New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

PCI Questions and Answers

Question # 6

Which of the following can be used to mark property that has been stolen and later recovered so its rightful owner can be identified?

A.

Cyanoacrylate fuming compound

B.

Exploding dye pack

C.

Magnetic print powder

D.

Invisible evidence marker

Full Access
Question # 7

Which of the following scenarios, applied to an undercover Investigator, could lead to an allegation of entrapment of an employee?

A.

The employee asks the undercover investigator to help him steal two company computers, and the undercover investigator agrees

B.

The employee suggests the undercover investigator punch the employee's time card at quitting time so the employee may leave 3 hours early.

C.

The undercover investigator invites the employee to help steal two computers out or the warehouse, and the employee agrees as long as the employee gets one.

D.

The undercover investigator informs the employee that the manager has left the safe unlocked, and the employee opens It and removes cash

Full Access
Question # 8

Altering a stock certificate to inaccurately list the owner of the certificate with intent to defraud is best described as

A.

false representation

B.

false entry in corporate records

C.

forgery

D.

identity theft

Full Access
Question # 9

Primary reasons to protect investigative information include the potential for all of the following EXCEPT:

A.

damage to the careers of witnesses

B.

significant civil liability.

C.

damage to important relationships with other agencies or companies

D.

damage to the reputation of previously convicted individuals

Full Access
Question # 10

Misappropriation of trust funds or money held in any fiduciary capacity is referred to as:

A.

concealment

B.

defalcation.

C.

conversion

D.

switching

Full Access
Question # 11

The first priority o! any informant handling is the:

A.

knowledge and expertise of the informant.

B.

motive andreward of the Informant.

C.

reliability and trustworthiness of the informant

D.

security and safety of the informant

Full Access
Question # 12

Which of the following is the term for receiving the money or property of another and fraudulently withholding or applying it for one's own use?

A.

Concealment

B.

Misrepresentation

C.

Conversion

D.

Representation

Full Access
Question # 13

Barring a published employer policy to the contrary, when lockers are searched in the workplace, employees can expect privacy if the:

A.

employees supply their own locks

B.

locker door is closed

C.

employer supplies the lock

D.

lockers are open to every employee

Full Access
Question # 14

Which of the following is NOT characteristic of an interrogation?

A.

Accusatory

B.

Extensive planning

C.

Dialogue

D.

Structure

Full Access
Question # 15

An undercover operative should "quality" each subject targeted to buy Illegal drugs to:

A.

determine how many employees are drug dealers

B.

overcome the risk of detection-

C.

determine when me dealer has possession of drugs

D.

overcome allegations of entrapment

Full Access
Question # 16

The primary goal of a compliance investigation Is to

A.

Main sufficient evidence to prosecute white-collar criminals within the corporation

B.

provide the corporation with audit findings

C.

provide guidance to the corporation regarding possible violations of regulatory requirements

D.

provide government agencies with the corporation's compliance audit findings

Full Access
Question # 17

What is the purpose of link analysis?

A.

Trace malicious software to its creator in criminal exploits

B.

Identify interconnections between people, places, and activities

C.

Track illegal money from Inception of criminal activity until it is laundered

D.

Examine suspects in an investigation to determine who committed the illegal act

Full Access
Question # 18

An electronic access control record reveals that at the time or a computer theft, an employee was m the vicinity. The record would be considered

A.

entirely non- incriminating

B.

direct evidence

C.

circumstantial evidence.

D.

prima facie evidence

Full Access
Question # 19

Examples of res gestae evidence are statements:

A.

that ate pan of a series of Informational comments that are creditable when taken as a whole

B.

that are corroborated by other evidence.

C.

to credible thud parties with no direct involvement in the outcome

D.

that are evidence pertaining to someone's state of mind

Full Access
Question # 20

A significant difference between interviews and Interrogations is that:

A.

an Interview Involves a controlled environment, while an Interrogation involves a variable environment

B.

an interview is accusatory, while an interrogation is nonaccusatory.

C.

guilt is unknown during an interview, while guilt is indicated during an interrogation

D.

an interview involves absolute privacy, while an interrogation involves privacy/semiprivacy.

Full Access
Question # 21

Al MINIMUM which of the following digital devices should an investigation unit have at their disposal?

A.

Radio frequency (RF) blocking bag

B.

Separate digital recorder and camera

C.

Global Positioning System (GPS) trackers

D.

Personal smart phone for recordings and photographs

Full Access
Question # 22

Which of the following is considered to be incorrect procedure when seizing a computer to obtain evidence?

A.

Examining hard drive

B.

Using software 10 back up the computer files

C.

Turning the computer on

D.

Isolating power or phone lines

Full Access
Question # 23

An investigative case Tile should be established:

A.

as required to prosecute

B.

when sufficient evidence has been collected

C.

at the onset of each investigation

D.

at the conclusion of each Investigation

Full Access
Question # 24

Anything thateffectively negates or reduces the ability of an adversary to exploit information or vulnerabilities is called:

A.

exposure

B.

risk avoidance

C.

a protection method

D.

a countermeasure

Full Access
Question # 25

in an undercover investigation, the major reason to Involve legal counsel as part of the management team is to:

A.

assist in working with a prosecutor.

B.

assist in managing personality conflict among the management team.

C.

defend the investigator should the Investigator be sued

D.

protect the investigator's work product from discovery.

Full Access
Question # 26

All of the following ate mandatory requirements of a competent forensic computer examination EXCEPT:

A.

fining Windows to view graphic files and lo examine files

B.

using forensically sterile examination media.

C.

maintaining the Integrity of the original media

D.

marking, controlling, and transmitting printouts, copies of data, and exhibits

Full Access
Question # 27

Which of the following is among the most Important and overlooked members of an undercover team?

A.

Lawyer

B.

Corporate security

C.

Human resource manager

D.

Client representative

Full Access
Question # 28

The preferred point of view for writing an undercover narrative report is the:

A.

third person

B.

first person.

C.

second person

D.

either first or second person

Full Access
Question # 29

Surveillance methods fall into which three broad categories?

A.

Physical, psychological, and data

B.

Vehicle, foot, and air

C.

Physical, information, and financial

D.

Loose, dose, and mobile

Full Access
Question # 30

Which of the following is a quality found in a positive interview attitude?

A.

Congruence

B.

Caution

C.

Conformance

D.

Conjuncture

Full Access
Question # 31

A special report documents:

A.

the overall investigation and its primary conclusion

B.

the need for an investigation and the costs associated with it

C.

elements of the crimes committed and the theories involved

D.

an action other than normal in the course of the investigation

Full Access
Question # 32

What significant issue transcends strategic, operational, and case levels of Investigative management?

A.

Experience

B.

Ethics

C.

judgment

D.

Thoroughness

Full Access
Question # 33

Which of the fallowing is an exception to the hearsay rule?

A.

When the person making the statement about what another person said made statements against self-interest

B.

When the other person's statement was overheard by two or more reputable witnesses

C.

When the other person's statement was later put into writing by whoever overheard it

D.

When the other person is unavailable for the proceeding

Full Access
Question # 34

A deceptive person is more likely to:

A.

qualify answers or use religion or oaths lo support statements

B.

make general, sweeping denials

C.

offer unqualified, spontaneous answers

D.

respond to questions in a rational manner and clear tone of voice

Full Access
Question # 35

The most common form of embezzlement in the workplace is:

A.

service purchases

B.

expense accounts.

C.

Kiting

D.

cash disbursements

Full Access
Question # 36

A pretrial meeting that involves opposing litigants and alms to produce all tangible evidence is called a:

A.

voir dire.

B.

derogatory

C.

duces tecum

D.

mens rea

Full Access
Question # 37

During a confrontational interview, the investigator should

A.

allow the suspect to offer denials

B.

usethe Behavior Analysis Technique.

C.

refuse to accept a moral justification for the act by the suspect

D.

accuse the suspect of committing the act under investigation

Full Access
Question # 38

The primary reason for an investigator to use closed questions at the beginning of an interview is to:

A.

encourage affirmative responses

B.

elicit a physical reaction

C.

put the intervieweeal ease

D.

limit the scope of responses

Full Access
Question # 39

One of the best positions for the undercover operative in a business is inwhich department?

A.

Accounting

B.

Transportation

C.

Mail room

D.

Administration

Full Access
Question # 40

A floating-point questioning strategy:

A.

takes cues from a second interviewer

B.

determines The truthfulness of each response as questions are asked

C.

continuously re-evaluates a hypotheses as information is obtained

D.

uses continuous monologue with little time for interviewee to respond

Full Access
Question # 41

An investigator isasked to conduct surveillance ofa local unions organizing activities. The investigator should advise the prospective client that

A.

a union representative must be notified 48 hours prior to the start of the surveillance

B.

the law requires a minimum of two undercover investigators

C.

the law prohibits surveillance of union organizing activities

D.

surveillance is legal if held in a public place

Full Access
Question # 42

Basic rules surrounding evidence collection are to:

A.

get all evidence thatcan have any bearing on the case, mark It. properly wrap, package, and preserve from contamination: establish a chain of custody and show continuity between the discovery of the evidence and its subsequent presentation

B.

video record all evidence, collect the minimal amount of evidence necessary to support the facts and circumstances, mark the evidence, secure the evidence until presentation to a court of law

C.

collect any evidence relevant to the case, secure the evidence unless otherwise requested by management, establish a chain of custody, mark all evidence with "the mark" of the primary investigator

D.

secure the scene of the offense, mark all evidence, establish chain of custody, set all evidence aside in one central location for later Identification.

Full Access