You are on page 1of 10

is a type of malicious software (malware) that threatens to publish or blocks access to

data or a computer system, usually by encrypting it, until the victim pays a ransom fee
to the attacker.*
Phishing
Cryptojacking
Cyber espionage
Ransomware attack

The following are a violation to Philippine Clean Air Act, EXCEPT*


Incineration in Public
Smoking in Public
Non-compliance to Emission standard
All of the above

Any person who willfully abets, aids, or financially benefits in the commission of any of
the offenses enumerated Republic Act 10175 shall be held liable, except with respect to
Sections 4(c)(2) on Child Pornography and 4(c)(4) on online Libel.*
Wholly true
Partially true
Wholly false
Partially false

 The court shall have this period from the filing of the complaint to try and decide the
case in relation to environmental cases.*
15 days
2 months
1 year
5 years

Environmental laws may regulate and protect wildlife populations. Lawmakers


determine who can hunt and fish and how these activities are regulated.*
Walking and running
Hiking and climbing
Hunting and Fishing
Crawling and Seeing

 Which among the following does not belong to the group?*


Cyber-squatting
Cybersex
Libel
Computer-related Forgery

This office shall serve as the Cybercrime Operations Center of the CICC.*
NBI
PNP
DOJ Office of Cybercrime
Regional Trial Court

The law aims to achieve and maintain clean air that meets the National Air Quality
guideline values for criteria pollutants, throughout the Philippines, while minimizing the
possible associated impacts to the economy.*
RA 6969
RA 8749
RA 9275
RA 9003

The act of throwing trash or garbage in a place not properly designated for the same is
a violation to*
REPUBLIC ACT 8749
REPUBLIC ACT 9275
REPUBLIC ACT 9003
REPUBLIC ACT 9512

The following are the common example of crime violating certain law on mining,
EXCEPT*
Water system contamination
Mines waste
Mining operation without permit
Reforestation

 A warrant that requires any person or service provider to disclose subscriber's


information, traffic data, or relevant data in his/her or its possession or control within 72
hours from receipt of the order.*
Warrant to Disclose Computer Data
Warrant to Intercept Computer Data
Warrant to Search, Seize, and Examine Computer Data
Warrant to Examine Computer Data

These are devices used for entering data or instructions to the central processing unit.
Are classified according to the method they use to enter data.*
Keying devices
Pointing devices
Input devices
Special (Control) keys

 It is the science of acquiring, retrieving, preserving and presenting data that has been
processed electronically and stored on digital media*
Digital forensics
Cybercrime
Cyber
Computer system

means any part taken or substance extracted from wildlife, in raw or in processed form
including stuffed animals and herbarium specimens.*
Derivatives
Mineral
Wildlife
Product

Network Hacking is a way of gathering all the critical information about a network with
an intent to harm the network and block its operations. The statement is the opposite of
not false.*
Wholly true
Partially true
Wholly false
Partially false

The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of


identifying information belonging to another, whether natural or juridical, without right.*
Computer-related Fraud
Computer-related Identity Theft
Computer-related Forgery
Cyber-squatting

 Content data shall be similarly preserved for six (6) months from the date of receipt of
the order from law enforcement authorities requiring its preservation.*
three (3) months
six (6) months
forty-eight (48) hours
thirty-six (36) hours

The following are the threats to Biodiversity*


Habitat degradation
Pollution
Climate Change
All of the above

refers to a judicially-approved settlement between concerned parties based on public


interest and public policy to protect and preserve the environment.*
Consent decree
Continuing Mandamus
Environmental protection Order
Warrrant

It is a collective term describing the network of treaties, statutes, regulations, common


and customary laws addressing the effects of human activity on the natural
environment.*
Natural law
Resource law
Environmental law
All of the above

One among many purposes of  RA No. 7586 is to reserve certain areas exclusively for
the environment, and to exclude all other forms of land use and utilization solely as
places where wildlife, flora, and fauna can grow, and where the rich biodiversity of the
ecosystem can be preserved. The following places where protected areas under RA
7586, EXCEPT*
Natural park
Natural monument
Wildlife sanctuary
All of the above
None of the above

is a criminal activity that either targets or uses a computer, a computer network or a


networked device.*
Computer crime
Crime
Cybercrime
Computer virus

refers to an order issued by the court directing or enjoining any person or government
agency to perform or desist from performing an act in order to protect, preserve or
rehabilitate the environment.*
Consent decree
Continuing Mandamus
Environmental protection Order
Warrrant

Very essential that an investigator knows the crime he’s investigating. The which among
the following describes Illegal Logging*
cutting, gathering, or collecting timber or other forest products without the necessary permit from
the government.
Transporting illegally cut timber and forest products
All of the above
None of them

The following are the guidelines for preservation of evidence for crimes involving
environmental laws, Except*
Investory
Limit the number of individual handling evidence
Packing, labeling, sealing and marking of evidence
Turn-over

In relation to the previous question, failure to timely file the returns for any of the issued
warrants under this Rule or to duly turn over to the court’s custody any of the items
disclosed, intercepted, searched, seized, and/or examined as prescribed hereunder
shall subject the responsible law enforcement authorities to an action for-*
Obstruction of Justice
Contempt
Cybercrime
Neglect of Duty

They are those who are hired and are given permission to attack the system. They can
attack the system just to expose the vulnerabilities that an attacker can take advantage
of.*
Ethical Hacker
State-sponsored hackers
Malicious Insider
Grey Hat Hacker

The law aims to protect the country's water bodies from pollution from land-based
sources (industries and commercial establishments, agriculture and
community/household activities).*
RA 6969
RA 8749
RA 9275
RA 9003

states that when human activities may lead to threats of serious and irreversible
damage to the environment that is scientifically plausible but uncertain, actions shall be
taken to avoid or diminish that threat.*
Strategic lawsuit
Environmental protection
Continuing mandamus
Precautionary principle

Violation of environmental laws will be dealt with*


Judicial Body
Quasi-Judicial Body
Administrative body
all of the above

Effectivity of the Warrant to Intercept Computer Data.*


10 days
15 days
72 hours
24 hours

Law enforcement agencies were solely responsible for conservation of the environment.
Is the statement true?*
Yes, constitutionally
Yes, as construed in statutes
No, CJS is a mechanism responsible for it.
No, the PNP was generally mandated to enforce all laws.

Where to file the Writ of Kalikasan?*


Supreme Court
Regional Trial Court
MTC or MCTC
DENR

Which of the following activities refers to the act of legally intercepting computer data
conducted by law enforcement authorities?*
listening
recording
monitoring
surveillance
all of these

Blue Hat Hackers are types of hackers who’re learning the ropes of hacking. They are
slightly different from the Script Kiddies due to their intention. The intent is to strive and
learn to become full-fledged hackers.*
Wholly true
Partially true
Wholly false
Partially false

The integrity of traffic data and subscriber information shall be kept, retained and
preserved by a service provider for a minimum period of ____ from the date of the
transaction.*
three (3) months
six (6) months
forty-eight (48) hours
thirty-six (36) hours

The unauthorized input, alteration, or deletion of computer data or program or


interference in the functioning of a computer system, causing damage thereby with
fraudulent intent.*
Computer-related Fraud
Computer-related Identity Theft
Computer-related Forgery
Cyber-squatting

It is a hacking technique designed to flood your web server with a myriad of requests to
the point that it overloads the web server resulting in a website crash.*
Denial of Service (DoS\DDoS) Attacks
Cookie Theft
Fake W.A.P.
Phishing

A warrant issued when a computer device or system is previously seized by another


lawful method, such as a warrantless arrest.*
Warrant to Disclose Computer Data
Warrant to Intercept Computer Data
Warrant to Search, Seize, and Examine Computer Data
Warrant to Examine Computer Data

Where a search and seizure warrant is properly issued, the law enforcement authorities
shall likewise have the following powers and duties, except:*
Secure a computer system or a computer data storage medium;
Make and retain a copy of those computer data secured;
Conduct forensic analysis or examination of the computer data storage medium:
Render accessibility on those computer data in the accessed computer or computer and
communications network.

Violation of laws implies violation of an individual's right. Thus, a person throwing his
garbage anywhere is against the right of an individual to?*
Life
Liberty
Property
None of them

 Is a collective term describing the network of treaties, statutes, regulations, common
and customary laws addressing the effects of human activity on the natural
environment.*
Biochemical law
Environmental Law
remedial law
Political Law

People modify the environment for their purposes and obtain benefits (Ecosystem
Services) from it. Is the statement true?*
Yes, the humans are responsible for the development of ecosystem
Yes, actions of human disrupt the function of the ecosystem
No, ecosystem is independent
No, Modification of environment to fit with society is good

Features of Strategic Lawsuit Against Public Participation (SLAPP)*


a legal action filed to harass, vex, exert undue pressure or stifle any legal recourse that any
person, institution or the government has taken
Assertion of environmental rights
for the protection of the environment
All of the above

Wildlife animals of the earth pertains to*


Flora
Sauna
Fauna
Floural

The warrants shall only be effective for the length of time as determined by the court,
which shall not exceed  from its issuance.*
10 days
15 days
72 hours
24 hours

There must be a prohibition of harmful actions of humans to environment, the notion


falls to the principle of*
Ours is a finite earth
Nature knows best
All forms of life are important
Everything must go somewhere

”Development that meets the needs of the present without compromising the ability of
the future generations to meet their own needs.” this quote falls to the principle of*
Everything is connected to everything else
All forms of life are important
Everything must go somewhere
Ours is a finite earth
 It is the main circuit board on the computer.*
Motherboard
Random-Access Memory
Hard disk
Solid-State Drives

What is the nature of crime in violation of environmental laws?*


Criminal
Civil
Administrative
Natural resource

This system assures implementation of environment-friendly projects*


Environment Impact Assessment System
Environmental Compliance System
Environmental impact System
None of the above

A set of integrated devices that input, output, process, and store data and information.*
Computer hardware
Computer software
Liveware
Computer system

This office shall serve as the public information arm of the EPA.*
Interim Officers
Public Affairs Office
Public Information Desk
DITC

Fundamental basis in protecting environment*


Natural
Statutory
Constitutional
All of the above
Except C

In this phase, the hacker tries to exploit all the vulnerabilities of the target system.*
Reconnaissance
Scanning
Gaining Access
Maintaining Access

 use of computer networks to gain illicit access to confidential information, typically that
held by*
government or other organization.
Phishing
Cryptojacking
Cyber espionage

The intentional or reckless alteration, damaging, deletion or deterioration of computer


data, electronic document, or electronic data message, without right, including the
introduction or transmission of viruses.*
Data Interference
Illegal Interception
Illegal Access
System Interference

when spam emails, or other forms of communication, are sent en masse, with the
intention of tricking recipients into doing something that undermines their security or the
security of the organization they work for.*
Phishing
Cryptojacking
Cyber espionage
Ransomware attack

It is the activity of identifying weaknesses in a computer system or a network to exploit


the security to gain access to personal data or business data.*
Cyber-squatting
Phising
Hacking
Cybercrime

The goal of this phase is to collect, preserve, analyze the physical evidence and
reconstruct what happened in the crime scene.*
Preparation Phase
Physical Forensics and Investigation Phase
Digital Forensics Phase
Reporting and Presentation phase

In relation to the principles of the environment, which statement is NOT true?*


Humans should first understand nature and follow its laws
Humans should not go against natural processes if we want a sustained yield of natural
resources
Religion is one of the most influential aspects that affect values and the environment.
None of the above

You might also like