Professional Documents
Culture Documents
HARRY
ENVIRONMENTAL
LAW AND
CYBERCRIME
Presented by Joseph Sereño
Is a type of malicious software
(malware) that threatens to publish or
blocks access to data or a computer
system, usually by encrypting it, until
the victim pays a ransom fee to the
attacker.*
Phishing
Cryptojacking
Cyber espionage
Ransomware attack
Is a type of malicious software
(malware) that threatens to publish or
blocks access to data or a computer
system, usually by encrypting it, until
the victim pays a ransom fee to the
attacker.*
Phishing
Cryptojacking
Cyber espionage
Ransomware attack
The following are a violation to
Philippine Clean Air Act, EXCEPT*
Incineration in Public
Smoking in Public
Non-compliance to Emission
standard
All of the above
The following are a violation to
Philippine Clean Air Act, EXCEPT*
Incineration in Public
Smoking in Public
Non-compliance to Emission
standard
All of the above
Any person who willfully abets, aids,
or financially benefits in the
commission of any of the offenses
enumerated Republic Act 10175 shall
be held liable, except with respect to
Sections 4(c)(2) on Child Pornography
and 4(c)(4) on online Libel.*
Wholly true
Partially true
Wholly false
Partially false
Any person who willfully abets, aids,
or financially benefits in the
commission of any of the offenses
enumerated Republic Act 10175 shall
be held liable, except with respect to
Sections 4(c)(2) on Child Pornography
and 4(c)(4) on online Libel.*
Wholly true
Partially true
Wholly false
Partially false
The court shall have this period from
the filing of the complaint to try and
decide the case in relation to
environmental cases.*
15 days
2 months
1 year
5 years
The court shall have this period from
the filing of the complaint to try and
decide the case in relation to
environmental cases.*
15 days
2 months
1 year
5 years
Environmental laws may regulate and
protect wildlife populations.
Lawmakers determine who can hunt
and fish and how these activities are
regulated.*
Cyber-squatting
Cybersex
Libel
Computer-related Forgery
Which among the following does not
belong to the group?*
Cyber-squatting
Cybersex
Libel
Computer-related Forgery
This office shall serve as the
Cybercrime Operations Center of the
CICC.*
NBI
PNP
DOJ Office of Cybercrime
Regional Trial Court
This office shall serve as the
Cybercrime Operations Center of the
CICC.*
NBI
PNP
DOJ Office of Cybercrime
Regional Trial Court
The law aims to achieve and maintain
clean air that meets the National Air
Quality guideline values for criteria
pollutants, throughout the Philippines,
while minimizing the possible
associated impacts to the economy.*
RA 6969
RA 8749
RA 9275
RA 9003
The law aims to achieve and maintain
clean air that meets the National Air
Quality guideline values for criteria
pollutants, throughout the Philippines,
while minimizing the possible
associated impacts to the economy.*
RA 6969
RA 8749
RA 9275
RA 9003
The act of throwing trash or garbage
in a place not properly designated for
the same is a violation to*
Keying devices
Pointing devices
Input devices
Special (Control) keys
These are devices used for entering
data or instructions to the central
processing unit. Are classified
according to the method they use to
enter data.*
Keying devices
Pointing devices
Input devices
Special (Control) keys
It is the science of acquiring,
retrieving, preserving and presenting
data that has been processed
electronically and stored on digital
media*
Digital forensics
Cybercrime
Cyber
Computer system
It is the science of acquiring,
retrieving, preserving and presenting
data that has been processed
electronically and stored on digital
media*
Digital forensics
Cybercrime
Cyber
Computer system
means any part taken or substance
extracted from wildlife, in raw or in
processed form including stuffed
animals and herbarium specimens.*
Derivatives
Mineral
Wildlife
Product
means any part taken or substance
extracted from wildlife, in raw or in
processed form including stuffed
animals and herbarium specimens.*
Derivatives
Mineral
Wildlife
Product
Network Hacking is a way of
gathering all the critical information
about a network with an intent to
harm the network and block its
operations. The statement is the
opposite of not false.*
Wholly true
Partially true
Wholly false
Partially false
Network Hacking is a way of
gathering all the critical information
about a network with an intent to
harm the network and block its
operations. The statement is the
opposite of not false.*
Wholly true
Partially true
Wholly false
Partially false
The intentional acquisition, use,
misuse, transfer, possession,
alteration or deletion of identifying
information belonging to another,
whether natural or juridical, without
right.*
Computer-related Fraud
Computer-related Identity Theft
Computer-related Forgery
Cyber-squatting
The intentional acquisition, use,
misuse, transfer, possession,
alteration or deletion of identifying
information belonging to another,
whether natural or juridical, without
right.*
Computer-related Fraud
Computer-related Identity Theft
Computer-related Forgery
Cyber-squatting
Content data shall be similarly
preserved for six (6) months from the
date of receipt of the order from law
enforcement authorities requiring its
preservation.*
Habitat degradation
Pollution
Climate Change
All of the above
The following are the threats to
Biodiversity*
Habitat degradation
Pollution
Climate Change
All of the above
refers to a judicially-approved
settlement between concerned parties
based on public interest and public
policy to protect and preserve the
environment.*
Consent decree
Continuing Mandamus
Environmental protection Order
Warrrant
refers to a judicially-approved
settlement between concerned parties
based on public interest and public
policy to protect and preserve the
environment.*
Consent decree
Continuing Mandamus
Environmental protection Order
Warrrant
It is a collective term describing the
network of treaties, statutes,
regulations, common and customary
laws addressing the effects of human
activity on the natural environment.*
Natural law
Resource law
Environmental law
All of the above
It is a collective term describing the
network of treaties, statutes,
regulations, common and customary
laws addressing the effects of human
activity on the natural environment.*
Natural law
Resource law
Environmental law
All of the above
One among many purposes of RA
No. 7586 is to reserve certain areas
exclusively for the environment, and
to exclude all other forms of land use
and utilization solely as places where
wildlife, flora, and fauna can grow,
and where the rich biodiversity of the
ecosystem can be preserved. The
following places where protected
areas under RA 7586, EXCEPT*
Natural park
Natural monument
Wildlife sanctuary
All of the above
One among many purposes of RA
No. 7586 is to reserve certain areas
exclusively for the environment, and
to exclude all other forms of land use
and utilization solely as places where
wildlife, flora, and fauna can grow,
and where the rich biodiversity of the
ecosystem can be preserved. The
following places where protected
areas under RA 7586, EXCEPT*
Natural park
Natural monument
Wildlife sanctuary
All of the above
One among many purposes of RA
No. 7586 is to reserve certain areas
exclusively for the environment, and
to exclude all other forms of land use
and utilization solely as places where
wildlife, flora, and fauna can grow,
and where the rich biodiversity of the
ecosystem can be preserved. The
following places where protected
areas under RA 7586, EXCEPT*
Natural park
Natural monument
Wildlife sanctuary
All of the above
is a criminal activity that either targets
or uses a computer, a computer
network or a networked device.*
Computer crime
Crime
Cybercrime
Computer virus
is a criminal activity that either targets
or uses a computer, a computer
network or a networked device.*
Computer crime
Crime
Cybercrime
Computer virus
refers to an order issued by the court
directing or enjoining any person or
government agency to perform or
desist from performing an act in order
to protect, preserve or rehabilitate the
environment.*
Consent decree
Continuing Mandamus
Environmental protection Order
Warrrant
refers to an order issued by the court
directing or enjoining any person or
government agency to perform or
desist from performing an act in order
to protect, preserve or rehabilitate the
environment.*
Consent decree
Continuing Mandamus
Environmental protection Order
Warrrant
Very essential that an investigator
knows the crime he’s investigating.
The which among the following
describes Illegal Logging*
Investory
Limit the number of individual
handling evidence
Packing, labeling, sealing and
marking of evidence
Turn-over
The following are the guidelines for
preservation of evidence for crimes
involving environmental laws, Except*
Investory
Limit the number of individual
handling evidence
Packing, labeling, sealing and
marking of evidence
Turn-over
In relation to the previous question,
failure to timely file the returns for any
of the issued warrants under this Rule
or to duly turn over to the court’s
custody any of the items disclosed,
intercepted, searched, seized, and/or
examined as prescribed hereunder
shall subject the responsible law
enforcement authorities to an action
for-*
Obstruction of Justice
Contempt
Cybercrime
Neglect of Duty
In relation to the previous question,
failure to timely file the returns for any
of the issued warrants under this Rule
or to duly turn over to the court’s
custody any of the items disclosed,
intercepted, searched, seized, and/or
examined as prescribed hereunder
shall subject the responsible law
enforcement authorities to an action
for-*
Obstruction of Justice
Contempt
Cybercrime
Neglect of Duty
They are those who are hired and are
given permission to attack the system.
They can attack the system just to
expose the vulnerabilities that an
attacker can take advantage of.*
Ethical Hacker
State-sponsored hackers
Malicious Insider
Grey Hat Hacker
They are those who are hired and are
given permission to attack the system.
They can attack the system just to
expose the vulnerabilities that an
attacker can take advantage of.*
Ethical Hacker
State-sponsored hackers
Malicious Insider
Grey Hat Hacker
The law aims to protect the country's
water bodies from pollution from
land-based sources (industries and
commercial establishments,
agriculture and
community/household activities).*
RA 6969
RA 8749
RA 9275
RA 9003
The law aims to protect the country's
water bodies from pollution from
land-based sources (industries and
commercial establishments,
agriculture and
community/household activities).*
RA 6969
RA 8749
RA 9275
RA 9003
states that when human activities may
lead to threats of serious and
irreversible damage to the
environment that is scientifically
plausible but uncertain, actions shall
be taken to avoid or diminish that
threat.*
Strategic lawsuit
Environmental protection
Continuing mandamus
Precautionary principle
states that when human activities may
lead to threats of serious and
irreversible damage to the
environment that is scientifically
plausible but uncertain, actions shall
be taken to avoid or diminish that
threat.*
Strategic lawsuit
Environmental protection
Continuing mandamus
Precautionary principle
Violation of environmental laws will
be dealt with*
Judicial Body
Quasi-Judicial Body
Administrative body
all of the above
Violation of environmental laws will
be dealt with*
Judicial Body
Quasi-Judicial Body
Administrative body
all of the above
Effectivity of the Warrant to Intercept
Computer Data.*
10 days
15 days
72 hours
24 hours
Effectivity of the Warrant to Intercept
Computer Data.*
10 days
15 days
72 hours
24 hours
Law enforcement agencies were
solely responsible for conservation of
the environment. Is the statement
true?*
Yes, constitutionally
Yes, as construed in statutes
No, CJS is a mechanism responsible
for it.
No, the PNP was generally mandated
to enforce all laws.
Law enforcement agencies were
solely responsible for conservation of
the environment. Is the statement
true?*
Yes, constitutionally
Yes, as construed in statutes
No, CJS is a mechanism responsible
for it.
No, the PNP was generally
mandated to enforce all laws.
Where to file the Writ of Kalikasan?*
Supreme Court
Regional Trial Court
MTC or MCTC
DENR
Where to file the Writ of Kalikasan?*
Supreme Court
Regional Trial Court
MTC or MCTC
DENR
Which of the following activities
refers to the act of legally intercepting
computer data conducted by law
enforcement authorities?*
listening
recording
monitoring
surveillance
all of these
Which of the following activities
refers to the act of legally intercepting
computer data conducted by law
enforcement authorities?*
listening
recording
monitoring
surveillance
all of these
Blue Hat Hackers are types of
hackers who’re learning the ropes of
hacking. They are slightly different
from the Script Kiddies due to their
intention. The intent is to strive and
learn to become full-fledged hackers.*
Wholly true
Partially true
Wholly false
Partially false
Blue Hat Hackers are types of
hackers who’re learning the ropes of
hacking. They are slightly different
from the Script Kiddies due to their
intention. The intent is to strive and
learn to become full-fledged hackers.*
Wholly true
Partially true
Wholly false
Partially false
The integrity of traffic data and
subscriber information shall be kept,
retained and preserved by a service
provider for a minimum period of
____ from the date of the
transaction.*
Computer-related Fraud
Computer-related Identity Theft
Computer-related Forgery
Cyber-squatting
The unauthorized input, alteration, or
deletion of computer data or program
or interference in the functioning of a
computer system, causing damage
thereby with fraudulent intent.*
Computer-related Fraud
Computer-related Identity Theft
Computer-related Forgery
Cyber-squatting
It is a hacking technique designed to
flood your web server with a myriad
of requests to the point that it
overloads the web server resulting in
a website crash.*
Life
Liberty
Property
None of them
Violation of laws implies violation of
an individual's right. Thus, a person
throwing his garbage anywhere is
against the right of an individual to?*
Life
Liberty
Property
None of them
Is a collective term describing the
network of treaties, statutes,
regulations, common and customary
laws addressing the effects of human
activity on the natural environment.*
Biochemical law
Environmental Law
remedial law
Political Law
Is a collective term describing the
network of treaties, statutes,
regulations, common and customary
laws addressing the effects of human
activity on the natural environment.*
Biochemical law
Environmental Law
remedial law
Political Law
People modify the environment for
their purposes and obtain benefits
(Ecosystem Services) from it. Is the
statement true?*
Flora
Sauna
Fauna
Floural
Wildlife animals of the earth pertains
to*
Flora
Sauna
Fauna
Floural
The warrants shall only be effective
for the length of time as determined
by the court, which shall not exceed
from its issuance.*
10 days
15 days
72 hours
24 hours
The warrants shall only be effective
for the length of time as determined
by the court, which shall not exceed
from its issuance.*
10 days
15 days
72 hours
24 hours
There must be a prohibition of
harmful actions of humans to
environment, the notion falls to the
principle of*
Motherboard
Random-Access Memory
Hard disk
Solid-State Drives
It is the main circuit board on the
computer.*
Motherboard
Random-Access Memory
Hard disk
Solid-State Drives
What is the nature of crime in
violation of environmental laws?*
Criminal
Civil
Administrative
Natural resource
What is the nature of crime in
violation of environmental laws?*
Criminal
Civil
Administrative
Natural resource
This system assures implementation
of environment-friendly projects*
Computer hardware
Computer software
Liveware
Computer system
A set of integrated devices that input,
output, process, and store data and
information.*
Computer hardware
Computer software
Liveware
Computer system
This office shall serve as the public
information arm of the EPA.*
Interim Officers
Public Affairs Office
Public Information Desk
DITC
This office shall serve as the public
information arm of the EPA.*
Interim Officers
Public Affairs Office
Public Information Desk
DITC
Fundamental basis in protecting
environment*
Natural
Statutory
Constitutional
All of the above
Except C
Fundamental basis in protecting
environment*
Natural
Statutory
Constitutional
All of the above
Except C
In this phase, the hacker tries to
exploit all the vulnerabilities of the
target system.*
Reconnaissance
Scanning
Gaining Access
Maintaining Access
In this phase, the hacker tries to
exploit all the vulnerabilities of the
target system.*
Reconnaissance
Scanning
Gaining Access
Maintaining Access
use of computer networks to gain
illicit access to confidential
information, typically that held by*