ExamGecko
Home Home / ASIS / ASIS-PCI

ASIS ASIS-PCI Practice Test - Questions Answers, Page 13

Question list
Search
Search

Physical evidence is often referred to as:

A.

demonstrative evidence

A.

demonstrative evidence

Answers
B.

substantive evidence

B.

substantive evidence

Answers
C.

indirect evidence.

C.

indirect evidence.

Answers
D.

tangible evidence

D.

tangible evidence

Answers
Suggested answer: D

A deceptive person is more likely to:

A.

qualify answers or use religion or oaths lo support statements

A.

qualify answers or use religion or oaths lo support statements

Answers
B.

make general, sweeping denials

B.

make general, sweeping denials

Answers
C.

offer unqualified, spontaneous answers

C.

offer unqualified, spontaneous answers

Answers
D.

respond to questions in a rational manner and clear tone of voice

D.

respond to questions in a rational manner and clear tone of voice

Answers
Suggested answer: B

A significant difference between interviews and Interrogations is that:

A.

an Interview Involves a controlled environment, while an Interrogation involves a variable environment

A.

an Interview Involves a controlled environment, while an Interrogation involves a variable environment

Answers
B.

an interview is accusatory, while an interrogation is nonaccusatory.

B.

an interview is accusatory, while an interrogation is nonaccusatory.

Answers
C.

guilt is unknown during an interview, while guilt is indicated during an interrogation

C.

guilt is unknown during an interview, while guilt is indicated during an interrogation

Answers
D.

an interview involves absolute privacy, while an interrogation involves privacy/semiprivacy.

D.

an interview involves absolute privacy, while an interrogation involves privacy/semiprivacy.

Answers
Suggested answer: C

For internal investigations, most credible information on losses, sexual harassment, and other problems are obtained through:

A.

undercover investigations

A.

undercover investigations

Answers
B.

covert cameras

B.

covert cameras

Answers
C.

employee tips.

C.

employee tips.

Answers
D.

pre-hire screening

D.

pre-hire screening

Answers
Suggested answer: C

A key difference between an Interview and an interrogation is the

A.

meeting location

A.

meeting location

Answers
B.

number of Investigators involved

B.

number of Investigators involved

Answers
C.

person being interviewed

C.

person being interviewed

Answers
D.

meeting length

D.

meeting length

Answers
Suggested answer: C

Subsequent reports that are added to an initial investigative report are called:

A.

progress reports

A.

progress reports

Answers
B.

special reports

B.

special reports

Answers
C.

addendum reports.

C.

addendum reports.

Answers
D.

interm reports

D.

interm reports

Answers
Suggested answer: C

A Professional Certified Investigator (PCI) is investigating a theft and identifies the location and equipment used to hide the missing parts The PCI Is alone, takes pictures of the equipment, and returns to the office. What is the best procedure for the PCI to follow?

A.

Catalogue the evidence

A.

Catalogue the evidence

Answers
B.

Include the pictures in the report

B.

Include the pictures in the report

Answers
C.

Bring the subject of the investigation

C.

Bring the subject of the investigation

Answers
D.

Exclude evidence from personal device

D.

Exclude evidence from personal device

Answers
Suggested answer: A

formation considered to be indirect is:

A.

first-hand

A.

first-hand

Answers
B.

nor actionable.

B.

nor actionable.

Answers
C.

never admissible

C.

never admissible

Answers
D.

hearsay

D.

hearsay

Answers
Suggested answer: D

The preferred point of view for writing an undercover narrative report is the:

A.

third person

A.

third person

Answers
B.

first person.

B.

first person.

Answers
C.

second person

C.

second person

Answers
D.

either first or second person

D.

either first or second person

Answers
Suggested answer: B

What is the purpose of link analysis?

A.

Trace malicious software to its creator in criminal exploits

A.

Trace malicious software to its creator in criminal exploits

Answers
B.

Identify interconnections between people, places, and activities

B.

Identify interconnections between people, places, and activities

Answers
C.

Track illegal money from Inception of criminal activity until it is laundered

C.

Track illegal money from Inception of criminal activity until it is laundered

Answers
D.

Examine suspects in an investigation to determine who committed the illegal act

D.

Examine suspects in an investigation to determine who committed the illegal act

Answers
Suggested answer: B
Total 141 questions
Go to page: of 15