ASIS ASIS-PCI Practice Test - Questions Answers, Page 3

List of questions
Question 21

By definition, the crime of 'conspiracy' requires
one or more persons profiting from an illegal act.
an agreement by two or more persons to commit an illegal act.
two or more persons committing a federal illegal act
premeditation on by one or more persons to commit an Illegal act.
Question 22

What are the most common tour sources of Information an investigator uses?
Victims, witnesses, informants, and confidential informants
Victims, bystanders, suspects, and snitches
Victims, witnesses, informants, and bystanders
Neighbors, relatives, witnesses, and bystanders
Question 23

The operational level of investigative management includes overseeing
investigative techniques, allocation of resources, and evidence management
case load case assessment, and evidence management
evidence management, case management protocols, and financial resources
reporting formats. Investigative techniques, and evidence management.
Question 24

One of the best positions for the undercover operative in a business is in which department?
Accounting
Transportation
Mail room
Administration
Question 25

An anonymous employee contacts the ethics hotline and reports that a co-worker is selling drugs in the office. An investigation is initiated to determine if the allegations are true. What type of investigation is best suited to obtain the necessary facts?
Constructive investigation
Undercover investigation
Personnel background investigation
Reconstructive investigation
Question 26

Another term for an interrogation is:
cognitive interview
confrontational interview.
behavioral analysis interview
general Interview.
Question 27

If an investigator has a conflict of interest, should:
request a formal mediation process to provide the details of the conflict
avoid allowing the conflict to interfere with the investigation
disclose the conflict lo the client or the employer
ignore the conflict and move forward with the investigation
Question 28

Which of the following is recommended for the security professional when testifying?
Question 29

Which of the following is considered to be incorrect procedure when seizing a computer to obtain evidence?
Question 30

Which of the following is NOT a consideration when using drones as a tool for surveillance in investigations?
Question