A) . To conduct a surprise raid B) . To immediately obtain a confession C) To gather accurate information and clarify facts D) . To intimidate the suspect
A) Direct questioning B) Rapid-fire questioning C) Leading questioning D) Cognitive interviewing
A) Reid technique B) Physical intimidation C) Forceful confrontation D) Covert surveillance
A) Their innocence B) Only the elements of the crime C) The entire criminal act D) Facts that may indicate involvement but not the full criminal liability
A) It must be coerced under pressure B) It must be made to any person C) It must be voluntarily made D) It must be made in front of the media
A) They are only valid if the declarant survives B) They are inadmissible unless a judge witnesses them C) They are admissible even without corroboration if the declarant believes death is imminent D) They must be notarized
A) . A statement that independently proves facts of the case B) . A statement made to the police immediately after arrest C) A statement made to influence another witness D) A confession made under duress
A) Open-ended narrative B) Polygraph testing C) Note-taking D) Passive observation
A) Absence of threats, inducement, or coercion B) Intimidation by authorities C) Presence of media witnesses D) Immediate police confrontation
A) Structured B) Cognitive C) Narrative D) Informal
A) The suspect must be informed of their rights B) It must be made knowingly and intelligently C) . It must be voluntary D) It must include a public apology
A) Gathering physical evidence B) Encouraging suspects to lie C) Conducting surveillance D) Using confrontation and behavioral analysis to elicit a confession
A) It was written and notarized B) It was recorded on video C) It was signed in front of police D) The declarant was aware death was imminent
A) Relies on threats to elicit statements B) Focuses on witness memory retrieval through context reinstatement C) Is conducted without asking questions D) Forces the suspect to provide a confession
A) Ignore contradictions B) Use the statement only as hearsay C) Accept the statement at face value D) Verify the statement independently without coercion
A) Leading questions B) Confrontational interrogation C) Cognitive interviewing D) Rapid questioning
A) Admissible in court B) Admissible in court C) Considered independent relevant statement D) Presumed involuntary and inadmissible
A) Immediately arrest anyone nearby B) Publicly shame the suspect C) Elicit the truth from a suspect D) Obtain evidence through coercion
A) Using physical pressure B) Threatening the suspect with punishment C) Advising the suspect of their right to remain silent D) Conducting the interrogation in private
A) Made voluntarily and without prompting B) Requires police supervision C) Given only after a court order D) Needs corroboration to be valid
A) Listen actively and encourage detailed narratives B) Ask leading questions to force answers C) Interrupt the witness frequently D) Focus on irrelevant facts
A) Reid Technique B) Direct confrontation C) Cognitive interviewing D) Passive observation
A) Knowledge of rights B) . Recording of the confession C) Threats or promises made by law enforcement D) Voluntary nature
A) . A hearsay statement B) An admission C) A voluntary confession D) A dying declaration
A) Can you describe everything that happened that day?” B) Was the door locked?” C) Did you see him take the money?” D) You didn’t hit anyone, right?”
A) . An acknowledgment of some facts that may establish a crime but stops short of full guilt B) Statement without any factual basis C) Complete confession of guilt D) Statement by a third party
A) Coercive B) Cognitive C) Investigative D) Informational
A) The declarant knew death was imminent B) The statement is recorded immediately C) It is read aloud in court D) The statement is notarized
A) Inadmissible due to coercion B) Admissible C) Automatically valid D) Considered independent relevant statement
A) Rapid-fire questioning B) Cognitive interviewing C) Leading questions D) Confrontational interrogation
A) Must involve a police officer B) Statement must be voluntary and independent of coercion C) Must be repeated multiple times D) Must be made publicly
A) Doctrine of independent evidence B) Rule against hearsay C) Miranda rights D) Principle of voluntariness
A) Ignoring witness responses B) Repeating questions rapidly C) Friendly and neutral demeanor D) Aggressive confrontation
A) Coerced under threat B) Made without awareness of rights C) Given to a third party only D) Voluntary, knowing, and intelligent
A) Require the presence of legal counsel B) Ignore the timing of the statement C) Determine if the declarant believed death was imminent D) Treat it as hearsay by default
A) Leading questions B) Cognitive interviewing C) Rapid questioning D) Coercive interrogation
A) Only if the declarant testifies B) Never C) Only if it is corroborated D) Even without the declarant being present
A) Admission is given in court; confession is private B) Admission is always false; confession is always true C) Admission acknowledges some facts; confession acknowledges full criminal responsibility D) Admission is voluntary; confession is always coerced
A) They require corroboration B) They must be witnessed by two officers C) . They are inadmissible unless signed D) They are exceptions to the hearsay rule
A) . It can identify deception or inconsistencies B) It makes the suspect nervous C) It forces a confession D) It substitutes for evidence
A) Leading question B) Coerced statement C) . Admission or confession D) Hearsay
A) . Physical intimidation B) Direct questioning with threats C) Behavioral analysis of the suspect’s story D) Forced written confession
A) Independent relevant statement B) Hearsay evidence C) Coerced confession D) Dying declaration
A) Speed of confession B) Presence of media C) Voluntariness and knowledge of rights D) Prior criminal record
A) Standardized questions asked in a pre-determined order B) Aggressive interrogation C) Random questions without structure D) Surprise questioning
A) Reid technique B) Public humiliation C) Polygraph-assisted interview D) Cognitive interviewing
A) Admission B) Coerced statement C) Hearsay D) Full confession
A) The need for witnesses B) The requirement for a judge’s approval C) The belief that a person is unlikely to lie when facing imminent death D) The requirement for notarization
A) Taken after threats B) Voluntary, informed, and without coercion C) Taken in a public forum D) Taken secretly with intimidation
A) Accept statements at face value B) Ignore inconsistencies C) Only record confessions, not admissions D) Correlate statements with independent evidence for reliability
A) Theft involves intimidation; robbery does not B) Theft is committed only in commercial establishments; robbery is not C) Robbery involves violence or intimidation; theft does not D) Robbery requires prior consent of the victim; theft does not
A) Misappropriation or conversion of property through deceit B) Killing a person to gain property C) Breaking and entering a house D) Taking personal property by intimidation
A) Only review surveillance footage B) Forensic and medical examination with crime scene documentation C) ocus solely on recovering stolen property D) Interview witnesses only
A) The value of the property B) Number of victims C) Whether the property is movable or immovable D) Presence of deceit or fraudulent intent
A) Verifying the victim’s prior consent B) Checking fingerprints only C) . Interviewing neighbors D) Establishing proof of deceit or misrepresentation
A) Seizing unrelated evidence in nearby areas B) Filing an administrative report C) In-depth financial profiling of the suspect D) Eyewitness identification and CCTV review
A) Only dwelling robbery requires victim testimony B) Robbery in a dwelling is punishable more severely due to violation of personal security C) Public robbery requires prior planning; dwelling does not D) Use of firearms is prohibited in dwelling robbery
A) Public announcement B) Consent from neighbors C) Verbal permission from the suspect D) Court-issued warrant or lawful seizure
A) Recovering the stolen item B) Proving actual taking without consent C) Proving motive D) Establishing prior criminal record
A) Public opinion B) . The weather during the incident C) Physical evidence and witness statements P D) The social media accounts of neighbors
A) Imprisonment of 6 months B) Fine only C) Community service D) Reclusion temporal to death
A) Breaking into a house B) Theft of personal jewelry C) Taking a motor vehicle with intent to gain D) Kidnapping for ransom
A) . Interviewing neighbors only B) . Filing a complaint with barangay officials C) Verifying vehicle ownership and tracing its location D) Ignoring CCTV footage
A) . Victim’s income record B) The suspect’s prior unrelated offenses C) . Vehicle registration and plate number D) Public sentiment
A) Number of suspects involved B) Type of vehicle used C) Location of the vehicle D) Use of physical harm or intimidation during the crime
A) Reviewing traffic camera footage and GPS tracking B) Seizing property in nearby towns C) Forensic analysis of tire marks D) nterviewing unrelated witnesses
A) . Kidnapping for ransom B) Selling stolen goods knowingly C) Forgery of documents D) Theft of livestock only
A) P.D. 1612 B) . R.A. 9160 C) R.A. 9208 D) . R.A. 6539
A) Ensure the admissibility of recovered vehicle in court B) Reduce police workload C) . Increase public awareness D) Protect suspect’s rights
A) Conducting surprise inspections only in schools B) Random public announcements C) Asking the media to report thefts D) . Surveillance and monitoring of known “hot spots
A) Theft of property B) . Force, coercion, or deception for exploitation C) Illegal importation of goods D) Simple kidnapping without intent
A) Minors and women in trafficking-related sexual exploitation B) Bank account holders C) Private property owners D) Vehicle owners
A) . Search unrelated areas B) Ignore digital evidence C) . Locate and rescue victims safely D) Arrest suspects immediately without plan
A) . Trace recruitment, transport, and exploitation stages B) . Ignore online communication records C) . Focus solely on financial transactions D) . Avoid interviewing victims
A) . R.A. 9160 B) . R.A. 6539 C) P.D. 1612 D) . R.A. 9208
A) Public announcements only B) Filing reports without rescue operations C) . Coordinating with social welfare agencies and local authorities D) . Ignoring forensic digital evidence
A) Owning a private vehicle B) Small personal spending C) . Unusually large or frequent money transfers from unknown sources D) Attending community events
A) . Identifying recruiters, victims, and financial transactions B) . Ignoring online chats C) Publicly disclosing personal data D) Monitoring unrelated social media
A) Financial fraud B) . Vehicle carnapping C) . Prevention of trafficking in persons, especially women and children D) . Only property theft
A) . Understanding and analyzing patterns of recruitment and exploitation B) Recording weather data C) . Memorizing names only D) Ignoring financial evidence
A) . Recovery – reporting to authorities B) Integration – using money for business investment C) . Placement – introducing illicit funds into the financial system D) Layering – separating illicit funds from origin
A) Layering B) Exploitation C) Placement D) Integration
A) No financial movement occurs B) Assets are seized by authorities C) Money appears legitimate for investment or business D) Money is stolen physically
A) . RA 6539 B) . RA 9160 C) . RA 9208 D) . PD 1612
A) Repeating reports B) Memorizing laws only C) Analyzing D) Remembering
A) . RA 9208 – Human Trafficking B) . RA 9160 – Anti-Money Laundering Act C) RA 10364 – Expanded Anti-Rape D) . RA 6539 – Anti-Carnapping
A) Integration only B) Recovery only C) None of the above D) . Placement and layering
A) Customer Due Diligence (CDD) and reporting of suspicious transactions B) Ignoring large transactions C) Asking media for information D) Random inspections of homes
A) . Routine payroll deposits B) Small daily purchases C) Structuring transactions to avoid reporting requirements D) . Buying groceries with cash
A) Ignoring financial flows B) Memorizing case files only C) Tracing illicit money, linking to suspects, and analyzing transaction patterns D) Confiscating property randomly
A) Interviewing only neighbors B) . Ignoring digital evidence C) Filing separate complaints without coordination D) Multi-agency coordination, evidence tracing, forensic and financial analysis
A) Seize unrelated property B) . Examine digital contracts, trace financial transfers, and interview parties involved C) . Only ask victims for statements D) Ignore electronic evidence
A) . Only weather records B) . Vehicle/asset registration, GPS tracking, financial transactions C) Only eyewitness statements D) . Random surveillance
A) Following money trails, linking proceeds to suspects, and recovering property B) Conducting public surveys C) Arresting without warrants D) Only recovering stolen property
A) . Filing reports without evidence B) Memorizing laws only C) Ability to analyze multiple crime patterns, link them to laws, and plan coordinated interventions D) Asking for public opinion
A) Understanding recruitment, exploitation, and fund movement stages B) Interviewing unrelated parties C) . Ignoring financial records D) . Confiscating vehicles randomly
A) . PD 1612 – Anti-Fencing B) . RA 9160 – AML C) RPC – Theft provisions only D) . RA 6539 – Anti-Carnapping
A) Writing press releases B) Public speaking skills C) . Analytical skills to identify patterns, connections, and evidence chains D) Only memorization of laws
A) Public opinion can replace evidence B) Arrest without warrant is preferred C) . Media exposure ensures conviction D) Evidence must be legally obtained to ensure admissibility
A) Recover property, prosecute offenders, protect victims, and prevent recurrence B) Publicize the case C) Only arrest suspects D) Only file reports |