Black Friday Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

PCI Professional Certified Investigator (ASIS-PCI) Questions and Answers

Questions 4

Which type of security refers to the totality of all security and planning measures employed to ensure a successful outcome for a particular operation or activity, as well as the safety of the investigators involved?

Options:

A.

Operational

B.

Physical

C.

Global

D.

Personal

Buy Now
Questions 5

'The fraudulent appropriation of property by a person to whom it has been entrusted, or into whose hands it has lawfully comesis the definition of;

Options:

A.

embezzlement

B.

maiteasance

C.

larceny.

D.

misappropriation

Buy Now
Questions 6

A floating-point questioning strategy:

Options:

A.

takes cues from a second interviewer

B.

determines The truthfulness of each response as questions are asked

C.

continuously re-evaluates a hypotheses as information is obtained

D.

uses continuous monologue with little time for interviewee to respond

Buy Now
Questions 7

To ensure delegated tasks are accomplished as scheduled. It Is important to maintain a/an:

Options:

A.

investigative calendar

B.

suspense log

C.

record of involvement

D.

project verification log

Buy Now
Questions 8

Explanations of why people steal have historically referred to the Theft Triangle, which consists of:

Options:

A.

readily available items, the desire for emotional needs, and opportunity

B.

a desire,the need for self-esteem, and minimal punishment if detected

C.

a want, a low probability of detection, and a criminal inclination

D.

a need or want, rationalization, and opportunity.

Buy Now
Questions 9

John has accepted a management role in a new organization and has been requested to conduct aRisk Assessment. As partof that process he willneed to determine what the risks are thatcan affect the organization. This is called Risk Identification and will Identify?

Options:

A.

The acceptance or mitigation of the risk

B.

The source and potential impact of the risk.

C.

The likelihood and consequence of the risk.

D.

The investigative process used to address the risk

Buy Now
Questions 10

Oven surveillance is a technique best used to:

Options:

A.

deter criminal activity.

B.

conceal the location of a camera

C.

reduce necessary resources

D.

reduce the chance of being detected

Buy Now
Questions 11

What term is given to testimonial evidence presented in court?

Options:

A.

Parole

B.

Hearsay

C.

Fact witness

D.

Opinion witness

Buy Now
Questions 12

A standard element of preparing an investigative report is to

Options:

A.

evaluate and edit

B.

be dear and verbose.

C.

organize facts and opinions

D.

distribute for feedback

Buy Now
Questions 13

An undercover operative should "quality" each subject targeted to buy Illegal drugs to:

Options:

A.

determine how many employees are drug dealers

B.

overcome the risk of detection-

C.

determine when me dealer has possession of drugs

D.

overcome allegations of entrapment

Buy Now
Questions 14

A "suspense log" should be Kepi as a list of:

Options:

A.

set or subject names

B.

evidence obtained

C.

due dates for reports, status checks, and investigative leads

D.

possible scenarios

Buy Now
Questions 15

An electronic access control record reveals that at the time or a computer theft, an employee was m the vicinity. The record would be considered

Options:

A.

entirely non- incriminating

B.

direct evidence

C.

circumstantial evidence.

D.

prima facie evidence

Buy Now
Questions 16

Undercover investigations should only be chosen as a preventive measure when no other alternatives are available and when

Options:

A.

the situation being investigated involves a specific department

B.

resources are limited

C.

union activity is suspected

D.

the company can reasonably expect a significant return on their Investment

Buy Now
Questions 17

Confirming legal problems, potential conflicts of Interest, and undisclosed affiliations or identities are all aspects of which type of investigation?

Options:

A.

Fraud

B.

Industrial espionage

C.

Due diligence

D.

Embezzlement

Buy Now
Questions 18

The primary purpose of a background investigation Is to:

Options:

A.

compile evidence that may be cause for termination at a later date

B.

prevent losses and mitigate damage

C.

differentiate between suspects and non-suspects

D.

risk suspects to other suspects

Buy Now
Questions 19

Another term for an interrogation is:

Options:

A.

cognitive interview

B.

confrontational interview.

C.

behavioral analysis interview

D.

general Interview.

Buy Now
Questions 20

Which of the following can be used to mark property that has been stolen and later recovered so its rightful owner can be identified?

Options:

A.

Cyanoacrylate fuming compound

B.

Exploding dye pack

C.

Magnetic print powder

D.

Invisible evidence marker

Buy Now
Questions 21

One way to control the dissemination of case information is to:

Options:

A.

maintain a sequential file log

B.

maintain an attached cover sheet with the sensitivity level identified

C.

post completed reports only on company computers

D.

conduct a reporting analysis for distribution to the investigative team.

Buy Now
Questions 22

Allowing an accounts payable clerk access to the vendor master file so the clerk can add or delete names is a violation of which of the following fraud prevention practices?

Options:

A.

Offline entry controls and limits

B.

Separation of duties

C.

Signature authorities

D.

Rotation of duties

Buy Now
Questions 23

The preferred point of view for writing an undercover narrative report is the:

Options:

A.

third person

B.

first person.

C.

second person

D.

either first or second person

Buy Now
Questions 24

Misappropriation of trust funds or money held in any fiduciary capacity is referred to as:

Options:

A.

concealment

B.

defalcation.

C.

conversion

D.

switching

Buy Now
Questions 25

An undercover investigation has yielded enough information to allow the operative to be removed. What is the correct procedure m removing the operative?

Options:

A.

The operative should be removed with a plausible explanation, preferably when named as an offender

B.

The operative should be removed prior to any Interviews taking place with suspected offenders

C.

The operative should never remain in place even If their cover story has not been compromised.

D.

The operative should be removed as soon as possible

Buy Now
Questions 26

When coven physical surveillance is not possible, the investigator should

Options:

A.

attempt technical surveillance

B.

close the case file and report to the client/employer.

C.

switch to interviewing all subjects as soon as possible

D.

conduct physical surveillance, ignoring risk of disclosing the investigation

Buy Now
Questions 27

By definition, the crime of "conspiracy" requires

Options:

A.

one or more persons profiting from an illegal act.

B.

an agreement by two or more persons to commit an illegal act.

C.

two or more persons committing a federal illegal act

D.

premeditation on by one or more persons to commit an Illegal act.

Buy Now
Questions 28

A method to evaluate the levels of accuracy, timeliness, and completeness of the recordings of business transactions is:

Options:

A.

financial auditing

B.

fiscal compliance

C.

business accounting

D.

financial management

Buy Now
Questions 29

Mobile vehicle surveillance is generally the most:

Options:

A.

effectiveand practical form of surveillance

B.

difficult and vulnerable to discovery-

C.

expensive form of moving surveillance

D.

common form of surveillance in large urban settings

Buy Now
Questions 30

"Skimming" is best described as:

Options:

A.

taking cash after it has been counted and bundled by replacing bills of large denominations with bills of lower denominations.

B.

Keeping or intercepting some of the proceeds of cash sales before any record is made of their receipt.

C.

undercharging or failing to charge an accomplice who is posing as a customer

D.

overcharging customers at the cash register and keeping the extra money.

Buy Now
Questions 31

The mostsignificant potential problem inan undercover investigation is the possibility that:

Options:

A.

no criminal charges will result

B.

there will be no financial recovery.

C.

the criminal activity will continue after the Investigation is completed

D.

the investigation will be exposed or compromised

Buy Now
Questions 32

Which of the following is among the most Important and overlooked members of an undercover team?

Options:

A.

Lawyer

B.

Corporate security

C.

Human resource manager

D.

Client representative

Buy Now
Questions 33

Evidence thattends to prove a point of an issue is best defined as:

Options:

A.

indirect

B.

material

C.

competent

D.

circumstantial

Buy Now
Questions 34

Which of the following is NOT a consideration when using drones as a tool for surveillance in investigations?

Options:

A.

Proper maintenance and repair

B.

Technical specification and user manual

C.

Legal consideration and requirement for the use

D.

Comprehensive training and opportunity practice

Buy Now
Questions 35

An anonymous employee contacts the ethics hotline and reports that a co-worker is selling drugs in the office. An investigation is initiated to determine if the allegations are true. What type of investigation is best suitedto obtain the necessary facts?

Options:

A.

Constructive investigation

B.

Undercover investigation

C.

Personnel background investigation

D.

Reconstructive investigation

Buy Now
Questions 36

What is the purpose of link analysis?

Options:

A.

Trace malicious software to its creator in criminal exploits

B.

Identify interconnections between people, places, and activities

C.

Track illegal money from Inception of criminal activity until it is laundered

D.

Examine suspects in an investigation to determine who committed the illegal act

Buy Now
Questions 37

The four principle characteristics of internal theft scams are

Options:

A.

diversion, conversion, disguise, and divergence.

B.

diversion, disguise, divergence, and dilution

C.

diversion,conversion, disguise, and convolution

D.

diversion, conversion, illicit deceit, and defalcation

Buy Now
Questions 38

All of the following ate mandatory requirements of a competent forensic computer examination EXCEPT:

Options:

A.

fining Windows to view graphic files and lo examine files

B.

using forensically sterile examination media.

C.

maintaining the Integrity of the original media

D.

marking, controlling, and transmitting printouts, copies of data, and exhibits

Buy Now
Questions 39

Primary reasons to protect investigative information include the potential for all of the following EXCEPT:

Options:

A.

damage to the careers of witnesses

B.

significant civil liability.

C.

damage to important relationships with other agencies or companies

D.

damage to the reputation of previously convicted individuals

Buy Now
Questions 40

Anything thateffectively negates or reduces the ability of an adversary to exploit information or vulnerabilities is called:

Options:

A.

exposure

B.

risk avoidance

C.

a protection method

D.

a countermeasure

Buy Now
Questions 41

During the interview process,hidden persuaders may be used to establish:

Options:

A.

a judgmental attitude toward interviewees

B.

a positive attitude and rapport with interviewees

C.

the harassment and coercion of interviewees.

D.

the interviewer’s true agenda

Buy Now
Questions 42

Once selected and sworn in. the jury is questioned by the attorneys and/or the judge about background and possible bias. This process is known as:

Options:

A.

voir dire

B.

habeas corpus

C.

corpus delicti

D.

prima facie

Buy Now
Exam Code: PCI
Exam Name: Professional Certified Investigator (ASIS-PCI)
Last Update: Nov 24, 2024
Questions: 141
PCI pdf

PCI PDF

$25.5  $84.99
PCI Engine

PCI Testing Engine

$30  $99.99
PCI PDF + Engine

PCI PDF + Testing Engine

$40.5  $134.99