ASIS ASIS-PCI Practice Test - Questions Answers, Page 3
List of questions
Question 21
By definition, the crime of 'conspiracy' requires
one or more persons profiting from an illegal act.
an agreement by two or more persons to commit an illegal act.
two or more persons committing a federal illegal act
premeditation on by one or more persons to commit an Illegal act.
Question 22
What are the most common tour sources of Information an investigator uses?
Victims, witnesses, informants, and confidential informants
Victims, bystanders, suspects, and snitches
Victims, witnesses, informants, and bystanders
Neighbors, relatives, witnesses, and bystanders
Question 23
The operational level of investigative management includes overseeing
investigative techniques, allocation of resources, and evidence management
case load case assessment, and evidence management
evidence management, case management protocols, and financial resources
reporting formats. Investigative techniques, and evidence management.
Question 24
One of the best positions for the undercover operative in a business is in which department?
Accounting
Transportation
Mail room
Administration
Question 25
An anonymous employee contacts the ethics hotline and reports that a co-worker is selling drugs in the office. An investigation is initiated to determine if the allegations are true. What type of investigation is best suited to obtain the necessary facts?
Constructive investigation
Undercover investigation
Personnel background investigation
Reconstructive investigation
Question 26
Another term for an interrogation is:
cognitive interview
confrontational interview.
behavioral analysis interview
general Interview.
Question 27
If an investigator has a conflict of interest, should:
request a formal mediation process to provide the details of the conflict
avoid allowing the conflict to interfere with the investigation
disclose the conflict lo the client or the employer
ignore the conflict and move forward with the investigation
Question 28
Which of the following is recommended for the security professional when testifying?
Question 29
Which of the following is considered to be incorrect procedure when seizing a computer to obtain evidence?
Question 30
Which of the following is NOT a consideration when using drones as a tool for surveillance in investigations?
Question