d. None of the above 1. Is the variety of all life forms on 7. This refers to the interactions between Earth – plants, animals, the human social system and the microorganisms. ecosystem Interactions between the human a. Water area social system and the ecosystem. b. Saltwater a. Human Interactions c. Forest Ecosystem b. Human-Ecosystem Interactions d. Biodiversity c. Environmental Interactions 2. Is a community of trees, shrubs, herbs, d. Human-Environmental Interactions microorganisms and animals, the trees 8. Also known as environmental and natural being the most obvious living structure. resources law, is a collective term a. Environment describing the network of treaties, statutes, b. Freshwater regulations, common and customary laws c. Forest Ecosystem addressing the effects of human activity on d. Wetlands the natural environment. 3. Through the process of _________, a. Natural Law green plants capture sunlight energy and b. Natural Resources Law combine it with carbon dioxide and water to c. Environmental Treaties produce carbohydrates and oxygen. d. Environmental Law a. Chemosynthesis 9. Environmental laws cover a wide range of b. Photosynthesis topics including the following, except. c. Ecosystem a. Air Quality d. Environment b. Water Quality 4. They break down dead bodies of plants c. Land Quality and animals into simpler compounds and d. Waste Management return inorganic nutrients to the soil 10. This refers to a group of indigenous environment. plants in an ecosystem of a geographical a. Consumers region. b. Decomposers a. Flora c. Primary producers b. Fauna d. Buyer c. Plant 5. Is the capacity of natural processes and d. Animals components to provide goods and services 11. This refers to any variety of means that may satisfy human needs either directly employed to limit damage done to the or indirectly.” environment by the discharge of harmful a. Environment substances and energies. b. Ecosystem function a. Pollution control c. Ecosystem b. Environmental protection d. Biodiversity c. Conservation 6. The following are the threats to d. Environmental sustainability biodiversity, except 12. The following are the specific means of a. Climate change pollution control, except. b. Pollution a. Recycling b. hazardous-waste management b. Ecosystem components c. disposal system c. Ecosystem d. Deforestation d. Ecosystem function 13. Variability among living organisms from 20. Materials disposed of illegally are all sources including, inter alia, terrestrial, generally considered abandoned, and marine and other aquatic ecosystems subsequently, abandoned materials are a. Biodiversity generally considered to be b. Abiotic (Physical) Components a. Toxic c. Biological Productivity b. Substance d. Primary Producers c. Waste 14. The non – living elements such as d. Trash sunlight, water, air and soil are called? 21. The following are examples of a. Biodiversity environmental crimes, except. b. Abiotic (Physical) Components a. illegal logging c. Biological Productivity b. dumping of hazardous waste d. Primary Producers c. regulated fishing 15. They are called the reducer organisms d. killing and destruction of wildlife such as bacteria or fungi. 22. What do you call this process where the a. Biotic Components green plants capture sunlight energy and b. Trophic level combine it with carbon dioxide and water to c. Decomposer produce carbohydrates and oxygen. d. Food Chains a. Photosynthesis 16. Pathways along which nutrients pass b. Composition through an ecosystem. c. Decomposition a. Biotic Components d. Chemosynthesis b. Trophic level 23. This refers to a straight line sequence of c. Decomposer who eats whom in an ecosystem. d. Food Chains a. food web 17. Is a complex system that deals with a b. food chain network of living and non-living entities. c. man-made ecosystem a. Environment d. natural ecosystem b. Wildlife 24. This refers to a series of interlocking c. Biodiversity food chains in an ecosystem. d. Mother nature a. food web 18. Is the interaction of the community b. food chain (living components) and the non-living c. man-made ecosystem environment. d. natural ecosystem a. Environment 25. Is the circulation of a chemical element b. Ecosystem (e.g. carbon, nitrogen and oxygen) between c. Biodiversity abiotic and biotic compartments of the d. Mother nature ecosystem. 19. This refers to a functional unit of nature a. food web consisting of abiotic and biotic components. b. food chain a. Ecosystem structure c. biogeochemical cycle d. natural ecosystem 31. This court can issue a TRO or writ of 26. Fundamental allocation of costs but not preliminary injunction against lawful actions automatically also as a principle of of government agencies that enforce allocation of responsibility. Cost incurred to environmental laws or prevent violations avoid, remove and compensate damage thereof. should be allocated to the party responsible a. Precautionary principle a. Polluters Pay principle b. Continuing mandamus b. Principle of prevention c. Strategic lawsuit against public c. Principle of Cooperation participation (SLAPP) d. Principle of Responsibility d. Supreme Court 27. When was the International Union for 32. Refers to an action whether civil, Conservation of Nature’s Red List of criminal or administrative, brought against Threatened Species established? any person, institution or any government a. 1954 agency or local government unit or its b. 1964 officials and employees, with the intent to c. 1955 harass, vex, exert undue pressure or stifle d. 1965 any legal recourse that such person, 28. It is a powerful tool to inform and institution or government agency has taken catalase action for biodiversity conservation or may take in the enforcement of and policy change, critical to protecting the environmental laws, protection of the natural resources we need to survive. It environment or assertion of environmental provides information about range, rights. population size, habitat and ecology, use a. Precautionary principle and/or trade, threats, and conservation b. Continuing mandamus actions that will help inform necessary c. Strategic lawsuit against public conservation decisions. participation (SLAPP) a. IUCN Red list d. Supreme Court b. UN Red lis 33. Is a writ issued by a court in an c. UCIN Red list environmental case directing any agency or d. NCUI Red list instrumentality of the government or officer 29. The court shall have this period from the thereof to perform an act or series of acts filing of the complaint to try and decide the decreed by final judgment which shall case in relation to environmental cases. remain effective until judgment is fully a. 1 year satisfied. b. 2 years a. Precautionary principle c. 6 months b. Continuing mandamus d. 3 years c. Strategic lawsuit against public 30. Any private person who is authorized or participation (SLAPP) deputized by the court to serve summons, d. Supreme Court orders and other court processes. 34. States that when human activities may a. Clerk of the court lead to threats of serious and irreversible b. Judge of the court damage to the environment that is c. Officer of the court scientifically plausible but uncertain, actions d. Deputy of the court shall be taken to avoid or diminish that b. Mineral threat. c. By-product or derivatives a. Precautionary principle d. Consent decree b. Continuing mandamus 39. Under what branch of government does c. Strategic lawsuit against public the EPA belong? participation (SLAPP) a. Executive branch d. Supreme Court b. Judicial branch 35. Refers to a judicially-approved c. Legislative branch settlement between concerned parties d. Law enforcement branch based on public interest and 40. Who may file an action to enforce rights public policy to protect and preserve the or obligations under environmental laws? environment. a. any person a. Environmental protection order b. any filipino citizen (EPO) c. any person with legal age b. Mineral d. all of the above c. By-product or derivatives 41. This law articulates that the state shall d. Consent decree promote national awareness of the role of 36. Means any part taken or substance natural resources in economic growth and extracted from wildlife, in raw or in the importance of environmental processed form including stuffed animals conservation and ecological balance and herbarium specimens. towards sustained national development. a. Environmental protection order a. RA 9512 (EPO) b. RA 6969 b. Mineral c. PD 1586 c. By-product or derivatives d. RA 9003 d. Consent decree 42. The law ensures proper segregation, 37. Refers to all naturally occurring collection, storage, treatment and disposal inorganic substances in solid, gas, liquid, or of solid waste through the formulation and any intermediate state excluding energy adaptation of best eco-waste products materials such as coal, petroleum, natural a. RA 9512 gas, radioactive materials and geothermal b. RA 6969 energy c. PD 1586 a. Environmental protection order d. RA 9003 (EPO) 43. What does "biodiversity" refer to? b. Mineral a. The number of people living in a c. By-product or derivatives particular area. d. Consent decree b. The variety of plant and animal 38. An order issued by the court directing or species in an ecosystem. enjoining any person or government agency c. The amount of water available in a to perform or desist from performing an act region. in order to protect, preserve or rehabilitate d. The average temperature in a given the environment. year. a. Environmental protection order 44. The following are rights of the (EPO) Indigenous cultural communities that should be exercise under the Republic Act 837 a. Laws governing firearms and except_______? weapons a. Right to redemption b. Environmental regulations on waste b. Right to transfer land/property management c. Right to Ancestral domain c. Regulations for tobacco and d. Right to travel and ask support smoking 45. The following acts and omissions shall d. Animal rights and protection be considered unlawful under Republic Act 49. RA 7586 An Act Providing for The 6969 except. Establishment and Management of National a. Knowingly use a chemical substance Integrated Protected Areas, the following or mixture which is imported, categories are protected areas under this manufacture, processed, or law except. distributed in violation of this Act or a. Natural monument implementing rules and regulations b. Wildlife sanctuary or orders; c. Reservoir b. Failure or refusal to submit reports, d. Resource reserve notices or other information, access 50. Which of the following "Kyoto Protocol" to records as required by this Act, or an international treaty that addresses for? permit inspection of establishment a. Ozone depletion where chemicals are manufactured, b. Climate change processed, stored or otherwise held c. Desertification c. Failure or refusal to comply with the d. Primary Producers pre-manufacture and pre-importation 51. Which of the following is an abiotic requirements factor in an ecosystem? d. Habitat loss and degradation cut a. Predators across ecosystems and impacts on b. Plants other due to their interrelatedness c. Soil and interconnectedness. d. Herbivores 46. What does Green Laws primarily 52. In cases of referral to mediation, the focused on? court shall immediately refer the parties or a. Habitat function their counsel, and if authorized by their b. Public safety and welfare clients, to the Philippine Mediation Center c. Environmental protection and (PMC) unit for purposes of mediation. When conservation does the mediation conducted from the d. Regulation of alcohol sales receipt? 47. Considered as one of the most a. Within the period of 30 days influential aspects that affect values and the b. Within the period of 15 days environment. c. Within the period of 10 days a. Religion d. Within the period of 65 days b. Church 53. Within ________from the time the c. Government petition is submitted for decision, the court d. Community shall render judgment 48. Brown Laws are associated for the granting or denying the privilege of the writ purpose of ___________? of kalikasan. a. within 30 days a. Indigenous Peoples' Rights Act b. within 60 days (IPRA) c. within 1 year b. Cultural Heritage Preservation Act d. within 90 days c. National Cultural Heritage Act 54. In the conduct of ocular inspection the d. Indigenous Cultural Protection Act order of motion must show the necessary 59. Which law is primarily concerned with things to establish the magnitude of the preservation and protection of tangible violation and supported by ____________ and intangible cultural heritage in the having the personal knowledge of the Philippines? violation or threatened violation of a. Indigenous Peoples' Rights Act environmental law. b. National Cultural Heritage Act a. Affidavit of the Petitioner c. Cultural Preservation and b. Affidavit of the desistance Recognition Act c. Affidavit of the Court d. Heritage Conservation and d. Affidavit of the witness Protection Act 55. Within how many days upon the filing of 60. This is called a finished or unfinished a citizen suit, the court shall issue an order wood product whose components or parts which shall contain a brief description of the are taken apart for ease in packing, cause of action and the reliefs prayed for, handling, and transporting to the market or requiring all interested parties to manifest end-users? their interest to intervene in the case? a. certificate of verification a. 10 days b. Finished Product b. 15 days c. Semi-finished product c. 30 days d. Knocked-down d. 60 days 61. Refers to networks from compromised 56. This principle is based on the concept of computers that are controlled externally by balance to maintain economic development remote hackers. on the one hand and environmental a. DDoS Attacks protection on the other hand. b. Botnets a. Polluter Pays Principle c. Cyberstalking b. User Pays Principle d. PUPs c. Precautionary Principle 62. This cybercrime occurs when a criminal d. Principle of Proportionality gains access to a user’s personal 57. This approach aims the study of information to steal funds, access relations between humans or society and confidential information, or participate in tax nature, through a multidisciplinary or health insurance fraud. approach. a. Online Scams a. Adhoc Approach b. Prohibited/Illegal b. Human Ecology Approach c. Identity Theft c. Political Approach d. Phishing d. Ecosystem Approach 63. Cyber terrorism is one distinct kind of 58. Which law recognizes and protects the crime in this category. rights of indigenous peoples in the a. Cybercrimes Against Property Philippines? b. Cybercrimes Against Person c. Cybercrimes Against Government c. Hacking d. Cybercrimes Against Terrorism d. Phishing 64. They are readymade tools criminals can 70. This type of training includes email buy online and use against anyone with a simulated phishing campaigns to computer. employees, monitoring results, reinforcing a. Botnets training, and improving on simulation b. Exploit kits results. c. PUPs a. Phishing awareness training d. Phishing b. Compromised credentials detection 65. Also known as orgware or humanware. c. Ransomware prevention a. Computer software d. Threat intelligence program b. Computer System 71. This type of cyberattack can make life c. Computer hardware easier in the moment, but can come back to d. Liveware haunt that user later on. 66. It refers to the physical, tangible a. Ddos attack computer equipment and devices, which b. Credential Reuse provide support for major functions such as c. Malware input, processing (internal storage, d. Phishing computation, and control), output, 72. This happens when an attacker sends secondary storage (for data and programs), you an email that appears to be from and communication. someone you trust, like your boss or a a. INPUT DEVICES company you do business with. b. KEYING DEVICES a. Malware c. SOFTWARE b. Online Scam d. HARDWARE c. Phishing 67. It temporarily stores information that d. Cyberattack theCPU uses while the computer is on. 73. It effectively employs malicious codes a. ALU and manipulates backend databases to b. RAM access information that is not intended to be c. ROM displayed. d. CPU a. SQL attack 68. It is a medium that connects different b. XSS attack computers altogether and makes sure that c. Password attack the connection is eternal. d. DDos attack a. Server 74. This type of cybercrime is also known as b. Internet sniffing or snooping. c. Transmission Lines a. Insider Threat d. Clients b. Eavesdropping attack 69. It is any form of malicious activity c. Drive by attack targeting IT systems and/or the people d. Phishing attack using them to gain unauthorized access to 75. It causes fragmentation in the general systems and data they contain. sequence of Internet Protocol (IP) packets a. Cybercrime and sends these fragmented packets to the b. Cyberattack victim’s machine. a. Trojan Horse 80. Crimes that primarily target computer b. Malware networks or devices may include: c. Teardrop attack a. Denial-of-service attacks d. PUPs b. Computer viruses 76. It is a type of malicious software c. Malware program that attempts to disguise itself to d. All of the foregoing appear useful, it appears like a standard 81. It includes laws related to computer application but causes damage to data files crimes, internet crimes, information crimes, once executed. communications crimes, and technology a. Trojan Horse crimes. b. Virus a. Cybercrime c. Malware b. Cybercrime Laws d. Web Attack c. Anti-cybercrime Laws 77. It is a type of hacking that the hackers d. Cybercrime Prevention Act of 2012 sometimes request money in return for 82. It is the taking and maintaining of promising to stop the attacks, or sometimes measures to manage data safely, such as just want to cause preventing security breaches or the loss or chaos or impairment in operation. damage of data, and guaranteeing the a. Identity Theft safety and reliability of information and b. Cyber Extortion telecommunications systems and networks c. Cyber Blackmail in Japan. d. Feed Hacking a. Computer Crimes Act 78. This happens when criminals approach b. PIPEDA and coerce children through chat rooms in c. Basic Act on Cybersecurity order to get media files afterwards exploited d. Act on Computer Crimes for pornographic reasons. 83. This refers to a set of instructions a. Child Pornography executed by the computer to achieve b. Cybersex intended results. c. Child soliciting and Abuse a. Computer d. Trafficking b. Computer data 79. It can be as simple as constant contact c. Computer system with a person (ex: send an e-mail) who has d. Computer program said they want no further contact with the 84. It is the act of listening to, recording, sender, or it may also include sexual monitoring or surveillance of the content of remarks, threats, harassment, pejorative communications, including procuring of the labels, making someone the subject of content of data, either directly, through ridicule in forums, and posting false access and use of a computer system or statements that aims to humiliate an indirectly, through the use of electronic individual. eavesdropping or tapping devices, at the a. Cyber extortion same time that the communication is b. Cyber Stalking occurring. c. Cyber Bullying a. Access d. Cybersquatting b. Interception c. Wiretapping d. Alteration d. Data hiding analysis 85. A computer or a computer network, the 90. Analysis is the process of interpreting electronic medium in which online the extracted data to determine their communication takes place. significance to the case. a. Internet a. True b. Cyber b. False c. Social Media c. Maybe true d. Cybercrime d. Maybe false 86. The intentional or reckless alteration, 91. Data investigation does not require to damaging, deletion or deterioration of maintain a copy of chain of custody computer data, electronic document, or documentation. electronic data message, without right, a. True including the introduction or transmission of b. False viruses. c. Maybe true a. Data Interference d. Maybe false b. Illegal Access 92. Never turn on or operate a suspect's c. Illegal Interception computer during investigation if it is off. d. System Interference Determine disk structure, model and size. 87. It is the information stored or transmitted a. True in binary form that may be relied on in court. b. False It can be found on a computer hard drive, a c. Maybe true mobile phone, among other places. d. Maybe false a. Computer data 93. In the preparation phase, its goal is to b. Cyber collect, preserve, analyze the physical c. Internet evidence and reconstruct what happened in d. Digital evidence the crime scene. 88. First responders should remember that a. True digital evidence may also contain physical b. False evidence such as DNA, fingerprints, or c. Yes serology. Physical evidence should be d. No preserved for appropriate examination. 94. This warrant requires any person or a. True service provider to b. False disclose subscriber's information, traffic c. Maybe true data, or relevant data in his/her or its d. Maybe false possession or within 72 hours from receipt 89. During this stage the extraction of the of the order. data from the drive is based on the file a. WDCD system(s) present on the drive b. WSSECD and may include data from such areas as c. WICD active files, deleted files, file slack, and d. WECD unallocated file space. 95. This type of warrant authorizes the law a. Physical extraction enforcement authorities to listen to, record, b. Logical extraction monitor, or conduct surveillance of the c. Analysis of extracted data content of communications, including the use of electronic eavesdropping or tapping devices. a. WDCD b. WICD c. WSSECD d. WECD 96. Where to file the warrant to obtain computer data? a. MTC b. RTC c. Supreme Court d. Court of Appeals 97. Who promulgated the Rule on Cybercrime Warrants in 2018? a. President b. Supreme Court c. RTC d. Court of Appeals 98. How many days is the effective date of the warrant to obtain computer data? a. 10 days b. 15 days c. 30 days d. 60 days 99. How many hours is the disclose subscriber's information, traffic data, or relevant data in his/her or its possession or control upon receipt of warrant? a. 24 hrs b. 36 hrs c. 72 hrs d. 3 days 100. What type of warrant is similar to a search warrant, except the subject matter is computer data. a. WDCD b. WICD c. WSSECD d. WECD