A) Collecting shells from the beach during low tide B) Using a simple hook and line to catch fish in a marine sanctuary C) Fishing with a net in an inland pond D) Harvesting seaweed manually
A) Documenting wild deer in a nature reserve B) Feeding birds in public parks C) Rescuing a critically endangered animal and transferring it to a private zoo without coordination with DENR D) Breeding native geckos in a private residence for personal observation
A) Donating recyclables to a junk shop B) Burning leaves in a compost pit C) Dumping segregated biodegradable waste on a private lot without an environmental clearance D) Using paper bags instead of plastic
A) Personal belief that air quality is poor B) Presence of smoke but no scientific data C) Absence of a business permit alone D) Violation of National Ambient Air Quality Standards through documented emissions
A) Treating wastewater on-site before discharge B) Discharging effluents within the allowable limits C) Failing to report a chemical spill that flowed into a nearby creek D) Submitting quarterly self-monitoring reports
A) A witness testimony from a third-party observer B) Verbal confession without supporting physical evidence C) A social media post showing wildlife photos D) A confiscated live specimen with transport documents lacking perinits
A) Separating garbage in color-coded bins B) Openly dumping untreated hospital waste along a riverbank C) Storing recyclables in a warehouse with LGU permission D) Partnering with a certified private hauler for waste disposal
A) RA 9003-Solid Waste Management Act B) RA 8550 Fisheries Code C) RA 9147- Wildlife Act D) RA 9275-Philippine Clean Water Act
A) A violation of RA 9003 for coastal solid waste issues B) legal act under the Clean Water Act C) A civil offense only under local ordinances D) A violation of RA 8550 due to intrusion and unauthorized fishing gear use
A) Business registration of the offending com B) Testimony of a resident who smelled fumes C) Environmental Compliance Certificate (ECC) on record D) Technical data proving emission limits were exceeded and failure failure to act despite notice
A) municipal trial courts B) specialized appellate courts C) specialized cybercrime D) designated regional trial courts
A) 10 days B) 30 days C) 15 days D) 5 days
A) Supreme Court B) Office of the Ombudsman C) designated cybercrime court with jurisdiction D) Municipal Trial Courts
A) Presidential Decree No. 1829 B) Republic Act No. 4200 C) Republic Act No. 8484 D) Republic Act No. 10175
A) 12 months from the date of receipt of the order B) 6 months from the date of the transaction C) 12 months from the date of the transaction D) 6 mouths from the date of receipt of the order
A) within 48 hours of the incident B) within 72 hours of receiving the order C) at their own discretion D) upon receipt of complaint
A) 30 days B) 45 days C) 20 days D) 15 days
A) to seek judicial approval for the interception B) to inform the defendant of the activities C) to request further investigation D) to provide evidence for the court
A) intercepting real-time data transfers B) examining data from a lawful arrest C) searching a specific location for items to be seized and/or examined D) listening to electronic communications
A) . Warrant to Search, Seize and Examine Computer Data B) Warrant to Intercept Computer Data C) Warrant to Examine Computer Data D) Warrant to Disclose Computer Data
A) psychological profiling B) physical evidence left unconsciously C) emotions and stress D) human witnesses' accounts
A) engagement of digital forensic exarniner B) physical search of the area C) identification of potential evidence D) immediate disconnection of devices
A) Immediately turn it on to assess content. B) Conduct a "bag and tag" procedure C) Disconnect the internet for security D) Inform the OIC of its presence
A) Technology and Online Crime B) Technical Offense Control C) Tactical Operations Center D) Telecommunications and Communications
A) The power supply is disconnected B) An expert is consulted C) A warrant has been issued D) They are free from malware
A) Leave it off to avoid altering evidence B) Remove the power supply C) Turn it off on briefly for documentation D) Conduct a thorough examination
A) Disconnect from all networks immediately. B) Pull the power cable or remove the battery. C) Proceed with forensic analysis right away D) Verify installation of anti-forensic systems
A) Initiate immediate forensic analysis B) Promptly turn it on for data retrieval C) Avoid turning it on until processed with guarantees D) Consult the suspect for access codes
A) Checking for encryption systems. B) Moving equipment that is operational. C) Switching device off without proper authorization. D) Documenting incidents arising during copying of document
A) testimony by a witness B) authentication by the judge C) sworn statement by a competent person D) presentation by the prosecutor
A) the prosecutor B) the person who made the recording C) the judge D) the court clerk
A) It should be presented only to the prosecutor. B) It should be explained by the defense attorney C) It should be not displayed in court. D) it must be shown, identified, and authenticated by competent person.
A) by the testimony of someone involved or with personal knowledge B) by testifying the accuracy by the defense lawyer C) by submitting it directly to the court clerk D) by presenting the evidence to the judge
A) reliability of the originator B) manner of storage C) name of the investigator D) manner of generation |