You are on page 1of 39

FILIBERT PATRICK F.

TAD-AWAN, MS CRIM UNIVERSITY OF BAGUIO

1. It includes lewd and lascivious acts, indecent exposure, incest or statutory rape involving any child, male or female, under age fourteen. a. Child Molestation b. Child Abuse c. Child Prostitution d. Incest Rape e. Statutory Rape 2. It is sexual intercourse with another person nearer of kin than first cousin when the relationship is known. a. Child Molestation b. Child Abuse c. Child Prostitution d. Incest Rape e. Statutory Rape 3. The act of a person who achieves sexual arousal by looking at intimate sexual scenes. Window peeking; peeping tomism. a.Child Molestation b. Child Abuse c. Voyeurism or Scoptophilia d. Incest Rape e. Statutory Rape

4. A form of peeping tom where the person achieves erotic stimulations by watching himself or herself in sexual scenes. a. Child Molestation b. Tiolism c. Voyeurism or Scoptophili d. Incest Rape e. Statutory Rape

5. A person, who intentionally and repeatedly follows, attempts to contact, harasses and/or intimidates another person. a. Surveillant b. Convoy c. Voyeurism or Scoptophilia d. Stalker/Stalking e. Cover Up
6. Touching a minor so as to arouse, appeal to or gratify the perpetrators sexual desires; the touching may be done by the perpetrator or by the minor under the perpetrators direction. a. Lewdness b. Carnal Knowledge c. Acts of Lasciviousness d. Urge e. All of the above

7. To employ, use, persuade, induce, entice or coerce a minor to engage or assist in engaging in any sexually explicit conduct, e.g., prostitution and pornography. a. Sexual Exploitation b. Sexual Contact c. Acts of Lasciviousness d. Lewdness e. All of the above
8. Persons who knowingly purchase stolen property at a fraction of its cost and then resell it at a considerable profit, but still at a good price, to a consumer. a. Stealers b. Fencers/ Receivers c. Thieveries d. Fraudulence 9.The clinical term for the injuries sustained by a physically abused child. a. Child Abuse b. Battered-child syndrome c. Child Pornography d. Cyberstalking e. Cyberterrorism

10. The sexually explicit visual depiction of a minor (as defined by statute); includes photographs, negatives, slides, magazines, movies, videotapes, and computerized images. a. Child Abuse b. Battered-child syndrome c. Child Pornography d. Cyberstalking e. Cyberterrorism 11. The crime of harassing or threatening victims by means of electronic technologies (e.g., through e-mail and Internet chat rooms or news groups). a. Child Abuse b. Battered-child syndrome c. Child Pornography d. Cyberstalking e. Cyberterrorism 12. The use of electronic tools to disrupt or shut down critical infrastructure components, such as energy, transportation, and government operations. a. Child Abuse b. Battered-child syndrome c. Child Pornography d. Cyberstalking e. Cyberterrorism

13. It is a form of child abuse like indecent exposure, sexual contact, child pornography, etc., in which an adult or older adolescent abuses a child for sexual stimulation . a. Human Abuse b. Child Sexual abuse c. Sexual Assault d. Sexual Exploitation e. Sexual Grooming 14. A term defining offenses in which an adult touches a minor for the purpose of sexual gratification; for example, rape(including sodomy), and sexual penetration with an object. a. Human Abuse b. Child Sexual abuse c. Sexual Assault d. Sexual Exploitation e. Sexual Grooming

15. It refers to offenses in which an adult victimizes a minor for advancement, sexual gratification, or profit; for example, prostituting a child, and creating or trafficking in child pornography. a Sexual Exploitation b. Sexual Grooming c. Child Sexual Abuse d. Sexual Exploitation
16. The social conduct of a potential child sex offender who seeks to make a minor more accepting of their advances, for example in an online chat room. a. Sexual Exploitation b. Child Sexual Abuse c. Sexual Grooming d. Sexual Assault

17. Issuance of a bank note without sufficient funds shall be penalized under a. BP Blg 42 b. BP Blg 22 c. RA No. 42 d. RA No. 22 18. It guarantees the rights of every person against illegal arrest a. Sec. 12, Art. III, 1987 Phil. Constitution c. RA No. 7438 b. Sec. 2, Art. III, 1987 Phil. Constitution d. The Revised Penal Code e. All of the above 19. The new law that protects every female government and non-government employee shall be protected under this mantle of law in regards to maternity leave whether married or single a. PD No. 9710 b. CA No. 9710 c. RA No. 9710 d. Any of the above 20. This law prohibits betting, game-fixing or point shaving in sports contests a. PD 438 b. PD 483 c. PD 1612 d. RA No. 1602

21. Criminal Procedure requires that all cases must pass through possible settlement in the Barangay level except in those instances where it have fixed it under the exception rule. This is made so under the a. Katahimikan Barangay Law b. Katarungang Barangay Law c. Katarungang Pambarangay Law d. All of the above

22. Any person who must or in due consideration of its experience as business enthusiast but shall purchase items subjects of theft and robbery may be held liable in violation of a. PD No. 1829 b. PD No. 1612 c. RA No. 1379 d. RA No. 3019 23. Any person who shall intervene in the legal arrest of a violator may held liable for; likewise any officer who shall dispense with any evidence in his custody without proper authority may be held liable for a. PD No. 1829 b. PD No. 1612 c. RA No. 1379 d. RA No. 3019 24. Government employees who shall directly or indirectly for gain shall use his office may be held liable for a. PD No. 1829 b. RA No. 3019 c. RA No. 4200 d. RA No. 6713

25. Every employee must behave and perform his/her utmost to achieve the mission and vision of the agency he/she belongs, as policy it shall observe a code known as Code of Conduct and Ethical Standards and this is provided for by a. RA No. 6968 b. RA No. 6981 c. RA No. 6713 d. RA No. 7080 26. The Manila Peninsula siege is an example of this violation because the group wants to grab power through force and violence, this is against a. RA No. 6968 b. RA No. 6981 c. RA No. 6713 d. RA No. 7080 27. Any person who shall voluntarily act as state witness and without such testimonies no clear picture can be had on a heinous crime; witness testimony shall be material and the only available source, to encourage voluntariness of witness the state guarantee their protection from any harm, this is guaranteed by a. RA No. 6968 b. RA No. 6981 c. RA No. 7438 d. RA No. 7080

28. It is the implementing law of Sec. 12, Art. III, 1987 Philippine Constitution because it provides the sanctions violating said section a. RA No. 6968 b. RA No. 6981 c. RA No. 7438 d. RA No. 7080

29. The law that guarantees full respect of human rights and uphold development of its human resources against any person having authority, influence or moral ascendancy in work and training or education environment, demands or otherwise requires any sexual favor from the other is a. RA No. 7610 b. RA No. 7658 c. RA No. 7877 d. RA No. 8187

30. Is a crime whereby the proceeds of an unlawful activity as herein defined are transacted, thereby making them appear to have originated from legitimate sources. It shall involve the withdrawal of a cash in one banking day the amount more than P500,000.00 is a. RA No. 8187 b. RA No. 9194 c. RA No. 9165 d. RA No. 8294
31. The law or act that provides special protection against Child Abuse, Exploitation and Discrimination is a. RA No. 9344 b. RA No. 7610 c. RA No. 9262 d. PD 603

32. The law that regulates the employment of Children below 15 years old is governed by a. RA No. 7658 b. RA No. 9208 c. RA No. 8353 d. RA No. 9262

33. The law that amended Art. 134 of the Revised Penal Code providing stricter penalty committing Rebellion, Coup detat, Sedition and Disloyalty a. RA No. 6975 b. RA No. 6968 c. RA No. 7695 d. RA No. 7658 34. Refers to any act, transaction, scheme or design involving the use of a person by another, for sexual intercourse or lascivious conduct in exchange for money, profit or any other consideration. a. Rape b. Prostitution c. Slavery d. Trafficking 35. The extraction of work or services from any person by means of excitement, violence, intimidation or threat, including deprivation of freedom, debt-bondage or deception a. Forced Labor and Slavery b. Human Trafficking c. Prostitution d. All of the above 36. The law to institute policies to eliminate trafficking in persons especially women and children, establishing the necessary Institutional Mechanisms for the Protection and Support of Trafficked Persons and providing for its violations and for other purposes a. RA No. 9208 b. RA No. 9344 c. RA No. 7610 d. RA No. 9231

37. The act of intercepting and recording telephone conversations by a mechanical device without the consent of either party in the conversation a. Stalking b. Surveillance c. Wiretapping d. Recording 38. A person who intentionally and repeatedly follows, attempts to contact, harasses and/or intimidates another person a. Stalking b. Surveillant c. Informer d. Stalker 39. The act of employing, using, persuading, inducing, enticing or coercing a minor to engage or assist in engaging in any sexually explicit conduct, e.g. prostitution and pornography is a. Child Exploitation b. Human Trafficking c. Sexual Exploitation d. All of the above 40. Reclusion Perpetua under the RPC is penalized with 20 yrs and 1 day to 30 yrs, however, it has been increased to forty years by this law; otherwise known as the Death Penalty or Heinous Crimes Law is a. RA No. 7659 b. RA No. 6975 c. RA No. 7438 d. RA No. 6425 e. RA No. 9165

41. When an offender is detained while the criminal case against him is being heard, either because the crime committed is a capital offense and not bailable, or even if the crime committed was bailable the offender could not post the required bail for his provisional liberty is a. Detention b. Preventive Imprisonment c. Incarceration d. Custodial Detention e. All of the above 42. That evidence ,which is vital for the investigation or prosecution of a case; tending to prove or actually proving guilt or innocence a. Prima-facie Evidence b. Associative Evidence c. Probative Evidence d. Cumulative Evidence 43. That evidence that warrants a person of reasonable caution to believe that a crime has been committed a. Probative Evidence b. Prima-facie Evidence c. Associative Evidence d. Probable Cause 44. That kind of evidence sufficient to establish a fact, or raise a presumption of fact, unless rebutted is a. Prima-facie Evidence b. Associative Evidence c. Probative Evidence d. Cumulative Evidence

45. Any official proceeding one makes a false statement under oath or equivalent affirmation or swears or affirms the truth of a statement previously made. a. Libel b. Oral Defamation c. Forgery d. Falsification e. Perjury 46. It is the doctrine in Theft cases; which provides that the taking of several things, whether belonging to the same or different owners at the time and place arising from one criminal resolution constitutes but one offense a. Single Larceny Doctrine b. Large Scale Doctrine c. Motu Proprio d. Res Judicata 47. A group of two or more persons collaborating, conspiring, confederating or mutually helping one another in the commission of any crime for profit and using fear and corruption to obtain immunity from the law a. Oppression b. Organized/Syndicated Crime Group c. Brigandage d. Band e. Highway Robbery 48. It imports an act of cruelty, severity, unlawful exaction, domination, or excessive use of authority is a. Oppression b. Organized/Syndicated Crime Group c. Brigandage d. Band e. Highway Robbery

49. A device linking a computer to telephone lines so that messages can be sent between computers at different locations a. CPU b. Monitor c. CD Room d. Modem 50. The pattern or usual method of how criminals accomplish their criminal activities is a. Motive b. Criminal Intent c. Modus Operandi d. Conspiracy e. All of the Above 51. It happens when the officer practically induces the prospective accused into the commission of the offense, thus himself becomes a co-principal a. Entrapment b. Buy Bust c. Instigation d. Surveillance 52. A name for writs seeking to bring a party in custody before a court or judge to examine into the lawfulness of the imprisonment a. Writ of Amparo b. Writ of Mandamus c. Writ of Possession d. Writ of Habeas Corpus

53. It is a remedy available to any person whose right to life, liberty, and security has been violated or is threatened with violation by an unlawful act or omission of a public official or employee, or of a private individual or entity. The writ covers extralegal killings and enforced disappearances or threats thereof. a. Writ of Amparo b. Writ of Mandamus c. Writ of Possession d. Writ of Habeas Corpus

54. Refers to the Juvenile Justice and Welfare Act of 2006 a. Ra No. 9262 b. RA No. 9344 c. RA No. 9208

d. RA No. 7610

55. Amending the Death Penalty Law into Life Sentence or An Act Prohibiting the Imposition of Death Penalty Law (RA 7659) in the Philippines a. RA No. 9344 b. RA No. 9346 c. RA No. 7659 d. RA No. 7438 56. Otherwise known as Holiday Economics of July 25, 2007 meaning shifting holiday observances to reduce disruption to business and production schedules, encourage domestic tourism and give employees weekends. a. RA No. 9492 b. RA No. 9346 c. RA No. 9344 d. RA No. 9349 57. Otherwise known as the Hospital Holiday provides patients privilege to be discharged upon signing a promissory note covering unpaid hospital obligation. a. RA 9439 b. RA No. 9344 c. RA No. 9346 d. RA No. 9492

58.Malicious dissemination of information or the willful making of any threat concerning bombs, explosives or any similar device or means of destruction. a. PD No. 1866 b. PD No. 1927 c. PD No. 1727 d. PD No. 226 59. Known as the Doctrine of Command Responsibility , s. 1995 a. EO No. 262 b. EO No. 162 c. EO No. 226 d. EO No. 622
60. Known as the Paternity Leave Act of 1996 a. RA No. 7788 b. RA No. 8187 c. RA No. 8787

d. RA No. 7887

61. An Act Declaring Forfeiture in Favor of the State any Property Found to have been Unlawfully Acquired a. RA No. 1379 b. RA No. 1739 c. RA No. 9371 d. RA No. 2971

62. Known as the Overseas Absentee Voting Act of 2003 a. RA No. 9189 b. RA No. 8485 c. RA No. 9173
this was amended by

d. RA No. 9003

63. RA No. 9160 originally provides for the Anti-Money Laundering Act of 2001, however, a. RA No. 9189 b. RA No. 9173 c. RA No. 9164 d. RA No. 9003

64. RA No. 9003 Ecological Solid Waste Management Act of 2000 a. RA No. 8485 b. RA No. 8293 c. RA No. 9048
65. Known as the Act to Regulate the Use of Aliases ct of 1998 a. RA No. 9189 b. RA No. 6085 c. RA No. 9048

d. RA No. 9003

d. RA No. 9173

66. Republic Act No. 7192 Provides for the Integration of Women as Partners

in Development and Nation Building.


b. RA No. 7192

a. RA No. 9173

c. RA No. 8485

d. RA No. 8293

67. An Act Authorizing the City or Municipal Civil Registrar or the consul general to correct a clerical or topographical error in an entry and/or change of first name or nickname in the civil register without need of a judicial order, amending for this purpose Articles 376 and 412 of the Civil Code of the Philippines. a. RA No. 8485 b. RA No. 8293 c. RA No. 9048 d. RA No. 9003

68. Republic Act No. 1379 - An Act declaring forfeiture in favor of the state any property found to have been unlawfully acquired by any public officer or employee and providing for the proceedings therefore. a. RA No. 6425 b. Republic Act No. 1379 c. RA No. 1999 d. RA No. 8749 69. These are acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses is a. Cyber Crime b. Cyber Terrorism c. Cyber Space d. Cyber Stalking 70. The widespread growth of crime using the space that has affected nations from all across the globe and have caused extensive loss to a nations economy is a. Cyber Crime b. Cyber Terrorism c. Cyber Space d. Cyber Stalking 71. The premeditated, politically motivated violence perpetrated against noncombatant targets by sub-national groups or clandestine agents, usually intended to influence an audience. a. Subversion b. Humanity Crimes c. Organized Crimes d. Terrorism

72. Known as the anti-establishment rebel in the computer universe. Also refers to the entire counterculture in thin air. a. Cyber Cops b. Cyberpunk c. Cyber Space d. All of them 73. the thin air that exists between two computers. a. Cyber Cops b. Cyberpunk c. Cyber Space

d. All of them

74. is a name given to investigators involved in computer forensics. Computer evidence is often in the form of disks, data reports, programming or other printed information run from information in the computer. a. Cyber Cops b. Cyberpunk c. Cyber Space d. All of them 75. Rumor Mongering, publishes, distributes and spread rumors, false news and information, gossips or causes the publication or spreading information causing panic and divisive effects. a. PD 90 b. PD 100 c. PD 905 d. PD 190

76. It is the application of computer based technology to the systematic input, storage, retrieval and analysis of data (encoded facts) or information (encoded facts with meaning). a. Hacker b. Data Base Management or DBM c. Hardware d. Management Information System 77. A computer expert who specializes in unauthorized access into computer networks and other computer systems. a. Cyber Cops b. Cyber Punk c. Hacker d. Management Information System (MIS) 78. That is, the computer equipment should include all identification data such as the manufacturer, model, identification numbers and the language used by the system. a. Hacker b. Cyber Cops c. Cyber Space d. Hardware 79. Simple storage of files or records, designed to provide managers with information on organizational activities, budgets, personnel actions, historic and projected future demands for services needed for planning. a. Hacker b. Data Base Management or DBM c. Hardware d. Management Information System

80. An Act Defining the Crime of Art Forgery, Providing Penalties... a. RA No. 9105 b. RA No. 8042 c. RA 1405 d. RA No. 8043 81. An Act to Institute the Policies Of Overseas Employment of Workers .. a. RA No. 9105 b. RA No. 8042 c. RA 1405 d. RA No. 8043 82. An Act Establishing The Rules To Govern Inter-Country Adoption Of Filipino Children... a. RA No. 9105 b. RA No. 8043 c. RA 1405 d. RA No. 8042 83. Known as the Philippine Passport Act of 1996 a. RA No. 8043 b. RA 1405 c. RA No. 8042

d. RA No. 8239

84. An Act To Prohibit And Penalize Wire Tapping And Other Related Violations Of The Privacy ... a. RA No. 9105 b. RA No. 8043 c. RA 1405 d. RA No. 4200

85. An Act To Declare Unlawful The Practice Of Matching Filipino Women For

Marriage To Foreign Nationals ... a. EO No. 8 b. RA No. 6969

c. RA No. 6955

d. RA N0. 9174

86. An Order creating a Presidential Anti-Organized Crime Commission and a Presidential Anti-Organized Crime Task Force to Investigate and Prosecute Criminal Elements in the Country a. EO No. 8 b. PD No. 90 c. EO No. 226 d. EO N0. 262 87. An Act Defining and Penalizing the Crime Of Plunder a. RA No. 7080 b. RA No. 6969 c. RA No. 6955 d. RA N0. 9174

88. An Act Prohibiting Disclosure Of Or Inquiry Into, Deposits With Any Banking Institution And Providing Penalty Therefore a. RA No. 7080 b. RA No. 6969 c. RA No. 1405 d. RA N0. 9174
89. An Act To Control Toxic Substances And Hazardous And Nuclear Wastes... a. EO No. 8 b. RA No. 6969 c. RA No. 6955 d. RA N0. 9174 90. An Act Providing For The Conservation And Resources. a. EO No. 8 b. RA No. 6969 c. RA No. 6955 Protection Of Wildlife d. RA N0. 9174

91. Used to describe a criminal organization designed to last through time, beyond the lifespan of current members via a mix of legitimate "fronts. a. Longevity b. Co-terminus c. Temerity d. Perpetuity 92. It is a non- ideological enterprise involving a number of persons in close social interaction, organized on a hierarchical basis, with at least three levels/ranks, for the purpose of securing profit and power by engaging in illegal and legal activities is a. Terrorism b. Organized Crime c. Humanity Crimes d. All of the above 125. Refers to the ability to get the processed data or information out of the computer. a. Input b. Out Put c. Organized Crime d. Stored Data 93. Refers to the programs used on the computer that is usually copied or printouts made. a. Hardware b. Software c. Disc Output d. All of the above 94. Known as the Anti-Graft and Corrupt Practices Act a. RA No. 3019 b. RA No. 1405 c. RA No. 9165 d. RA No. 6425

95. An Act Authorizing the City or Municipal Civil Registrar or the consul general to correct a clerical or topographical error in an entry and/or change of first name or nickname in the civil register without need of a judicial order, amending for this purpose Articles 376 and 412 of the Civil Code of the Philippines. a. RA No. 1405 b. R.A. No. 1379 c. RA No. 9048 b d. RA No. 9165 96. An Act Declaring Forfeiture in Favor of the State any Property found to have been Unlawfully acquired by any Public Officer or Employee and Providing for the Proceedings thereof. a. RA No. 1405 b. R.A. No. 1379 c. RA No. 9048 d. RA No. 9165 97. It shall include the practice of issuing an invitation to a person who is investigated in connection with an offense he is suspected to have committed without prejudice to the liability of the inviting officer for any violation of law. a. Custodial Investigation b. Custodial Interrogation c. Custodial Detention d. Preventive Suspension 98. It is a term used to describe a number of criminal organizations around the world a. Organized Crimes b. Mafia c. Terrorism d. Cartel

99. It refers to the basic rights and freedoms to which all humans are entitled, often held to include the right to life and liberty, freedom of thought and expression, and equality before the law a. Constitutional Rights b. Human rights c. Political Rights d. Natural Rights 100. Defined as particularly as odious offenses in that they constitute a serious attack on human dignity or grave humiliation or a degradation of one or more human beings. a. Crimes against Christianity b. Crimes against humanity c. Crimes against the World d. Any of the above 101. The act done by any person who shall engage in trading and dealing including, but not limited to, the act of buying and selling of a child for money, or for any other consideration, or barter a. Trafficking in Persons b. Human Trafficking c. Prostitution d. Child trafficking 102. It is the Recruitment, transportation, transfer, harboring or receipt of women or children with or without the victims consent or knowledge (with deception or fraud), within or across national borders. a. Trafficking in Persons b. Human Trafficking c. Prostitution d. Child trafficking

103. It provides for the Code of Muslim Personal Laws approved Feb. 04, 1977 and which strengthens ethno-linguistic communities makes Islamic institutions more effective through the Sharia courts a. PD 1602 b. PD 1866 c. PD 1083 d. PD 1508 104. The law was enacted to establish and operate a rape crisis center in every province and city and assists rape survivors in the litigation of their cases and in their recovery. In short it refers to Rape Victim Assistance Act of 1998 a. RA No. 9208 b. RA No. 9262 c. RA No. 8505 d. All of the above 105. A statutory provision, found in many states, which makes it unlawful for any person to use a computer or computer network without authority and with the intent to (a) obtain property or services by false pretenses; (b) embezzle or commit larceny; or (c) convert the property of another a. Computer Trespass b. Computer Tampering c. Computer Crimes d. Computer Fraud 106. The illegal insertion or attempt to insert a "program" into a computer, while knowing or believing that the "program" contains information or commands that will or may damage or destroy that computer (or its data), that will or may cause loss to the users of that computer or the users of a computer a. Computer Tampering b. Computer Crimes c. Computer Trespass d. Computer Fraud

107. The offense of using a computer or computer network without authority and with the intent to (a) remove computer data, computer programs or computer software from a computer or computer network; (b) cause a computer to malfunction; (c) alter or erase any computer data, computer programs or computer software; etc. is a. Computer Trespass b. Computer Tampering c. Computer Crimes d. Computer Fraud 108. These are criminal organizations developed with the primary purpose of promoting and controlling drug trafficking operations. a. Transnational Crimes b. Terrorism c. Human Trafficking d. Drug cartels 109. Refers to crime that takes place across national borders, it is commonly used in the law enforcement and academic communities. a. Terrorism b. Drug Cartels c. Transnational crime d. Humanity Crimes

110. It means any financial transaction which generates an asset or a value as the result of an illegal act, which may involve actions such as tax evasion or false accounting. a. Tax Frauds b. Tax Evasion c. Money laundering d. Forgery

111. It is the taking away or transportation of a person against the person's will, usually to hold the person in false imprisonment, a confinement without legal authority done for ransom or in furtherance of another crime is a. Child Molestation b. Child Trafficking c. Kidnap for Ransom d. Kidnapping

112. It is the unlawful taking and carrying away of a person by force or fraud or against his will, or in any manner depriving him of his liberty for the purpose of extorting ransom as payment for his/her release. a. Kidnapping for ransom b. Child Molestation c. Child Trafficking d. Kidnapping
113. The first step in planning a kidnapping operation is to come up with a shopping list of three to four possible targets that are capable of paying a huge amount of ransom. Targets are usually businessmen of Chinese descent. a. Operation/Raid b. Negotiation c. Spotting/Surveillance d. All of the above 114. A form of collective violence interfering with the peace, security, and normal functioning of the community. a. War b. Criminal Disorder c. Civil Disorder d. Terrorism

115. Known as the Human Security Act of July 15, 2007 purposely to protect life, liberty and property from acts of terrorism; a. RA No. 9732 b. RA No. 9372 c. RA No. 6975 d. RA No. 7438

116. It includes the actions or ideologies of individuals or groups outside the perceived political center of a society; or otherwise claimed to violate common moral standards a. Insurgency b. Extremism c. Subversion d. All of the above
117. They are armed rebellion against a constituted authority, and taking part in the rebellion are not recognized as belligerents is a. Insurgency b. Extremism c. Subversion d. All of the above 118. It is a generalized intention to overthrow or undermine parliamentary democracy by political, industrial or violent means. a. Subversion b. Extremism c. Subversion d. Insurgency

119.Virtually all of the worlds coca leaves and cocaine base are grown and produced in the three (3) Andean countries of Peru and Bolivia (70%) and Colombia (30%), from this base, the two most notorious cartels Medellin and Cali reigns, these are known as a. Mexican Criminal Organization b. Colombian Drug Cartel c. Russian Mafia d. Chinese Triads 120. There are four (4) major groups from Mexico that control the majority of the heroin, cocaine, and marijuana production, smuggling, and distribution in Mexico and Western U.S. Each of these cartels operates within a distinct geographic area along the Mexico/U.S. border. a. Mexican Criminal Organization b. Colombian Drug Cartel c. Russian Mafia d. Chinese Triads 121. It is composed of six (6) great triads scattered throughout the world. Five (5) of these triads are centered in Hong Kong and Taiwan and have recently formed an alliance with the Great Circle Triad in Shanghai; this is known as a. Mexican Criminal Organization b. Colombian Drug Cartel c. Russian Mafia d. Chinese Triads

122. Money loans to persons of lower echelons, charging them 1 to 2 percent interest on large sums of money. These persons, in turn, loan the money to customers at exorbitant rates, usually 20 to 30 percent or more is a. Large Scale Estafa b. Simple Estafa c. Fraud and Falsification d. Loan Sharking e. None of the Above 123. It is a criminal organization characteristics that conducts continued effort to gain a foothold in legitimate institutions to further profit or gain a level of protection from detection. a. Concentration b. Addiction c. Infiltration d. All of the above 124. The protection of the organizations leaders by separating them from the soldiers, cell from cell, and function from function. a. Protection b. Security c. Insulation d. Conduction 125. The non-violent acquisition of possession/title use or disposition of anything of value with the intent of fraudulently terminating or abridging the legal interest of another. a. Forgery b. Misappropriation c. Estafa d. All of the above 126. The use of illicit influence, exploitation of weaknesses, and the blackmail of public and prominent figures. a. Bribery b. Extortion c. Fraudulence d. Corruption

127. It is the fraudulent appropriation of property by a person to whom it has been entrusted. a. Embezzlement b. Fraudulence c. Theft d. Malversation 128. The act of soliciting and accepting bets on any type of sporting event is the most prevalent gambling operation. a. Grambling b. Betting c. Book-making d. Soliciting 129. The international misleading of persons through information known or believed to be false; inaccurate, or misleading or by concealment of information that there is a legal duty to impart. a. Deceit b. Motive c. Malversation d. Fraud 130. It is an organized crime is directed to the pursuit of profit along welldefined lines. a. Civil Disorder b. Criminality c. Terrorism d. War Crimes

131. This is not against public policy but rather admissible in evidence because the investigator does not incite or participate in the commission of the crime although may agree with the plan of perpetrating the crime is a. Entrapment b. Inducement c. Investigation d. Demeanor 132. One method of surveillance covered by the provisions of RA #4200 is a. Tape recorder c. Concealed microphones b. Wire Tapping d. Under cover assignments 133. Determination of whether the evidence, exhibits, or testimony will be allowed in trial, inadmissible evidence cannot be allowed and is therefore not presented in court and is not heard or examined by the judges of fact. a. Impeachment b. Admissibility c. Probability d. All of the above 134. It shall be incurred by any person committing a felony although the wrongful act done be different from that which he intended and when performing an act, which would be an offense against persons or property, were it not for the inherent impossibility of its accomplishment or on account of the employment of inadequate or ineffectual means. a. Criminal Offense b. Administrative Violation c. Criminal Liability d. All of the abode

135. Questioning initiated by law enforcement officers after a person has been taken into custody or otherwise deprived of freedom in a significant way. Requires that the Miranda warning be given. a. Custodial Arrest b. Custodial Interview c. Custodial Interrogation d. All of the above

136. It is an old tactic involving disruption of distribution networks, electronic surveillance, special grand jury presentments, and other controversial methods. a. Coercion b. Threats c. Harassment d. Any of the above 137. An agreement between two or more people to violate the law, in most cases, organized crime members work in concert with each other for the purpose of selling drugs or stolen property, loan sharking, gambling, and other activities related to organized crime. a. Profiteering b. Conspiracy c. Associations d. Delicti
138. It is a form of theft and is defined as the use or threatened use of violence or force to achieve a criminal end. a. Extortion b. Hold-up c. Solicitation d. Bribery

139. A business-profession-party-related crimes of fraud, misappropriation and corruption, committed by a persons in business, professional or political setting for purely personal gain and to the detriment of the business, professional group, or political organization for which the perpetrators are working. a. Index Crimes b. Occupational Crimes c. Business Crimes d. Professional Crimes

140. A condition characterized by a history of repetitive spousal abuse and learned helplessness or the subjective inability to leave an abusive situation a. Battered Woman/Child Syndrome b. Maltreatment c. Grave Coercion d. Serious Physical Injuries

THANK YOU VERY

MUCH!!!

1. B 2.D 3.C 4.B 5.D 6.D 7.A 8.B 9.B 10.C 11.D 12.E 13.B 14.C 15.A 16.C 17.B 18.A 19.C 20.B 21.C 22.B 23.A 24.B 25.C 26.A 27.B 28.C 29.C 30.B

31.B 32.A 33.B 34.B 35.A 36.A 37.C 38.D 39.C 40.A 41.B 42.C 43.D 44.A 45.E 46.A 47.B 48.A 49.D 50.C 51.C 52.D 53.A 54.B 55.B 56.A 57.A 58.C 59.C 60. B

KEY ANSWERS 61.A 62.A 63.C 64.D 65.B 66.B 67.C 68.D 69.B 70.B 71.A 72.D 73.B 74.C 75.A 76.B 77.C 78.D 79.D 80.A 81.B 82.B 83.D 84.D 85.C 86.A 87.A 88.C 89.B 90.D

91.D 92.B 93.B 94.A 95.C 96.B 97.A 98.B 99.B 100.B 101.D 102.A 103.C 104.C 105.D 106.A 107.A 108.D 109.C 110.C 111.D 112.A 113.C 114.C 115.B 116.B 117.A 118.A 119.B 120.A

121.D 122.D 123.C 124.C 125.B 126.D 127.A 128.C 129.D 130.B 131.A 132.B 133.B 134.C 135.C 136.C 137.B 138.A 139.B 140.A

THANK YOU VERY

MUCH!!!

You might also like