Cybercrime and Environmental Laws QA
Cybercrime and Environmental Laws QA
13. Monkey D. Luffy is a hacker who exposes 19. A type of malware that enables the remote
weaknesses of computer network for the sole purpose of monitoring of a computer user`s activities or information
exploiting them and gaining money in return. He is a on an individual’s computer when this software has been
__________ hacker. installed.
A) Black Hat A) Spyware
B) White Hat B) Virus
C) Gray Hat C) Keyloggers
D) Straw Hat D) Sniffers
14. Jonel is an entrepreneur which utilizes online 20. Advance Fee Fraud or the 419 Fraud is a method of
platform in selling his goods. He then observed that committing cybercrime on the basis that some
other seller copied his techniques resulting in higher individuals will willingly divulge personal and financial
sales than him. Due to the rapid decrease in his part, he information to strangers if they believe that a large
hired a hacker to deny services on the latter`s account. financial windfall will soon follow, such crime is called
The given scenario of committing crime was motivated 419 fraud for the reason that it was adopted from –
by – A) Nigerian Criminal Code
A) Greed B) Revised Penal Code
B) Test of Skill C) Indian Criminal Law
C) Business Competitor D) American Criminal Law
D) Opportunity
21. Bruno while browsing through the social media
15. Hansel a criminology student was fascinated by the platform clicked an advertisement which promotes the
activities that can be conducted thru the dark web, he use of cellphones and other digital devices in controlling
always explores and try to gain access to the different their house. His action automatically downloaded
sites with different levels of cyber security, the former`s applications to control such, this is a common toolkit of
action is motivated by – committing cybercrime known as –
A) Greed A) Phishing
B) Opportunity B) Redirectors
C) Revenge C) Floating Windows
D) Test of Skill D) Pharming
16. An attack that attempts to prevent users for particular 22. Which of the following events have discussed the
service form effectively using that service is called? agreement in the pursuit of transnational crime focusing
A) Botnet Attack on cybercrime.
B) Keyloggers A) Palermo Convention
C) Spyware B) Budapest Convention
D) Denial of Service C) Geneva Convention
D) Tagaytay Convention
17. This can be described as a software program that is
designed to spread itself to other computers and to 23. Which among the following countries is NOT a
damage or disrupt a computer such as interrupting member of the G8 nations?
communications. A) Australia
A) Virus B) Japan
B) Trojan Horses C) Russia
C) Backdoor D) Canada
D) Computer Worm
24. What is the Number 1 Cybercrime in the United
States of America and Philippines
A) Computer Fraud
B) Sexual Abuse and Exploitation
C) Cyberbullying 31. Abel and Aga while talking in a room found a
D) Identity Theft Dictaphone under his desk, and such Dictaphone belong
to Bebang, What crime is committed by bebang?
25. International cooperation to prevent and suppress A) Violation of Republic Act 4200
the proliferation of cybercrime needs mutual assistance. B) Violation of Republic Act 9995
What treaty is entered into by the members of the C) Violation of Republic Act 8484
Budapest Convention against cybercrimes? D) Violation of Republict Act 8792
A) Extradition Treaty
B) International Justice Treaty 32. Republic Act 10175 provided penalties for
C) Mutual Legal Assistance Treaty cybercrime committed within the jurisdiction, such
D) National Legal Cooperation Treaty penalties are increased if it was to be committed against
critical infrastructure, which of the following can be
26. Assume that Singapore was attacked by a cyber- committed to the critical infrastucture?
criminal, aid in the prosecution of criminal may be A) Offenses against C-I-A of Computer Data
addressed through the help of assigned focal office of B) Computer Related Offenses
MLAT which is under what agency of the government? C) Content-Related Offenses
A) Department of Interior and Local Government D) All of the Above
B) National Bureau of Investigation
C) Philippine National Police 33. An offense committed when the accused have
D) Department of Justice access to the whole or any part of a computer system
without right.
27. What law enacted the Cybercrime Prevention Act of A) Illegal Access
2012? B) Illegal Interference
A) Republic Act 8484 C) System Interference
B) Republic Act 10175 D) Data Interference
C) Republic Act 9995
D) Republic Act 4200
34. The intentional alteration, or reckless hindering or
28. It is defined any card, plate, code, account number, interference with the functioning of a computer or
electronic serial number, personal identification number, computer network by inputting, transmitting, damaging,
or other telecommunications service, equipment, or deleting, deteriorating, altering or suppressing computer
instrumental identifier, or other means of account access data or program.
that can be used to obtain money, good, services, or any A) Misuse of Device
other thing of value or to initiate a transfer of funds. B) System Interference
A) Access Devices C) Illegal Access
B) Identification Cards D) Hacking
C) Commercial Devices
D) Personal Instruments 35. The intentional acquisition, use, misuse, transfer,
possession, alteration or deletion of identifying
29. Jack and Jill went up the hill the fetch a pail of water, information belonging to another, whether natural or
upon reaching the top of the mountain they decided to juridical, without right.
spend quality time which resulted to a romantic and A) Illegal Access
sexual activity, Rose seen the couple and decided to B) Computer Related Forgery
record their activity. Is the latter liable for his actions C) Computer Related Fraud
under Republic Act 9995? D) Computer Related Identity Theft
A) Yes, such recording is illegal and prohibited under the
law 36. The acquisition of a domain name over the internet
B) No, because she is just jealous in bad faith to profit, mislead, destroy reputation, and
C) No, because the mountain is a public place deprive others from registering the same.
D) Yes, because it was recorded without consent A) Cybersquatting
B) Computer-related Forgery
C) Computer Related Identity Theft
30. Which of the following provisions was deemed D) Cyber Bullying
constitutional by the Supreme Court when Republic Act
10175 was challenged in 2014? 37. If a crime defined and punished in the RPC was
A) Real Time Collection of Traffic Data committed though the use of ICT, the penalty is __?
B) Unsolicited Commercial Communications A) 2 Degrees higher than provided in the RPC
C) Restricting or Blocking Access to Computer Data B) 1 Degree higher than provided in the RPC
D) Increasing the Penalty for Cyber-libel C) The same with the RPC in its maximum term
D) 1 Degree lower than provided in the RPC
38. Defined as a writ issued especially by a judicial 44. Jurisdiction on cybercrime cases committed within it
official (as a magistrate) authorizing an officer (as a territorial jurisdiction as stated under the law will fall on –
sheriff) to perform a specified act required for the A) Regional Trial Courts
administration of justice. B) Municipal Trial Courts
A) Warrant C) Supreme Court
B) Order D) Court of Appeals
C) Affidavit
D) Resolution 45. The integrity of traffic data and subscriber’s
information shall be kept, retained, and preserved by a
39. What type of warrant should the law enforcement service provider for a minimum period of __________
seek if the former would like to investigate and collect from the date of the transaction.
information such as Subscriber Information? A) 3 months
A) Warrant to Disclose Computer Data B) 6 months
B) Warrant to Intercept Computer Data C) 9 months
C) Warrant to Search, Seize, and Examine Computer D) 12 months
Data
D) Warrant to Examine Computer Data 46. The integrity of traffic data and subscriber’s
information shall be kept, retained, and preserved by a
40. It refers to any computer data other than the content service provider for a certain period from the date of the
of the communication, including but not limited to the transaction can be extended up to ______ after the
communication’s origin, destination, route, time, date, expiration of allowable time provided by the law.
size, duration, or type of underlying service - A) 3 months
A) Subscriber Information B) 6 months
B) Traffic Data C) 9 months
C) Content Data D) 12 months
D) None of the Above
47. All computer data examined with a valid warrant,
41. A type of cybercrime warrant that requires any after the expiration of such shall be sealed and turned
person or service provided to disclose subscriber`s over to the court within _________.
information, traffic data, or relevant data in his/her or its A) 24 Hours
possession or control within 72 hours from receipt of the B) 36 Hours
order. C) 48 Hours
A) Warrant to Disclose Computer Data D) 60 Hours
B) Warrant to Intercept Computer Data
C) Warrant to Search, Seize, and Examine Computer 48. What law was created which repealed the Anti-Child
Data Pornography Act and the Child Pornography as defined
D) Warrant to Examine Computer Data by the Cybercrime Prevention Act of 2012?
A) Republic Act 11200
42. To further gather evidences in a case build-up which B) Republic Act 11930
of the following warrant should be secured by a law C) Republic Act 11131
enforcement officer if he wants to listen to a private D) Republic Act 10175
communication between the suspect and his possible
client? 49. What will be the effect of an Affidavit of Desistance
A) Warrant to Disclose Computer Data to the case when the violated law is the Anti-Online and
B) Warrant to Intercept Computer Data Sexual Abuse of Children?
C) Warrant to Search, Seize, and Examine Computer A) The case will be dismissed
Data B) The case will be transfered to another court
D) Warrant to Examine Computer Data C) The case will be archived
D) The case will still prosper
43. A type of cybercrime warrant issued when a
computer device or system is previously seized by 50. Assuming the Police Officer Chiz Moza was
another lawful method, such as a warrantless arrest. assigned in a case in violation of RA 11930, can the
A) Warrant to Disclose Computer Data former be liable for violation of RA 4200 if he decided to
B) Warrant to Intercept Computer Data surriptiously place cameras, recorders and other
C) Warrant to Search, Seize, and Examine Computer surveillance devices to listen and record the activities of
Data the respondent?
D) Warrant to Examine Computer Data A) Yes
B) No
C) Maybe
D) Im not sure
c. Recyclable
Environmetal Laws d. Non-recyclable
1. This is a collective term describing the network of 10. The construction or operation of landfills or any
treaties, statutes, regulations, common and customary waste disposal facility on _____ are also prohibited.
laws addressing the effects of human activity on the a. Residential area c. Watershed area
natural environment. b. Industrial area d. Urban area
a. Environmental Law c. Green Law
b. Criminal Law d. Regulatory Law 11. This is also known as the “Toxic Substances and
Hazardous and Nuclear Wastes Control Act of 1990.”
2. This shall refer to the quality of being re-usable, a. Republic Act 9003 c. Republic Act 6969
biodegradable or compostable, recyclable and not toxic b. Republic Act 8749 d. Republic Act 9279
or hazardous to the environment;
a. Wastes c. Environmentally Acceptable 12. This refers to hazardous wastes made radioactive by
b. Byproducts d. Produce exposure to the radiation incidental to the production or
utilization of nuclear fuels
3. This is also known as the “Ecological Solid Waste a. Chemical substance c. Hazardous waste
Management Act of 2000.” b. Nuclear waste d. Toxic substance
a. Republic Act 9003 c. Republic Act 6969
b. Republic Act 8749 d. Republic Act 9279 13. Which of the following institution was establish in
accordance with “Toxic Substances and Hazardous and
4. A type of waste that pose a substantial present or Nuclear Wastes Control Act of 1990.”
potential hazard to human health or the environment a. National Solid Waste Management Commission
when improperly treated, stored, transported, or b. National Waster Management Agency
disposed of, or otherwise managed. c. National Recycling Institution
a. Agricultural Waste c. Solid waste d. Department of National and Environmental Resources
b. Hazardous Waste d. Bulky waste
14. This means any organic or inorganic substance of a
5.This are waste which refer to household hazardous particular molecular identity
wastes such as paints, thinners, household batteries, a. Chemical substance c. Hazardous waste
lead-acid batteries, spray canisters and the like. b. Nuclear waste d. Toxic substance
a. Agricultural waste c. Special waste
b. Yard waste d. Municipal waste 15. Information such as the name of the chemical
substance or mixture; its chemical identity and molecular
6. The construction of any establishment within structure; proposed categories of use; an estimate of the
________ meters from open dumps or controlled dumps, amount to be manufactured, processed or imported;
or sanitary landfills shall be prohibited. processing and disposal thereof; and any test data
a. 100 meters c. 200 meters related to health and environmental effects which the
b. 300 meters d. 400 meters manufacturer, processor or importer has shall be
submitted to DENR for they are known as:
7. Which of the following institution was establish in a. Manufacture and Importation Requirements
accordance with “Ecological Solid Waste Management b. Pre-manufacture and pre-importation requirements
Act of 2000.”? c. Chemical Study requirements
a. National Solid Waste Management Commission d. Toxic substance requirements
b. National Waster Management Agency
c. National Recycling Institution 16. This is also known as the "Philippine Clean Air Act of
d. Department of National and Environmental Resources 1999."
a. Republic Act 9003 c. Republic Act 6969
8. Prohibition of living near open landfills and dumpsites b. Republic Act 8749 d. Republic Act 9279
are prohibited under the law, such action of inhabiting
the said areas is called? 17. This means any matter found in the atmosphere
a. Blending c. Renting other than oxygen, nitrogen, water vapor, carbon
b. Squatting d. Littering dioxide, and the inert gases in their natural or normal
concentrations, that is detrimental to health or the
9. The manufacturing, importation, distribution, of environment.
_________ materials is also prohibited by the waste a. Emission c. Green house gases
management act. b. Air pollutant d. Wastes
a. Non-environmentally accepted
b. Environmentally accepted
18. These refers to any building or immobile structure, 28. Which shall refer to any portable power saw or
facility or installation which emits or may emit any air similar cutting implement, rendered operative by an
pollutant. electric or internal combustion engine or similar means,
a. Mobile Source c. Medical Source that may be used for, but is not limited to, the felling of
b. Stationary Source d. Vehicular Source trees or the cutting of timber;
a. Saw c. Power Saw
19. It is defined as the burning of municipal, biomedical b. Chain Saw d. Jigsaw
and hazardous waste, which process emits poisonous
and toxic fumes. 29. The following are prohibited acts under the Chain
a. Incarceration c. Incineration Saw Act 2002 EXCEPT:
b. Pollution d. Combustion a. Selling or Purchasing of Chain saw
b. Unlawful importation of Chain Saw
20. Which of the following chemical is prohibited to be c. Tampering of Engine Serial Number
mixed with the fuel used for the motor vehicles? d. Actual unlawful use of Chain Saw
a. Lead c. Magnesium
b. Carbon d. Ammonia 30. Which of the following are punishable acts under
Philippine Water Act of 2004
21. Which of the following law prohibits the sale of a. Transport, dumping or discharge of prohibited
tobacco products within School perimeters? chemicals, substances or pollutants listed under
a. Republic Act 9211 c. Republic Act 8749 Republic Act No. 6969;
b. Republic Act 6969 d. Republic Act 9112 b. Directly using booster pumps in the distribution
system or tampering with the water supply in such a way
22. Which of the following test should be done to a motor as to alter or impair the water quality
vehicle to be registered and be compliant to the laws of c. Discharging, injecting or allowing to seep into the soil
Clean Air Act? or sub-soil any substance in any form that would pollute
a. Visual Inspection c. Emission Test groundwater.
b. Safety Test d. Brake Test d. All of the above
23. Who among the following recommends the filing of 31. This is the law created for the Conservation and
charges in violation of clean air act which is under the Preservation of Wildlife Resources.
DENR? a. Republic Act 9147 c. Republic Act 9003
a. Pollution Adjudication Board b. Republic Act 8794 d. Republic Act 6969
b. Pollution Addiction Board
c. Pollutants Adjudication Body 32. This means wild forms and varieties of flora and
d. Pollution Abetting Body fauna, in all developmental stages, including those which
are in captivity or are being bred or propagated.
24. This is also known as the “The Philippine Clean a. Environment c. Wildlife
Water Act of 2004” b. Captivation d. Ecosystem
a. Republic Act 9003 c. Republic Act 6969
b. Republic Act 8749 d. Republic Act 9279 33. This refers to species or subspecies that is not
critically endangered but whose survival in the wild is
25.It means any alteration of the physical, chemical, unlikely if the causal factors continue operating;
biological, or radiological properties of a water body a. Endangered Species c. Endemic Species
resulting in the impairment of its purity or quality. b. Exotic Species d. None of the Above
a. Water pollution c. Water Quality
b. Water Waste d. Water Intoxication 34. Which of the following is prohibited under the Wildlife
Conservation and Preservation Act?
26. It is defined as a subsurface water that occurs a. killing and destroying wildlife species
beneath a water table in soils and rocks, or in geological b. Inflicting injury which cripples reproductive system of a
formations. specie
a. Surface water c. Fresh water c. trading of wildlife
b. Ground water d. Aquifer d. All of the above
27. What law enforcement agency shall enforce for the 35. Killing of a wildlife specie is prohibited EXCEPT;
enforcement of water quality standards in marine waters. a. when the wildlife is afflicted with an incurable
a. PNP Maritime Police communicable disease
b. Philippine Coast Guard b. when it is done as part of the religious rituals of
c. Philippine Navy established tribal groups or indigenous cultural
d. Philippine Marines communities
c. when the wildlife is killed or destroyed after it has
been used in authorized research or experiments. 43. This is a fishing gear which are designed to chase
d. All of the above and capture target species.
a. Active Gear c. Passive Gear
36. Which of the following acts will have negative effect b. Mobile Gear d. Stationary Gear
in the critical habitats of the wildlife?
a. Quarrying 44. Which of the following fishing activities is prohibited
b. Dumping of waste products under the Philippine Fisheries Code?
c. Planting of Trees a. Fishing During Closed Season
d. Mineral exploration b. Fishing in Marine Protected Areas, Fishery Reserves,
Refuge and Sanctuaries
37. It is also known as the AS “THE PHILIPPINE c. Fishing or Taking of Rare, Threatened or Endangered
FISHERIES CODE OF 1998, Species
a. Republic Act 8550 c. Republic Act 8551 d. All of the above
b. Republic Act 8585 d. Republic Act 8005
45. Which of the following aquatic resource is not
38. Which of the following law amended the Philippine allowed to be captured?
Fisheries Code? a. Tilapia c. Sabalo
a. Republic Act 11200 c. Republic Act 10654 b. Bangus d. Shells
b. Republic Act 11131 d. Republic Act 10591
46.What method of Fishing in the Philippines is Allowed
39. The provision of the fisheries code shall be in the waters?
applicable to, EXCEPT: a. Explosives c. Noxious
a. all Philippine waters including other waters over which b. Electricity d. None of the above
the Philippines has sovereignty and jurisdiction, and the
country’s 200- nautical mile Exclusive Economic Zone 47. Defined as net with mesh size of less than three
(EEZ) and continental shelf; centimeters (3 cm.. measured between two (2. opposite
b. all aquatic and fishery resources whether inland, knots of a full mesh when stretched or as otherwise
coastal or offshore fishing areas, including but not limited determined by the appropriate government agency.
to fishponds, fishpens/cages; a. Fine Mesh Net c. Seine Net
c. all lands devoted to aquaculture, or businesses and b. Trawler d. Square Net
activities relating to fishery, whether private or public
lands. 48. How long is the validity of a commercial fishing
d. None of the Above license?
a. 1 year c. 3 years
40. Who among the following will be punished for b. 2 years d. 4 years
poaching in Philippine waters?
a. foreign person or entity entering Philippine waters 49. What agency is tasked with the issuance of license
b. any person natural or juridical staying in Philippine for commercial license?
waters a. Department of Agriculture
c. foreign person operating fishing vessel in the b. Bureau of Fisheries and Aquatic Resources
Philippine waters c. Philippine Coast Guard
d. All of the above d. PNP Maritime Police
41. It is defined as the boundary which is 15 kilometers 50. This refers to any fishery species which during their
from the coastline which also includes offshore islands. life could travel from freshwater to marine water or vice
a. Territorial waters c. Municipal Water versa, or any marine species which travel over great
b. Exclusive Economic Zone d. Philippine water distances in waters of the ocean as part of their
behavioral adaptation for survival and speciation:
42. This also called magic light refers to a type of light a. Migratory Specie
using halogen or metal halide bulb which may be located b. Catadromous Specie
above the sea surface or submerged in the water. It c. Anadromous Specie
consists of a ballast, regulator, electric cable and socket. d. Local Specie
a. Superlight c. Emergency Light
b. Fishing light d. UV light