ASIS ASIS-PCI Practice Test - Questions Answers, Page 13
List of questions
Related questions
Physical evidence is often referred to as:
demonstrative evidence
substantive evidence
indirect evidence.
tangible evidence
A deceptive person is more likely to:
qualify answers or use religion or oaths lo support statements
make general, sweeping denials
offer unqualified, spontaneous answers
respond to questions in a rational manner and clear tone of voice
A significant difference between interviews and Interrogations is that:
an Interview Involves a controlled environment, while an Interrogation involves a variable environment
an interview is accusatory, while an interrogation is nonaccusatory.
guilt is unknown during an interview, while guilt is indicated during an interrogation
an interview involves absolute privacy, while an interrogation involves privacy/semiprivacy.
For internal investigations, most credible information on losses, sexual harassment, and other problems are obtained through:
undercover investigations
covert cameras
employee tips.
pre-hire screening
A key difference between an Interview and an interrogation is the
meeting location
number of Investigators involved
person being interviewed
meeting length
Subsequent reports that are added to an initial investigative report are called:
progress reports
special reports
addendum reports.
interm reports
A Professional Certified Investigator (PCI) is investigating a theft and identifies the location and equipment used to hide the missing parts The PCI Is alone, takes pictures of the equipment, and returns to the office. What is the best procedure for the PCI to follow?
Catalogue the evidence
Include the pictures in the report
Bring the subject of the investigation
Exclude evidence from personal device
formation considered to be indirect is:
first-hand
nor actionable.
never admissible
hearsay
The preferred point of view for writing an undercover narrative report is the:
third person
first person.
second person
either first or second person
What is the purpose of link analysis?
Trace malicious software to its creator in criminal exploits
Identify interconnections between people, places, and activities
Track illegal money from Inception of criminal activity until it is laundered
Examine suspects in an investigation to determine who committed the illegal act
Question