrants (A.M. No. 17-11-03-SC)
A) Combines the authority to search, seize, and examine physical and digital evidence. B) Combines the authority to search, seize, and examine physical and digital evidence. C) Limited only to physical seizure of hardware D) Applies only to social media posts E) Used exclusively for interception of live chats
A) Adverse inference rule B) Plain view doctrine C) Plain view doctrine D) Fruit of the poisonous tree E) Exclusionary rule
A) First responder B) Evidence analyst C) Evidence originator D) Evidence custodian E) First responder
A) The reliability of the data source and integrity of the process used B) The number of digital copies produced C) The volume of data stored D) The encryption software used E) The reliability of the data source and integrity of the process used
A) Remote wiping or alteration of data B) Device encryption failure C) Delay in data extraction D) Remote wiping or alteration of data E) Increase in battery temperature
A) Encrypt the data for security B) Compress the file for storage C) Verify that data has not been altered D) Verify that data has not been altered E) Translate binary codes to text
A) It is optional if a warrant has been issued B) It involves detection, containment, eradication, and recovery C) It starts only after evidence collection D) It involves detection, containment, eradication, and recovery E) It excludes coordination with service providers
A) WDCD B) WECD C) WDCD D) WSSECD E) WICD
A) Best evidence rule B) Best evidence rule C) Plain view rule D) Chain of custody rule E) Res gestae rule
A) Disconnect all systems permanently B) Contain the incident while preserving evidence integrity. C) Contain the incident while preserving evidence integrity. D) Immediately prosecute the offender E) Delete malicious data
A) Chain of custody documentation B) Jurisdiction of the court C) Admissibility under RA 10175 D) Chain of custody documentation E) Authority of the warrant
A) Within ten (10) days from issuance, unless extended by the court B) Immediately and without limit C) Within ten (10) days from issuance, unless extended by the court D) Within one (1) year E) Within twenty (20) days
A) By submission of printed copies B) By oral testimony of a witness alone C) By digital signature or other security procedures proving identity D) By digital signature or other security procedures proving identity E) By certification from the ISP
A) Warrant to Delete Computer Data B) Warrant to Delete Computer Data C) Warrant to Disclose Computer Data D) Warrant to Intercept Computer Data E) Warrant to Block Access |