Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

ASIS PCI Professional Certified Investigator (ASIS-PCI) Exam Practice Test

Page: 1 / 14
Total 141 questions

Professional Certified Investigator (ASIS-PCI) Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$43.75  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$38.5  $109.99
Question 1

A special report documents:

Options:

A.

the overall investigation and its primary conclusion

B.

the need for an investigation and the costs associated with it

C.

elements of the crimes committed and the theories involved

D.

an action other than normal in the course of the investigation

Question 2

In a legal sense, preemployment investigations provide organizations mitigation from negligent hiring and:

Options:

A.

discrimination

B.

Fair Cretin Reporting Act violations.

C.

National Labor Relations Actviolations

D.

wrongful termination.

Question 3

An investigator isasked to conduct surveillance ofa local unions organizing activities. The investigator should advise the prospective client that

Options:

A.

a union representative must be notified 48 hours prior to the start of the surveillance

B.

the law requires a minimum of two undercover investigators

C.

the law prohibits surveillance of union organizing activities

D.

surveillance is legal if held in a public place

Question 4

Basic rules surrounding evidence collection are to:

Options:

A.

get all evidence thatcan have any bearing on the case, mark It. properly wrap, package, and preserve from contamination: establish a chain of custody and show continuity between the discovery of the evidence and its subsequent presentation

B.

video record all evidence, collect the minimal amount of evidence necessary to support the facts and circumstances, mark the evidence, secure the evidence until presentation to a court of law

C.

collect any evidence relevant to the case, secure the evidence unless otherwise requested by management, establish a chain of custody, mark all evidence with "the mark" of the primary investigator

D.

secure the scene of the offense, mark all evidence, establish chain of custody, set all evidence aside in one central location for later Identification.

Question 5

Which of the following relates to the influence of an investigator's behavior on an interviewee's behavior?

Options:

A.

Adelphi technique

B.

Systems approach

C.

Stockholm syndrome

D.

Pygmalion effect

Question 6

An undercover operative should "quality" each subject targeted to buy Illegal drugs to:

Options:

A.

determine how many employees are drug dealers

B.

overcome the risk of detection-

C.

determine when me dealer has possession of drugs

D.

overcome allegations of entrapment

Question 7

Pocketing small amounts from incoming payments and then applying subsequent remittances on other items to cover the missing cash is an example of:

Options:

A.

replacement.

B.

fraud.

C.

kiting.

D.

lapping

Question 8

Subsequent reports that are added to an initial investigative report are called:

Options:

A.

progress reports

B.

special reports

C.

addendum reports.

D.

interm reports

Question 9

When an investigator is attempting to match a photocopy with the machine that was used to make it. they should:

Options:

A.

secure all obtained exemplars in a plastic envelope.

B.

obtain at least ten exemplars with a document on the glass plate, with the cover up

C.

obtain at least ten exemplars with no document on the glass plate, with the cover down

D.

have a qualified technician remove the machine hard drive for examination

Question 10

"Skimming" is best described as:

Options:

A.

taking cash after it has been counted and bundled by replacing bills of large denominations with bills of lower denominations.

B.

Keeping or intercepting some of the proceeds of cash sales before any record is made of their receipt.

C.

undercharging or failing to charge an accomplice who is posing as a customer

D.

overcharging customers at the cash register and keeping the extra money.

Question 11

With regard to evidence searches, which statement is FALSE?

Options:

A.

search must be timely.

B.

Physical evidence cannot be overdocumented.

C.

A search may be either a cautious search or a vigorous search

D.

The best search options are the quickest and the simplest.

Question 12

Which of the following is the term for receiving the money or property of another and fraudulently withholding or applying it for one's own use?

Options:

A.

Concealment

B.

Misrepresentation

C.

Conversion

D.

Representation

Question 13

To ensure delegated tasks are accomplished as scheduled. It Is important to maintain a/an:

Options:

A.

investigative calendar

B.

suspense log

C.

record of involvement

D.

project verification log

Question 14

The primary benefit of maintaining eye contact between the interviewer and the interviewee during an interview is that it:

Options:

A.

promotes rapport

B.

establishes the dominance of the Interviewer.

C.

intimidates the interviewee

D.

reveals when the interviewee is being deceptive

Question 15

Which step of the intelligence collection cycle includes activities such as determining how the intelligence can be best used?

Options:

A.

Evaluation

B.

Requirements

C.

Dissemination

D.

Integration & Analysis

Question 16

Which type of security refers to the totality of all security and planning measures employed to ensure a successful outcome for a particular operation or activity, as well as the safety of the investigators involved?

Options:

A.

Operational

B.

Physical

C.

Global

D.

Personal

Question 17

One way to control the dissemination of case information is to:

Options:

A.

maintain a sequential file log

B.

maintain an attached cover sheet with the sensitivity level identified

C.

post completed reports only on company computers

D.

conduct a reporting analysis for distribution to the investigative team.

Question 18

Another term for an interrogation is:

Options:

A.

cognitive interview

B.

confrontational interview.

C.

behavioral analysis interview

D.

general Interview.

Question 19

One quality requited of an investigative finding is that the finding:

Options:

A.

does not require corroboration

B.

is based on a series of assumptions

C.

should be traceable to information garnered

D.

does not need to meet the burden of proof.

Question 20

Misappropriation of trust funds or money held in any fiduciary capacity is referred to as:

Options:

A.

concealment

B.

defalcation.

C.

conversion

D.

switching

Question 21

A key difference between an Interview and an interrogation is the

Options:

A.

meeting location

B.

number of Investigators involved

C.

person being interviewed

D.

meeting length

Question 22

When an interviewee makes a statement such as "Let's suppose I'm guilty," the interviewer should:

Options:

A.

document an admission of guilt

B.

respond calmly.

C.

recognize this as a diversion technique by the Interviewee

D.

apply pressure to obtain a written statement.

Question 23

The preferred point of view for writing an undercover narrative report is the:

Options:

A.

third person

B.

first person.

C.

second person

D.

either first or second person

Question 24

The mostsignificant potential problem inan undercover investigation is the possibility that:

Options:

A.

no criminal charges will result

B.

there will be no financial recovery.

C.

the criminal activity will continue after the Investigation is completed

D.

the investigation will be exposed or compromised

Question 25

When hiring an undercover operative, an effective hiring technique is a:

Options:

A.

double-blind hire

B.

secret hire.

C.

profile hire

D.

controlled hire.

Question 26

Which of the following is considered a significant potential side effect when conducting an internal misconduct investigation?

Options:

A.

Ethical considerations

B.

investigator conflict of interest

C.

Criminal workforce productivity

D.

Criminal prosecution

Question 27

A Professional Certified Investigator (PCI) is investigating a theft and identifies the location and equipment used to hide the missing parts The PCI Is alone, takes pictures of the equipment, and returns to the office.What is the best procedure for the PCI to follow?

Options:

A.

Catalogue the evidence

B.

Include the pictures in the report

C.

Bring the subject of the investigation

D.

Exclude evidence from personal device

Question 28

Tool marks are categorized as which Type of physical evidence?

Options:

A.

Tracing

B.

impression

C.

Associative

D.

Identifying

Question 29

Which of the following points does NOT support budget Justification for an investigative unit?

Options:

A.

Accurate and detailed tracking of Investigative cost

B.

Effective implementation of cost management measures

C.

Demonstration of restitution and recovery benefits

D.

Aligning investigative objectives to business strategic objectives

Question 30

What significant issue transcends strategic, operational, and case levels of Investigative management?

Options:

A.

Experience

B.

Ethics

C.

judgment

D.

Thoroughness

Question 31

When testifying in court. Investigators are NOT subject to:

Options:

A.

berating

B.

juror scrutiny.

C.

intense questioning

D.

second-guessing by attorneys or other officials

Question 32

Primary reasons to protect investigative information include the potential for all of the following EXCEPT:

Options:

A.

damage to the careers of witnesses

B.

significant civil liability.

C.

damage to important relationships with other agencies or companies

D.

damage to the reputation of previously convicted individuals

Question 33

The -functional chatter" of an investigative unit is Issued by the;

Options:

A.

Chiefexecutive officer.

B.

director of security.

C.

chiefoperations officer

D.

director of legal affairs

Question 34

Mobile vehicle surveillance is generally the most:

Options:

A.

effectiveand practical form of surveillance

B.

difficult and vulnerable to discovery-

C.

expensive form of moving surveillance

D.

common form of surveillance in large urban settings

Question 35

Which of the following is recommended for the security professional when testifying?

Options:

A.

Avoid pretrial contact with physical evidence since it could be considered tampering

B.

Ask to speak to the legal counselor if the security professional does not know the answer.

C.

Answer only the question that is asked

D.

Only answer questions asked in advance

Question 36

in the FBI's Computer Analysis Response Team programs, the two-pronged approach to forensic examinations consists of investigations and

Options:

A.

education

B.

training

C.

legal support

D.

laboratory support

Question 37

Which of the following is the firstthing an investigator should do when attempting to gather information from the victim of a crime that just occurred?

Options:

A.

Attempt tocalm the victim

B.

Obtain contact information from the victim.

C.

Ask for a written statement.

D.

Ask the victim lo recall everything that happened

Question 38

The primary goal of a compliance investigation Is to

Options:

A.

Main sufficient evidence to prosecute white-collar criminals within the corporation

B.

provide the corporation with audit findings

C.

provide guidance to the corporation regarding possible violations of regulatory requirements

D.

provide government agencies with the corporation's compliance audit findings

Question 39

The primary purpose of a background investigation Is to:

Options:

A.

compile evidence that may be cause for termination at a later date

B.

prevent losses and mitigate damage

C.

differentiate between suspects and non-suspects

D.

risk suspects to other suspects

Question 40

Which of the fallowing is an exception to the hearsay rule?

Options:

A.

When the person making the statement about what another person said made statements against self-interest

B.

When the other person's statement was overheard by two or more reputable witnesses

C.

When the other person's statement was later put into writing by whoever overheard it

D.

When the other person is unavailable for the proceeding

Question 41

Which of the following is considered to be incorrect procedure when seizing a computer to obtain evidence?

Options:

A.

Examining hard drive

B.

Using software 10 back up the computer files

C.

Turning the computer on

D.

Isolating power or phone lines

Question 42

Which statement is correct regarding the distribution and protection of investigative reports?

Options:

A.

Repents delivered by the Investigator to the company's attorney of record for retention will likely be protected from subpoena

B.

Reports cannot be protected item disclosure during the Judicial process using the attorney-client privilege

C.

The qualified privilege accorded an investigative report can be lost It it was not disseminated widely to all stakeholders

D.

The distribution of investigative reports should only come through the client since delegating it to the investigator or the client's attomey can result in the loss Of the attorney-Client privilege

Page: 1 / 14
Total 141 questions