A) . To immediately obtain a confession B) To gather accurate information and clarify facts C) . To conduct a surprise raid D) . To intimidate the suspect
A) Leading questioning B) Cognitive interviewing C) Direct questioning D) Rapid-fire questioning
A) Physical intimidation B) Covert surveillance C) Forceful confrontation D) Reid technique
A) Their innocence B) The entire criminal act C) Only the elements of the crime D) Facts that may indicate involvement but not the full criminal liability
A) It must be coerced under pressure B) It must be made to any person C) It must be made in front of the media D) It must be voluntarily made
A) They are admissible even without corroboration if the declarant believes death is imminent B) They must be notarized C) They are inadmissible unless a judge witnesses them D) They are only valid if the declarant survives
A) A statement made to influence another witness B) . A statement that independently proves facts of the case C) A confession made under duress D) . A statement made to the police immediately after arrest
A) Passive observation B) Polygraph testing C) Open-ended narrative D) Note-taking
A) Immediate police confrontation B) Presence of media witnesses C) Intimidation by authorities D) Absence of threats, inducement, or coercion
A) Cognitive B) Narrative C) Structured D) Informal
A) . It must be voluntary B) It must include a public apology C) The suspect must be informed of their rights D) It must be made knowingly and intelligently
A) Conducting surveillance B) Encouraging suspects to lie C) Gathering physical evidence D) Using confrontation and behavioral analysis to elicit a confession
A) It was recorded on video B) The declarant was aware death was imminent C) It was signed in front of police D) It was written and notarized
A) Relies on threats to elicit statements B) Focuses on witness memory retrieval through context reinstatement C) Forces the suspect to provide a confession D) Is conducted without asking questions
A) Accept the statement at face value B) Use the statement only as hearsay C) Ignore contradictions D) Verify the statement independently without coercion
A) Rapid questioning B) Leading questions C) Confrontational interrogation D) Cognitive interviewing
A) Presumed involuntary and inadmissible B) Admissible in court C) Admissible in court D) Considered independent relevant statement
A) Obtain evidence through coercion B) Immediately arrest anyone nearby C) Publicly shame the suspect D) Elicit the truth from a suspect
A) Threatening the suspect with punishment B) Advising the suspect of their right to remain silent C) Using physical pressure D) Conducting the interrogation in private
A) Given only after a court order B) Made voluntarily and without prompting C) Needs corroboration to be valid D) Requires police supervision
A) Ask leading questions to force answers B) Focus on irrelevant facts C) Listen actively and encourage detailed narratives D) Interrupt the witness frequently
A) Reid Technique B) Passive observation C) Cognitive interviewing D) Direct confrontation
A) Knowledge of rights B) Threats or promises made by law enforcement C) Voluntary nature D) . Recording of the confession
A) A dying declaration B) . A hearsay statement C) An admission D) A voluntary confession
A) Was the door locked?” B) Can you describe everything that happened that day?” C) Did you see him take the money?” D) You didn’t hit anyone, right?”
A) . An acknowledgment of some facts that may establish a crime but stops short of full guilt B) Statement without any factual basis C) Complete confession of guilt D) Statement by a third party
A) Informational B) Cognitive C) Investigative D) Coercive
A) The statement is notarized B) It is read aloud in court C) The declarant knew death was imminent D) The statement is recorded immediately
A) Considered independent relevant statement B) Inadmissible due to coercion C) Automatically valid D) Admissible
A) Cognitive interviewing B) Leading questions C) Confrontational interrogation D) Rapid-fire questioning
A) Must be made publicly B) Must be repeated multiple times C) Statement must be voluntary and independent of coercion D) Must involve a police officer
A) Rule against hearsay B) Miranda rights C) Doctrine of independent evidence D) Principle of voluntariness
A) Friendly and neutral demeanor B) Ignoring witness responses C) Aggressive confrontation D) Repeating questions rapidly
A) Made without awareness of rights B) Coerced under threat C) Voluntary, knowing, and intelligent D) Given to a third party only
A) Treat it as hearsay by default B) Determine if the declarant believed death was imminent C) Require the presence of legal counsel D) Ignore the timing of the statement
A) Leading questions B) Rapid questioning C) Coercive interrogation D) Cognitive interviewing
A) Even without the declarant being present B) Only if the declarant testifies C) Never D) Only if it is corroborated
A) Admission acknowledges some facts; confession acknowledges full criminal responsibility B) Admission is voluntary; confession is always coerced C) Admission is always false; confession is always true D) Admission is given in court; confession is private
A) . They are inadmissible unless signed B) They must be witnessed by two officers C) They are exceptions to the hearsay rule D) They require corroboration
A) It makes the suspect nervous B) It forces a confession C) It substitutes for evidence D) . It can identify deception or inconsistencies
A) . Admission or confession B) Hearsay C) Leading question D) Coerced statement
A) . Physical intimidation B) Direct questioning with threats C) Behavioral analysis of the suspect’s story D) Forced written confession
A) Hearsay evidence B) Independent relevant statement C) Coerced confession D) Dying declaration
A) Prior criminal record B) Voluntariness and knowledge of rights C) Presence of media D) Speed of confession
A) Random questions without structure B) Aggressive interrogation C) Surprise questioning D) Standardized questions asked in a pre-determined order
A) Cognitive interviewing B) Polygraph-assisted interview C) Public humiliation D) Reid technique
A) Coerced statement B) Hearsay C) Full confession D) Admission
A) The requirement for notarization B) The requirement for a judge’s approval C) The belief that a person is unlikely to lie when facing imminent death D) The need for witnesses
A) Voluntary, informed, and without coercion B) Taken after threats C) Taken in a public forum D) Taken secretly with intimidation
A) Correlate statements with independent evidence for reliability B) Accept statements at face value C) Only record confessions, not admissions D) Ignore inconsistencies
A) Robbery requires prior consent of the victim; theft does not B) Theft is committed only in commercial establishments; robbery is not C) Theft involves intimidation; robbery does not D) Robbery involves violence or intimidation; theft does not
A) Misappropriation or conversion of property through deceit B) Breaking and entering a house C) Taking personal property by intimidation D) Killing a person to gain property
A) Interview witnesses only B) Only review surveillance footage C) ocus solely on recovering stolen property D) Forensic and medical examination with crime scene documentation
A) Whether the property is movable or immovable B) Presence of deceit or fraudulent intent C) The value of the property D) Number of victims
A) . Interviewing neighbors B) Establishing proof of deceit or misrepresentation C) Checking fingerprints only D) Verifying the victim’s prior consent
A) Seizing unrelated evidence in nearby areas B) In-depth financial profiling of the suspect C) Eyewitness identification and CCTV review D) Filing an administrative report
A) Robbery in a dwelling is punishable more severely due to violation of personal security B) Use of firearms is prohibited in dwelling robbery C) Only dwelling robbery requires victim testimony D) Public robbery requires prior planning; dwelling does not
A) Verbal permission from the suspect B) Public announcement C) Consent from neighbors D) Court-issued warrant or lawful seizure
A) Establishing prior criminal record B) Recovering the stolen item C) Proving actual taking without consent D) Proving motive
A) The social media accounts of neighbors B) . The weather during the incident C) Physical evidence and witness statements P D) Public opinion
A) Reclusion temporal to death B) Fine only C) Imprisonment of 6 months D) Community service
A) Breaking into a house B) Theft of personal jewelry C) Kidnapping for ransom D) Taking a motor vehicle with intent to gain
A) Ignoring CCTV footage B) Verifying vehicle ownership and tracing its location C) . Interviewing neighbors only D) . Filing a complaint with barangay officials
A) . Victim’s income record B) . Vehicle registration and plate number C) Public sentiment D) The suspect’s prior unrelated offenses
A) Type of vehicle used B) Use of physical harm or intimidation during the crime C) Location of the vehicle D) Number of suspects involved
A) Reviewing traffic camera footage and GPS tracking B) Seizing property in nearby towns C) nterviewing unrelated witnesses D) Forensic analysis of tire marks
A) Theft of livestock only B) Selling stolen goods knowingly C) Forgery of documents D) . Kidnapping for ransom
A) P.D. 1612 B) . R.A. 9160 C) . R.A. 6539 D) R.A. 9208
A) Ensure the admissibility of recovered vehicle in court B) Reduce police workload C) . Increase public awareness D) Protect suspect’s rights
A) Random public announcements B) Conducting surprise inspections only in schools C) . Surveillance and monitoring of known “hot spots D) Asking the media to report thefts
A) Illegal importation of goods B) Theft of property C) . Force, coercion, or deception for exploitation D) Simple kidnapping without intent
A) Bank account holders B) Private property owners C) Minors and women in trafficking-related sexual exploitation D) Vehicle owners
A) . Locate and rescue victims safely B) . Search unrelated areas C) Ignore digital evidence D) Arrest suspects immediately without plan
A) . Avoid interviewing victims B) . Focus solely on financial transactions C) . Ignore online communication records D) . Trace recruitment, transport, and exploitation stages
A) . R.A. 9208 B) . R.A. 6539 C) . R.A. 9160 D) P.D. 1612
A) Public announcements only B) Filing reports without rescue operations C) . Ignoring forensic digital evidence D) . Coordinating with social welfare agencies and local authorities
A) Owning a private vehicle B) Attending community events C) . Unusually large or frequent money transfers from unknown sources D) Small personal spending
A) . Identifying recruiters, victims, and financial transactions B) Publicly disclosing personal data C) . Ignoring online chats D) Monitoring unrelated social media
A) . Only property theft B) . Prevention of trafficking in persons, especially women and children C) . Vehicle carnapping D) Financial fraud
A) Ignoring financial evidence B) Recording weather data C) . Understanding and analyzing patterns of recruitment and exploitation D) . Memorizing names only
A) . Recovery – reporting to authorities B) Integration – using money for business investment C) . Placement – introducing illicit funds into the financial system D) Layering – separating illicit funds from origin
A) Layering B) Exploitation C) Placement D) Integration
A) Money appears legitimate for investment or business B) Assets are seized by authorities C) Money is stolen physically D) No financial movement occurs
A) . RA 9208 B) . PD 1612 C) . RA 6539 D) . RA 9160
A) Repeating reports B) Analyzing C) Remembering D) Memorizing laws only
A) RA 10364 – Expanded Anti-Rape B) . RA 6539 – Anti-Carnapping C) . RA 9208 – Human Trafficking D) . RA 9160 – Anti-Money Laundering Act
A) None of the above B) . Placement and layering C) Integration only D) Recovery only
A) Asking media for information B) Customer Due Diligence (CDD) and reporting of suspicious transactions C) Random inspections of homes D) Ignoring large transactions
A) . Buying groceries with cash B) . Routine payroll deposits C) Small daily purchases D) Structuring transactions to avoid reporting requirements
A) Ignoring financial flows B) Memorizing case files only C) Confiscating property randomly D) Tracing illicit money, linking to suspects, and analyzing transaction patterns
A) Filing separate complaints without coordination B) Multi-agency coordination, evidence tracing, forensic and financial analysis C) . Ignoring digital evidence D) Interviewing only neighbors
A) Ignore electronic evidence B) . Only ask victims for statements C) Seize unrelated property D) . Examine digital contracts, trace financial transfers, and interview parties involved
A) . Only weather records B) . Vehicle/asset registration, GPS tracking, financial transactions C) . Random surveillance D) Only eyewitness statements
A) Arresting without warrants B) Conducting public surveys C) Following money trails, linking proceeds to suspects, and recovering property D) Only recovering stolen property
A) Asking for public opinion B) Ability to analyze multiple crime patterns, link them to laws, and plan coordinated interventions C) . Filing reports without evidence D) Memorizing laws only
A) . Ignoring financial records B) . Confiscating vehicles randomly C) Interviewing unrelated parties D) Understanding recruitment, exploitation, and fund movement stages
A) . RA 9160 – AML B) RPC – Theft provisions only C) . PD 1612 – Anti-Fencing D) . RA 6539 – Anti-Carnapping
A) Only memorization of laws B) . Analytical skills to identify patterns, connections, and evidence chains C) Writing press releases D) Public speaking skills
A) . Media exposure ensures conviction B) Arrest without warrant is preferred C) Public opinion can replace evidence D) Evidence must be legally obtained to ensure admissibility
A) Only file reports B) Only arrest suspects C) Publicize the case D) Recover property, prosecute offenders, protect victims, and prevent recurrence |