New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium ASIS PCI Dumps Questions Answers

Page: 1 / 11
Total 141 questions

Professional Certified Investigator (ASIS-PCI) Questions and Answers

Question 1

What is the purpose of link analysis?

Options:

A.

Trace malicious software to its creator in criminal exploits

B.

Identify interconnections between people, places, and activities

C.

Track illegal money from Inception of criminal activity until it is laundered

D.

Examine suspects in an investigation to determine who committed the illegal act

Buy Now
Question 2

The "policy statement" of an investigative unit is a document that:

Options:

A.

outlines procedures for initialing and conducting investigations

B.

expresses the purpose for the creation of the unit

C.

establishes the rules governing prosecution

D.

create the strategy by which cases are conduced

Question 3

Anything thateffectively negates or reduces the ability of an adversary to exploit information or vulnerabilities is called:

Options:

A.

exposure

B.

risk avoidance

C.

a protection method

D.

a countermeasure

Question 4

Confirming legal problems, potential conflicts of Interest, and undisclosed affiliations or identities are all aspects of which type of investigation?

Options:

A.

Fraud

B.

Industrial espionage

C.

Due diligence

D.

Embezzlement

Question 5

A "suspense log" should be Kepi as a list of:

Options:

A.

set or subject names

B.

evidence obtained

C.

due dates for reports, status checks, and investigative leads

D.

possible scenarios

Question 6

Evidence thattends to prove a point of an issue is best defined as:

Options:

A.

indirect

B.

material

C.

competent

D.

circumstantial

Question 7

Which step of the intelligence collection cycle includes activities such as determining how the intelligence can be best used?

Options:

A.

Evaluation

B.

Requirements

C.

Dissemination

D.

Integration & Analysis

Question 8

Once selected and sworn in. the jury is questioned by the attorneys and/or the judge about background and possible bias. This process is known as:

Options:

A.

voir dire

B.

habeas corpus

C.

corpus delicti

D.

prima facie

Question 9

An electronic access control record reveals that at the time or a computer theft, an employee was m the vicinity. The record would be considered

Options:

A.

entirely non- incriminating

B.

direct evidence

C.

circumstantial evidence.

D.

prima facie evidence

Question 10

One quality requited of an investigative finding is that the finding:

Options:

A.

does not require corroboration

B.

is based on a series of assumptions

C.

should be traceable to information garnered

D.

does not need to meet the burden of proof.

Question 11

Under negligent hiring provisions, an employer can be held liable if the act committed by the employee is

Options:

A.

foreseeable

B.

preventable

C.

purposeful

D.

careless

Question 12

During preparation tor courtroom testimony, the investigator should:

Options:

A.

practice providing as much information as possible

B.

display emotions for emphasis

C.

tell the attorney if there is a weak point in the case

D.

provide opinions to support the facts

Question 13

A retired police officer with experience as an investigator applies for a position as an investigator. During the interview, the applicant makes an inappropriate joke regarding race. With regard to the interviewer's decision of whether to hire the applicant, the joke should.

Options:

A.

not be taken into consideration, because the applicant's experience is more important than personal beliefs

B.

not be taken into consideration, because such jokes are generally not an indication of a person's beliefs

C.

be taken into consideration, because investigators must be able to operate in a multicultural environment

D.

be taken into consideration, because it is inappropriate to make jokes at an interview.

Question 14

An undercover operative should "quality" each subject targeted to buy Illegal drugs to:

Options:

A.

determine how many employees are drug dealers

B.

overcome the risk of detection-

C.

determine when me dealer has possession of drugs

D.

overcome allegations of entrapment

Question 15

The brief statement that introduces the reader to the overall investigation and its primary conclusion is called the:

Options:

A.

abstract

B.

outline

C.

statement of facts

D.

synopsis

Question 16

Which of the following communication skills do inexperienced investigators most often neglect touse when interviewing suspects?

Options:

A.

Listening

B.

Comprehension

C.

Intuition

D.

Evaluation

Question 17

The use of the Plan Do Chock Act Model (PDCA) enables organizations to:

Options:

A.

improve and enhance investigation framework.

B.

understand how to conduct thorough Investigation s.

C.

define roles and responsibilities of investigation unit

D.

create repeatable and scalable framework for investigations.

Question 18

Which of the following can be used to mark property that has been stolen and later recovered so its rightful owner can be identified?

Options:

A.

Cyanoacrylate fuming compound

B.

Exploding dye pack

C.

Magnetic print powder

D.

Invisible evidence marker

Question 19

Explanations of why people steal have historically referred to the Theft Triangle, which consists of:

Options:

A.

readily available items, the desire for emotional needs, and opportunity

B.

a desire,the need for self-esteem, and minimal punishment if detected

C.

a want, a low probability of detection, and a criminal inclination

D.

a need or want, rationalization, and opportunity.

Question 20

An investigator isasked to conduct surveillance ofa local unions organizing activities. The investigator should advise the prospective client that

Options:

A.

a union representative must be notified 48 hours prior to the start of the surveillance

B.

the law requires a minimum of two undercover investigators

C.

the law prohibits surveillance of union organizing activities

D.

surveillance is legal if held in a public place

Question 21

The primary purpose of creating a crime scene sketch is to:

Options:

A.

assist investigators in documenting the crime scene and cataloging evidence

B.

assist prosecutors, judges, and juries during prosecution

C.

record the exact locations of pieces of evidence and their physical relation to other pieces of evidence and the surroundings.

D.

provide a permanent record of the crime scene in case theoriginal photographic evidence is lost or destroyed

Question 22

Examples of res gestae evidence are statements:

Options:

A.

that ate pan of a series of Informational comments that are creditable when taken as a whole

B.

that are corroborated by other evidence.

C.

to credible thud parties with no direct involvement in the outcome

D.

that are evidence pertaining to someone's state of mind

Question 23

Pocketing small amounts from incoming payments and then applying subsequent remittances on other items to cover the missing cash is an example of:

Options:

A.

replacement.

B.

fraud.

C.

kiting.

D.

lapping

Question 24

formation considered to be indirect is:

Options:

A.

first-hand

B.

nor actionable.

C.

never admissible

D.

hearsay

Question 25

During the interview process,hidden persuaders may be used to establish:

Options:

A.

a judgmental attitude toward interviewees

B.

a positive attitude and rapport with interviewees

C.

the harassment and coercion of interviewees.

D.

the interviewer’s true agenda

Question 26

Which of the following is NOT an essential element ol investigative reports?

Options:

A.

Summary

B.

Preface

C.

Narrative

D.

Conclusion

Question 27

A subsidiary fact from which theexistence of the ultimate fact in determining whether guilt or innocence may be inferred is whichof the following kinds of evidence?

Options:

A.

Circumstantial

B.

Real

C.

Testimonial

D.

Admissible

Question 28

Which of the following is considered to be incorrect procedure when seizing a computer to obtain evidence?

Options:

A.

Examining hard drive

B.

Using software 10 back up the computer files

C.

Turning the computer on

D.

Isolating power or phone lines

Question 29

What are the most common tour sources of Information an investigator uses?

Options:

A.

Victims, witnesses, informants, and confidential informants

B.

Victims, bystanders, suspects, and snitches

C.

Victims, witnesses, informants, and bystanders

D.

Neighbors, relatives, witnesses, and bystanders

Question 30

A floating-point questioning strategy:

Options:

A.

takes cues from a second interviewer

B.

determines The truthfulness of each response as questions are asked

C.

continuously re-evaluates a hypotheses as information is obtained

D.

uses continuous monologue with little time for interviewee to respond

Question 31

Barring a published employer policy to the contrary, when lockers are searched in the workplace, employees can expect privacy if the:

Options:

A.

employees supply their own locks

B.

locker door is closed

C.

employer supplies the lock

D.

lockers are open to every employee

Question 32

The most important reason to conduct investigations as soon as an incident is reported or discovered is:

Options:

A.

to reduce the chances of obtaining false alibis

B.

witnesses Tend to be less cooperative if too much time has elapsed

C.

to allow operations to return to normal as soon as possible

D.

the value of physical or electronic evidence diminishes rapidly.

Question 33

Which of the following is the firstthing an investigator should do when attempting to gather information from the victim of a crime that just occurred?

Options:

A.

Attempt tocalm the victim

B.

Obtain contact information from the victim.

C.

Ask for a written statement.

D.

Ask the victim lo recall everything that happened

Question 34

Which of the following is considered a significant potential side effect when conducting an internal misconduct investigation?

Options:

A.

Ethical considerations

B.

investigator conflict of interest

C.

Criminal workforce productivity

D.

Criminal prosecution

Question 35

When coven physical surveillance is not possible, the investigator should

Options:

A.

attempt technical surveillance

B.

close the case file and report to the client/employer.

C.

switch to interviewing all subjects as soon as possible

D.

conduct physical surveillance, ignoring risk of disclosing the investigation

Question 36

if criminal activity occurs within the enterprise, the Interest of the private sector may be best served by:

Options:

A.

relying solely on the public sector enterprise to handle the criminal activity.

B.

accepting restitution or taking administrative or employment action

C.

not exposing criminal activity to the media

D.

always terminating the employee involved in the criminal activity.

Question 37

Which statement is correct regarding the distribution and protection of investigative reports?

Options:

A.

Repents delivered by the Investigator to the company's attorney of record for retention will likely be protected from subpoena

B.

Reports cannot be protected item disclosure during the Judicial process using the attorney-client privilege

C.

The qualified privilege accorded an investigative report can be lost It it was not disseminated widely to all stakeholders

D.

The distribution of investigative reports should only come through the client since delegating it to the investigator or the client's attomey can result in the loss Of the attorney-Client privilege

Question 38

The operational level of investigative management includes overseeing

Options:

A.

investigative techniques, allocation of resources, and evidence management

B.

case load case assessment, and evidence management

C.

evidence management, case management protocols, and financial resources

D.

reporting formats. Investigative techniques, and evidence management.

Question 39

The best method to protect information obtained from a confidential source is to

Options:

A.

share details with senior company managers only.

B.

make no written documentation of sensitive data

C.

develop a mechanism with code names or numbers

D.

protect open information

Question 40

The four principle characteristics of internal theft scams are

Options:

A.

diversion, conversion, disguise, and divergence.

B.

diversion, disguise, divergence, and dilution

C.

diversion,conversion, disguise, and convolution

D.

diversion, conversion, illicit deceit, and defalcation

Question 41

The sealing arrangement and chair spacing of an interview room are dictated by the:

Options:

A.

investigator preference and expected length of the Interview.

B.

interviewee preference and office size.

C.

particular investigation and Interview techniques to be used

D.

time it takes to conduct the interview and layout of the room

Question 42

A key difference between an Interview and an interrogation is the

Options:

A.

meeting location

B.

number of Investigators involved

C.

person being interviewed

D.

meeting length

Page: 1 / 11
Total 141 questions