ASIS ASIS-PCI Practice Test - Questions Answers, Page 3
Related questions
By definition, the crime of 'conspiracy' requires
one or more persons profiting from an illegal act.
an agreement by two or more persons to commit an illegal act.
two or more persons committing a federal illegal act
premeditation on by one or more persons to commit an Illegal act.
What are the most common tour sources of Information an investigator uses?
Victims, witnesses, informants, and confidential informants
Victims, bystanders, suspects, and snitches
Victims, witnesses, informants, and bystanders
Neighbors, relatives, witnesses, and bystanders
The operational level of investigative management includes overseeing
investigative techniques, allocation of resources, and evidence management
case load case assessment, and evidence management
evidence management, case management protocols, and financial resources
reporting formats. Investigative techniques, and evidence management.
One of the best positions for the undercover operative in a business is in which department?
Accounting
Transportation
Mail room
Administration
An anonymous employee contacts the ethics hotline and reports that a co-worker is selling drugs in the office. An investigation is initiated to determine if the allegations are true. What type of investigation is best suited to obtain the necessary facts?
Constructive investigation
Undercover investigation
Personnel background investigation
Reconstructive investigation
Another term for an interrogation is:
cognitive interview
confrontational interview.
behavioral analysis interview
general Interview.
If an investigator has a conflict of interest, should:
request a formal mediation process to provide the details of the conflict
avoid allowing the conflict to interfere with the investigation
disclose the conflict lo the client or the employer
ignore the conflict and move forward with the investigation
Which of the following is recommended for the security professional when testifying?
Avoid pretrial contact with physical evidence since it could be considered tampering
Ask to speak to the legal counselor if the security professional does not know the answer.
Answer only the question that is asked
Only answer questions asked in advance
Which of the following is considered to be incorrect procedure when seizing a computer to obtain evidence?
Examining hard drive
Using software 10 back up the computer files
Turning the computer on
Isolating power or phone lines
Which of the following is NOT a consideration when using drones as a tool for surveillance in investigations?
Proper maintenance and repair
Technical specification and user manual
Legal consideration and requirement for the use
Comprehensive training and opportunity practice
Question