A) . To conduct a surprise raid B) To gather accurate information and clarify facts C) . To intimidate the suspect D) . To immediately obtain a confession
A) Leading questioning B) Direct questioning C) Rapid-fire questioning D) Cognitive interviewing
A) Physical intimidation B) Forceful confrontation C) Covert surveillance D) Reid technique
A) Facts that may indicate involvement but not the full criminal liability B) Their innocence C) The entire criminal act D) Only the elements of the crime
A) It must be coerced under pressure B) It must be made in front of the media C) It must be voluntarily made D) It must be made to any person
A) They must be notarized B) They are admissible even without corroboration if the declarant believes death is imminent C) They are only valid if the declarant survives D) They are inadmissible unless a judge witnesses them
A) A statement made to influence another witness B) A confession made under duress C) . A statement made to the police immediately after arrest D) . A statement that independently proves facts of the case
A) Note-taking B) Open-ended narrative C) Passive observation D) Polygraph testing
A) Intimidation by authorities B) Immediate police confrontation C) Presence of media witnesses D) Absence of threats, inducement, or coercion
A) Structured B) Informal C) Cognitive D) Narrative
A) It must be made knowingly and intelligently B) It must include a public apology C) The suspect must be informed of their rights D) . It must be voluntary
A) Using confrontation and behavioral analysis to elicit a confession B) Conducting surveillance C) Gathering physical evidence D) Encouraging suspects to lie
A) The declarant was aware death was imminent B) It was signed in front of police C) It was recorded on video D) It was written and notarized
A) Is conducted without asking questions B) Forces the suspect to provide a confession C) Relies on threats to elicit statements D) Focuses on witness memory retrieval through context reinstatement
A) Accept the statement at face value B) Ignore contradictions C) Use the statement only as hearsay D) Verify the statement independently without coercion
A) Confrontational interrogation B) Rapid questioning C) Leading questions D) Cognitive interviewing
A) Admissible in court B) Presumed involuntary and inadmissible C) Considered independent relevant statement D) Admissible in court
A) Obtain evidence through coercion B) Elicit the truth from a suspect C) Immediately arrest anyone nearby D) Publicly shame the suspect
A) Using physical pressure B) Threatening the suspect with punishment C) Advising the suspect of their right to remain silent D) Conducting the interrogation in private
A) Given only after a court order B) Made voluntarily and without prompting C) Needs corroboration to be valid D) Requires police supervision
A) Interrupt the witness frequently B) Listen actively and encourage detailed narratives C) Ask leading questions to force answers D) Focus on irrelevant facts
A) Direct confrontation B) Reid Technique C) Passive observation D) Cognitive interviewing
A) Knowledge of rights B) . Recording of the confession C) Threats or promises made by law enforcement D) Voluntary nature
A) An admission B) . A hearsay statement C) A voluntary confession D) A dying declaration
A) You didn’t hit anyone, right?” B) Was the door locked?” C) Can you describe everything that happened that day?” D) Did you see him take the money?”
A) Statement by a third party B) Complete confession of guilt C) . An acknowledgment of some facts that may establish a crime but stops short of full guilt D) Statement without any factual basis
A) Cognitive B) Coercive C) Informational D) Investigative
A) The statement is notarized B) It is read aloud in court C) The statement is recorded immediately D) The declarant knew death was imminent
A) Inadmissible due to coercion B) Admissible C) Considered independent relevant statement D) Automatically valid
A) Confrontational interrogation B) Leading questions C) Cognitive interviewing D) Rapid-fire questioning
A) Must involve a police officer B) Statement must be voluntary and independent of coercion C) Must be made publicly D) Must be repeated multiple times
A) Principle of voluntariness B) Miranda rights C) Doctrine of independent evidence D) Rule against hearsay
A) Repeating questions rapidly B) Ignoring witness responses C) Friendly and neutral demeanor D) Aggressive confrontation
A) Coerced under threat B) Given to a third party only C) Made without awareness of rights D) Voluntary, knowing, and intelligent
A) Determine if the declarant believed death was imminent B) Require the presence of legal counsel C) Treat it as hearsay by default D) Ignore the timing of the statement
A) Leading questions B) Coercive interrogation C) Cognitive interviewing D) Rapid questioning
A) Only if it is corroborated B) Never C) Even without the declarant being present D) Only if the declarant testifies
A) Admission is voluntary; confession is always coerced B) Admission is always false; confession is always true C) Admission acknowledges some facts; confession acknowledges full criminal responsibility D) Admission is given in court; confession is private
A) They require corroboration B) They must be witnessed by two officers C) They are exceptions to the hearsay rule D) . They are inadmissible unless signed
A) It forces a confession B) It substitutes for evidence C) . It can identify deception or inconsistencies D) It makes the suspect nervous
A) Leading question B) . Admission or confession C) Hearsay D) Coerced statement
A) Behavioral analysis of the suspect’s story B) Direct questioning with threats C) . Physical intimidation D) Forced written confession
A) Hearsay evidence B) Coerced confession C) Dying declaration D) Independent relevant statement
A) Speed of confession B) Voluntariness and knowledge of rights C) Prior criminal record D) Presence of media
A) Random questions without structure B) Surprise questioning C) Standardized questions asked in a pre-determined order D) Aggressive interrogation
A) Cognitive interviewing B) Reid technique C) Polygraph-assisted interview D) Public humiliation
A) Hearsay B) Admission C) Coerced statement D) Full confession
A) The need for witnesses B) The requirement for a judge’s approval C) The requirement for notarization D) The belief that a person is unlikely to lie when facing imminent death
A) Taken secretly with intimidation B) Taken in a public forum C) Voluntary, informed, and without coercion D) Taken after threats
A) Ignore inconsistencies B) Only record confessions, not admissions C) Correlate statements with independent evidence for reliability D) Accept statements at face value
A) Theft involves intimidation; robbery does not B) Robbery requires prior consent of the victim; theft does not C) Robbery involves violence or intimidation; theft does not D) Theft is committed only in commercial establishments; robbery is not
A) Killing a person to gain property B) Taking personal property by intimidation C) Breaking and entering a house D) Misappropriation or conversion of property through deceit
A) Only review surveillance footage B) Forensic and medical examination with crime scene documentation C) Interview witnesses only D) ocus solely on recovering stolen property
A) Presence of deceit or fraudulent intent B) Whether the property is movable or immovable C) Number of victims D) The value of the property
A) Verifying the victim’s prior consent B) Checking fingerprints only C) Establishing proof of deceit or misrepresentation D) . Interviewing neighbors
A) Seizing unrelated evidence in nearby areas B) Eyewitness identification and CCTV review C) Filing an administrative report D) In-depth financial profiling of the suspect
A) Public robbery requires prior planning; dwelling does not B) Robbery in a dwelling is punishable more severely due to violation of personal security C) Only dwelling robbery requires victim testimony D) Use of firearms is prohibited in dwelling robbery
A) Public announcement B) Consent from neighbors C) Court-issued warrant or lawful seizure D) Verbal permission from the suspect
A) Proving motive B) Establishing prior criminal record C) Recovering the stolen item D) Proving actual taking without consent
A) The social media accounts of neighbors B) . The weather during the incident C) Public opinion D) Physical evidence and witness statements P
A) Imprisonment of 6 months B) Reclusion temporal to death C) Fine only D) Community service
A) Kidnapping for ransom B) Theft of personal jewelry C) Taking a motor vehicle with intent to gain D) Breaking into a house
A) Verifying vehicle ownership and tracing its location B) . Interviewing neighbors only C) . Filing a complaint with barangay officials D) Ignoring CCTV footage
A) Public sentiment B) . Victim’s income record C) The suspect’s prior unrelated offenses D) . Vehicle registration and plate number
A) Location of the vehicle B) Type of vehicle used C) Number of suspects involved D) Use of physical harm or intimidation during the crime
A) Reviewing traffic camera footage and GPS tracking B) nterviewing unrelated witnesses C) Seizing property in nearby towns D) Forensic analysis of tire marks
A) Theft of livestock only B) . Kidnapping for ransom C) Forgery of documents D) Selling stolen goods knowingly
A) . R.A. 6539 B) P.D. 1612 C) . R.A. 9160 D) R.A. 9208
A) Protect suspect’s rights B) Ensure the admissibility of recovered vehicle in court C) Reduce police workload D) . Increase public awareness
A) . Surveillance and monitoring of known “hot spots B) Asking the media to report thefts C) Random public announcements D) Conducting surprise inspections only in schools
A) Theft of property B) . Force, coercion, or deception for exploitation C) Illegal importation of goods D) Simple kidnapping without intent
A) Bank account holders B) Private property owners C) Minors and women in trafficking-related sexual exploitation D) Vehicle owners
A) Ignore digital evidence B) Arrest suspects immediately without plan C) . Search unrelated areas D) . Locate and rescue victims safely
A) . Avoid interviewing victims B) . Focus solely on financial transactions C) . Ignore online communication records D) . Trace recruitment, transport, and exploitation stages
A) . R.A. 6539 B) . R.A. 9160 C) . R.A. 9208 D) P.D. 1612
A) Public announcements only B) . Coordinating with social welfare agencies and local authorities C) Filing reports without rescue operations D) . Ignoring forensic digital evidence
A) Small personal spending B) Attending community events C) Owning a private vehicle D) . Unusually large or frequent money transfers from unknown sources
A) . Ignoring online chats B) Publicly disclosing personal data C) . Identifying recruiters, victims, and financial transactions D) Monitoring unrelated social media
A) . Prevention of trafficking in persons, especially women and children B) Financial fraud C) . Only property theft D) . Vehicle carnapping
A) . Memorizing names only B) . Understanding and analyzing patterns of recruitment and exploitation C) Recording weather data D) Ignoring financial evidence
A) . Placement – introducing illicit funds into the financial system B) . Recovery – reporting to authorities C) Layering – separating illicit funds from origin D) Integration – using money for business investment
A) Placement B) Exploitation C) Integration D) Layering
A) No financial movement occurs B) Assets are seized by authorities C) Money is stolen physically D) Money appears legitimate for investment or business
A) . RA 9208 B) . RA 6539 C) . RA 9160 D) . PD 1612
A) Remembering B) Repeating reports C) Memorizing laws only D) Analyzing
A) . RA 9208 – Human Trafficking B) . RA 9160 – Anti-Money Laundering Act C) . RA 6539 – Anti-Carnapping D) RA 10364 – Expanded Anti-Rape
A) Recovery only B) . Placement and layering C) None of the above D) Integration only
A) Customer Due Diligence (CDD) and reporting of suspicious transactions B) Asking media for information C) Random inspections of homes D) Ignoring large transactions
A) . Buying groceries with cash B) . Routine payroll deposits C) Small daily purchases D) Structuring transactions to avoid reporting requirements
A) Tracing illicit money, linking to suspects, and analyzing transaction patterns B) Confiscating property randomly C) Ignoring financial flows D) Memorizing case files only
A) Multi-agency coordination, evidence tracing, forensic and financial analysis B) Interviewing only neighbors C) Filing separate complaints without coordination D) . Ignoring digital evidence
A) Seize unrelated property B) . Only ask victims for statements C) . Examine digital contracts, trace financial transfers, and interview parties involved D) Ignore electronic evidence
A) . Only weather records B) . Random surveillance C) . Vehicle/asset registration, GPS tracking, financial transactions D) Only eyewitness statements
A) Arresting without warrants B) Conducting public surveys C) Only recovering stolen property D) Following money trails, linking proceeds to suspects, and recovering property
A) Ability to analyze multiple crime patterns, link them to laws, and plan coordinated interventions B) . Filing reports without evidence C) Memorizing laws only D) Asking for public opinion
A) . Confiscating vehicles randomly B) . Ignoring financial records C) Interviewing unrelated parties D) Understanding recruitment, exploitation, and fund movement stages
A) . RA 9160 – AML B) RPC – Theft provisions only C) . RA 6539 – Anti-Carnapping D) . PD 1612 – Anti-Fencing
A) Writing press releases B) . Analytical skills to identify patterns, connections, and evidence chains C) Public speaking skills D) Only memorization of laws
A) Arrest without warrant is preferred B) . Media exposure ensures conviction C) Public opinion can replace evidence D) Evidence must be legally obtained to ensure admissibility
A) Only arrest suspects B) Publicize the case C) Only file reports D) Recover property, prosecute offenders, protect victims, and prevent recurrence |