A) Unauthorized disclosure of sensitive personal information, breaching privacy rights and security principles. B) Storing data securely for future reference, without immediate use. C) Collecting data with proper warrants, as it aligns with public interest. D) Unauthorized disclosure of sensitive personal information, breaching privacy rights and security principles. E) Processing data for legitimate law enforcement purposes, provided safeguards are in place.
A) Hacking into government databases to steal classified information, constituting cyber espionage. B) Hacking into government databases to steal classified information, constituting cyber espionage. C) Sharing public information online without malice. D) Using encryption for personal data protection E) Accessing systems with owner consent for maintenance.
A) Employing destructive methods like explosives, destroying habitats and violating conservation rules. B) Employing destructive methods like explosives, destroying habitats and violating conservation rules. C) Harvesting seaweed for aquaculture purposes. D) Using sustainable fishing gear like nets in designated areas. E) Reporting catch volumes to local authorities.
A) Selling or transporting endangered wildlife without permits, threatening biodiversity. B) Breeding protected species in captivity for conservation C) Educating the public on wildlife preservation D) Selling or transporting endangered wildlife without permits, threatening biodiversity. E) Educating the public on wildlife preservation
A) Collecting waste for composting programs. B) Educating communities on waste reduction. C) Improper disposal of hazardous waste, polluting land and violating segregation mandates. D) Recycling materials in designated facilities. E) Improper disposal of hazardous waste, polluting land and violating segregation mandates.
A) Releasing excessive pollutants into the atmosphere, violating emission limits and health standards. B) Using renewable energy sources for operations. C) Installing air quality monitoring devices. D) Releasing excessive pollutants into the atmosphere, violating emission limits and health standards. E) Reporting emissions to environmental agencies.
A) Implementing watershed management plans. B) Discharging pollutants directly into waterways, breaching water quality standards. C) Treating wastewater before release into bodies of water. D) Discharging pollutants directly into waterways, breaching water quality standards. E) Monitoring water quality in protected areas.
A) Encrypting data for security purposes. B) Unauthorized processing or alteration of personal data, compromising privacy. C) Obtaining consent for data collection D) Deleting outdated records securely E) Unauthorized processing or alteration of personal data, compromising privacy.
A) Encrypting communications for privacy. B) Using social media for lawful advocacy C) Producing or distributing child sexual abuse material, constituting a severe cybercrime. D) Producing or distributing child sexual abuse material, constituting a severe cybercrime. E) Sharing educational content on internet safety.
A) Conducting research in protected areas with permits. B) Implementing community-based fisheries management. C) Fishing in no-take zones, destroying marine biodiversity. D) Reporting illegal activities to authorities. E) Fishing in no-take zones, destroying marine biodiversity.
A) Restoring degraded habitats legally. B) Establishing eco-tourism zones. C) Clearing forests for development, endangering species and violating habitat protection. D) Monitoring wildlife populations. E) Clearing forests for development, endangering species and violating habitat protection.
A) Composting organic waste properly. B) Segregating waste for recycling. C) Burning waste openly, releasing toxins and violating anti-burning provisions. D) Burning waste openly, releasing toxins and violating anti-burning provisions. E) Educating on waste segregation.
A) Using public transportation to reduce emissions. B) Operating without valid emission compliance certificates, contributing to air pollution. C) Operating without valid emission compliance certificates, contributing to air pollution. D) Reporting vehicle maintenance. E) Retrofitting vehicles with emission controls.
A) Implementing pollution prevention plans. B) Treating wastewater before release into bodies of water. C) Discharging untreated pollutants, degrading marine ecosystems. D) Discharging untreated pollutants, degrading marine ecosystems. E) Monitoring effluent quality.
A) Obtaining consent for processing. B) Providing privacy notices as required. C) Collecting data surreptitiously, breaching transparency principles. D) Limiting data retention periods. E) Collecting data surreptitiously, breaching transparency principles.
A) Verifying identities securely. B) Using secure authentication. C) Stealing personal information for fraudulent purposes, constituting cybercrime. D) Sharing public profiles online. E) Stealing personal information for fraudulent purposes, constituting cybercrime.
A) Enforcing fishing bans. B) Applying poisons to stun fish, harming ecosystems. C) Using non-toxic methods for aquaculture. D) Applying poisons to stun fish, harming ecosystems. E) Monitoring fish stocks.
A) Killing protected species illegally, threatening populations. B) Conducting wildlife censuses. C) Hunting with permits in controlled areas D) Promoting anti-poaching campaigns. E) Killing protected species illegally, threatening populations.
A) Recycling hazardous materials. B) Storing hazardous waste separately. C) Reporting waste generation. D) Mixing wastes improperly, increasing pollution risks. E) Mixing wastes improperly, increasing pollution risks.
A) Promoting electric vehicles B) Monitoring air pollution levels. C) Permitting excessive smoke emissions, violating air quality rules. D) Enforcing emission standards. E) Permitting excessive smoke emissions, violating air quality rules.
A) Implementing spill prevention measures B) Using biodegradable oils C) Failing to contain and remediate oil discharges, polluting water bodies D) Reporting spills immediately E) Failing to contain and remediate oil discharges, polluting water bodies
A) Auditing data inventories. B) Obtaining consent for retention. C) Excessive retention without justification, breaching minimization principles D) Excessive retention without justification, breaching minimization principles E) Deleting data after use.
A) Fact-checking information B) Publishing defamatory content online, constituting cyber libel. C) Publishing defamatory content online, constituting cyber libel. D) Using anonymous accounts legally. E) Expressing opinions freely.
A) Reporting catches accurately B) Adhering to quotas. C) Using selective gear D) Exceeding limits, leading to overfishing. E) Exceeding limits, leading to overfishing.
A) Enforcing logging bans. B) Cutting trees in protected areas, destroying habitats. C) Sustainable logging with permits. D) Cutting trees in protected areas, destroying habitats. E) Reforestation efforts.
A) Consent of the suspect is implied during cybercrime operations. B) Exigent circumstances justify warrantless seizure if evidence is at risk of destruction. C) Exigent circumstances justify warrantless seizure if evidence is at risk of destruction. D) Warrant is unnecessary for digital evidence. E) The officer’s authority under RA 10175 supersedes all other laws.
A) Warrant to Disclose Computer Data (WDCD) B) Warrant to Intercept Computer Data (WICD) C) Warrant to Search, Seize, and Examine Computer Data (WSSECD) D) Warrant to Examine Computer Data (WECD) E) Warrant to Disclose Computer Data (WDCD)
A) Use of the latest antivirus software B) Electronic signature by the prosecutor C) Proper labeling and sealing of the storage device D) Presentation by the arresting officer E) Proper labeling and sealing of the storage device
A) WICD Involves real-time data interception; WECD involves stored data examination. B) WICD applies to physical devices; WECD applies to social media accounts C) WECD is issued only by the DOJ; WICD is issued by courts. D) WICD Involves real-time data interception; WECD involves stored data examination. E) Both are identical under RA 10175.
A) Improper use of forensic imaging tools B) Absence of a search warrant C) Lack of data backup D) Failure to decrypt the files E) Improper use of forensic imaging tools
A) Rule on Cybercrime Warrants (A.M. No. 17-11-03-SC) B) Rule 115, Rules of Criminal Procedure C) Rule on Electronic Evidence (A.M. No. 01-7-01-SC) D) Evidence Act of 1989 E) Rule on Electronic Evidence (A.M. No. 01-7-01-SC)
A) Used exclusively for interception of live chats. B) Combines the authority to search, seize, and examine physical and digital evidence. C) Applies only to social media posts. D) Combines the authority to search, seize, and examine physical and digital evidence. E) Limited only to physical seizure of hardware.
A) Adverse inference rule B) Exclusionary rule C) Plain view doctrine D) Plain view doctrine E) Fruit of the poisonous tree
A) First responder B) First responder C) Evidence analyst D) Evidence originator E) Evidence custodian
A) The reliability of the data source and integrity of the process used B) The volume of data stored C) The number of digital copies produced D) The encryption software used E) The reliability of the data source and integrity of the process used
A) Device encryption failure B) Delay in data extraction C) Increase in battery temperature D) Remote wiping or alteration of data E) Remote wiping or alteration of data
A) Compress the file for storage B) Translate binary codes to text C) Encrypt the data for security D) Verify that data has not been altered E) Verify that data has not been altered
A) It involves detection, containment, eradication, and recovery. B) It excludes coordination with service providers. C) It is optional if a warrant has been issued. D) It starts only after evidence collection. E) It involves detection, containment, eradication, and recovery.
A) WDCD B) WICD C) WECD D) WSSECD E) WDCD
A) Best evidence rule B) Plain view rule C) Res gestae rule D) Best evidence rule E) Chain of custody rule
A) Immediately prosecute the offender. B) Disconnect all systems permanently. C) Contain the incident while preserving evidence integrity. D) Delete malicious data. E) Contain the incident while preserving evidence integrity.
A) Jurisdiction of the court B) Chain of custody documentation C) Authority of the warrant D) Chain of custody documentation E) Admissibility under RA 10175
A) Within one (1) year B) Within twenty (20) days C) Within ten (10) days from issuance, unless extended by the court D) Immediately and without limit E) Within ten (10) days from issuance, unless extended by the court
A) By digital signature or other security procedures proving identity. B) By oral testimony of a witness alone. C) By submission of printed copies. D) By digital signature or other security procedures proving identity. E) By certification from the ISP.
A) Warrant to Block Access B) Warrant to Intercept Computer Data C) Warrant to Delete Computer Data D) Warrant to Delete Computer Data E) Warrant to Disclose Computer Data
A) Maintenance of chain of custody with documentation and signatures. B) Certification by a foreign expert. C) Inclusion of suspect’s consent form. D) Submission of encrypted files only. E) Maintenance of chain of custody with documentation and signatures.
A) Potential inadmissibility due to alteration risk. B) Potential inadmissibility due to alteration risk. C) No consequence if warrant exists. D) Automatically admissible if signed by investigator. E) Accepted as secondary evidence.
A) Accessing unrelated folders outside the warrant’s scope. B) Accessing unrelated folders outside the warrant’s scope. C) Hashing all collected data. D) Seizing a USB found in plain view. E) Submitting the report within ten days.
A) Relevance, authenticity, and integrity B) Relevance, authenticity, and integrity C) Consent, jurisdiction, and value D) Reliability, importance, and format E) Quantity, quality, and accessibility
A) Exclusionary clause exception B) Plain view doctrine C) De minimis rule D) Fruit of the poisonous tree doctrine E) Fruit of the poisonous tree doctrine
A) The officer must establish a complete chain of custody to prevent tampering, ensuring evidentiary integrity. B) Documentation is only required if the suspect confesses C) The officer must photograph and label the gear but not seal it. D) Documentation is optional if the gear is perishable. E) The officer must establish a complete chain of custody to prevent tampering, ensuring evidentiary integrity.
A) Transfer the case to a non-governmental organization. B) Assess environmental impact to prioritize cases affecting marine ecosystems. C) Immediately arrest the violator without further evaluation D) Assess environmental impact to prioritize cases affecting marine ecosystems. E) Dismiss the case if the violator offers compensation.
A) Coordination only involves sharing suspect information. B) BFAR provides technical expertise, improving evidence accuracy and case strength. C) BFAR provides technical expertise, improving evidence accuracy and case strength. D) Coordination is unnecessary as local officers handle all aspects. E) It delays the process by requiring additional approvals.
A) Destruction requires court approval first. B) Preservation is preferred, but destruction is allowed with documentation to maintain chain of custody. C) Destruction is always mandatory to avoid spoilage. D) Preservation is preferred, but destruction is allowed with documentation to maintain chain of custody. E) The officer has no discretion; all evidence must be preserved
A) The rule applies only to minor violations. B) It ensures timely evidence collection, preventing loss and upholding accountability. C) The rule is flexible and not strictly enforced. D) It ensures timely evidence collection, preventing loss and upholding accountability. E) It allows indefinite delays for complex cases.
A) It provides scientific basis, enhancing evidential weight and judicial outcomes. B) Assessment is optional and not required for filing. C) It is only for civil, not criminal, cases. D) It provides scientific basis, enhancing evidential weight and judicial outcomes. E) Assessment delays filing unnecessarily.
A) Barangay involvement is mandatory for all cases. B) Officials only witness arrests. C) It facilitates local cooperation, improving detection and resolution rates. D) It facilitates local cooperation, improving detection and resolution rates. E) It complicates procedures without benefits.
A) Notice is issued only after arrest. B) Notice delays prosecution indefinitely C) It allows violators to correct behavior, balancing deterrence with rehabilitation. D) It allows violators to correct behavior, balancing deterrence with rehabilitation. E) It is mandatory for all violations without exceptions.
A) It requires separate filings for each violation. B) It streamlines evidence presentation, reducing court time and strengthening linkages. C) Consolidation only applies to civil penalties. D) It streamlines evidence presentation, reducing court time and strengthening linkages. E) Consolidation is prohibited to avoid complexity
A) It is handled solely by the court. B) Monitoring is optional and not enforced. C) It involves follow-up inspections, deterring future violations through accountability. D) It involves follow-up inspections, deterring future violations through accountability. E) Monitoring occurs only during trial.
A) It requires approval before any action. B) DENR expertise ensures proper identification, enhancing case validity. C) Consultation only involves paperwork. D) DENR expertise ensures proper identification, enhancing case validity. E) Consultation is optional for routine seizures.
A) Visual evidence provides irrefutable proof, aiding in network disruption. B) It is unnecessary if the animal is alive. C) Documentation is limited to written reports D) Visual evidence provides irrefutable proof, aiding in network disruption. E) Documentation delays seizure.
A) PAMBs have no role in enforcement. B) Coordination leverages local knowledge, improving detection and resolution. C) It complicates jurisdiction. D) Coordination leverages local knowledge, improving detection and resolution E) PAMBs only approve permits.
A) It prevents evidence degradation, ensuring timely prosecution. B) Filing can be delayed indefinitely C) It prevents evidence degradation, ensuring timely prosecution. D) It applies only to dead specimens. E) The rule is discretionary.
A) Analysis requires court order first. B) It only identifies species. C) Analysis is optional for common species D) It establishes origin and illegality, strengthening culpability. E) It establishes origin and illegality, strengthening culpability.
A) NGOs are excluded from procedures. B) They provide resources, enhancing capacity but risking bias. C) Involvement is mandatory. D) NGOs only handle rehabilitation. E) They provide resources, enhancing capacity but risking bias.
A) It delays prosecution. B) It ensures animal welfare, potentially influencing plea deals. C) It ensures animal welfare, potentially influencing plea deals. D) Rehabilitation is separate from filing. E) Rehabilitation is not required.
A) Assessment is post-trial B) It only considers economic loss C) Impact assessment tailors penalties, deterring severe violations. D) Impact assessment tailors penalties, deterring severe violations. E) Penalties are fixed.
A) Custody is court-managed B) Strict documentation maintains evidence reliability C) Custody is informal D) Strict documentation maintains evidence reliability E) It applies only to live animals
A) It pools resources, improving transnational enforcement B) It pools resources, improving transnational enforcement C) Joint cases are rare D) Joint filing is prohibited E) It complicates jurisdiction
A) It provides representative evidence, strengthening cases B) Sampling requires lab approval C) It only identifies waste types D) It provides representative evidence, strengthening cases E) Sampling is unnecessary
A) It is mandatory for all cases. B) It promotes compliance, reducing litigation C) It promotes compliance, reducing litigation D) Notice is issued post-arrest E) Notice is punitive
A) LGUs have no role B) LGUs only issue permits. C) Coordination ensures local implementation, improving outcomes D) Coordination ensures local implementation, improving outcomes E) It creates overlaps
A) It ensures prompt action, maintaining integrity B) Reporting can be delayed C) The rule is flexible D) It ensures prompt action, maintaining integrity E) It applies to minor issues only
A) Seizure requires court order B) Documentation is minimal C) Documentation is post-seizure D) Detailed records ensure evidentiary strength E) Detailed records ensure evidentiary strength
A) Monitoring is optional B) It is court-ordered C) Monitoring delays filing. D) It detects violations early, aiding prevention E) It detects violations early, aiding prevention
A) Involvement encourages responsibility, resolving issues B) Involvement encourages responsibility, resolving issues C) Generators are not involved D) It complicates procedures E) Generators only pay fines
A) It applies to non-hazardous waste only B) Custody is lab-managed C) Strict tracking prevents contamination D) Strict tracking prevents contamination E) Custody is informal
A) They delay transport B) Inspections are random C) Protocol establishes violations, strengthening cases D) Inspections require permits E) Protocol establishes violations, strengthening cases
A) It is handled by courts B) Monitoring occurs during trial C) Monitoring is not required D) It ensures sustained compliance E) It ensures sustained compliance
A) Exigent circumstances justify warrantless seizure if evidence is at risk of destruction B) Warrant is unnecessary for digital evidence C) Consent of the suspect is implied during cybercrime operations D) The officer’s authority under RA 10175 supersedes all other laws E) Exigent circumstances justify warrantless seizure if evidence is at risk of destruction
A) Warrant to Disclose Computer Data (WDCD) B) Warrant to Intercept Computer Data (WICD) C) Warrant to Search, Seize, and Examine Computer Data (WSSECD) D) Warrant to Examine Computer Data (WECD) E) Warrant to Disclose Computer Data (WDCD)
A) Presentation by the arresting officer B) Electronic signature by the prosecutor C) Proper labeling and sealing of the storage device D) Use of the latest antivirus software E) Proper labeling and sealing of the storage device
A) WECD is issued only by the DOJ; WICD is issued by courts B) WICD applies to physical devices; WECD applies to social media accounts C) Both are identical under RA 10175 D) WICD involves real-time data interception; WECD involves stored data examination. E) WICD involves real-time data interception; WECD involves stored data examination.
A) Failure to decrypt the files B) Improper use of forensic imaging tools C) Lack of data backup D) Improper use of forensic imaging tools E) Absence of a search warrant
A) Rule on Electronic Evidence (A.M. No. 01-7-01-SC) B) Evidence Act of 1989 C) Rule 115, Rules of Criminal Procedure D) Rule on Cybercrime Warrants (A.M. No. 17-11-03-SC) E) Rule on Electronic Evidence (A.M. No. 01-7-01-SC)
A) Combines the authority to search, seize, and examine physical and digital evidence. B) Combines the authority to search, seize, and examine physical and digital evidence. C) Limited only to physical seizure of hardware D) Used exclusively for interception of live chats E) Applies only to social media posts
A) Plain view doctrine B) Fruit of the poisonous tree C) Plain view doctrine D) Adverse inference rule E) Exclusionary rule
A) Evidence custodian B) First responder C) First responder D) Evidence originator E) Evidence analyst
A) The reliability of the data source and integrity of the process used B) The encryption software used C) The number of digital copies produced D) The volume of data stored E) The reliability of the data source and integrity of the process used
A) Remote wiping or alteration of data B) Delay in data extraction C) Device encryption failure D) Increase in battery temperature E) Remote wiping or alteration of data
A) Verify that data has not been altered B) Verify that data has not been altered C) Translate binary codes to text D) Encrypt the data for security E) Compress the file for storage
A) It is optional if a warrant has been issued B) It involves detection, containment, eradication, and recovery C) It involves detection, containment, eradication, and recovery D) It starts only after evidence collection E) It excludes coordination with service providers
A) WDCD B) WDCD C) WSSECD D) WICD E) WECD
A) Best evidence rule B) Res gestae rule C) Best evidence rule D) Plain view rule E) Chain of custody rule
A) Disconnect all systems permanently B) Immediately prosecute the offender C) Delete malicious data D) Contain the incident while preserving evidence integrity. E) Contain the incident while preserving evidence integrity.
A) Jurisdiction of the court B) Chain of custody documentation C) Authority of the warrant D) Chain of custody documentation E) Admissibility under RA 10175
A) Immediately and without limit B) Within twenty (20) days C) Within one (1) year D) Within ten (10) days from issuance, unless extended by the court E) Within ten (10) days from issuance, unless extended by the court
A) By submission of printed copies B) By digital signature or other security procedures proving identity C) By oral testimony of a witness alone D) By digital signature or other security procedures proving identity E) By certification from the ISP
A) Warrant to Delete Computer Data B) Warrant to Block Access C) Warrant to Disclose Computer Data D) Warrant to Intercept Computer Data E) Warrant to Delete Computer Data |