Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

What term is given to testimonial evidence presented in court?

A.

Parole

B.

Hearsay

C.

Fact witness

D.

Opinion witness

Full Access
Question # 5

An interviewer/interrogator is much more likely to gain the cooperation of an individual by exhibiting a/an:

A.

angry and aggressive manner

B.

cairn manner.

C.

Easygoingand lackadaisical manner.

D.

businesslike. impersonal manner.

Full Access
Question # 6

The most common form of embezzlement in the workplace is:

A.

service purchases

B.

expense accounts.

C.

Kiting

D.

cash disbursements

Full Access
Question # 7

Which of the following can be used to mark property that has been stolen and later recovered so its rightful owner can be identified?

A.

Cyanoacrylate fuming compound

B.

Exploding dye pack

C.

Magnetic print powder

D.

Invisible evidence marker

Full Access
Question # 8

Which of the following scenarios, applied to an undercover Investigator, could lead to an allegation of entrapment of an employee?

A.

The employee asks the undercover investigator to help him steal two company computers, and the undercover investigator agrees

B.

The employee suggests the undercover investigator punch the employee's time card at quitting time so the employee may leave 3 hours early.

C.

The undercover investigator invites the employee to help steal two computers out or the warehouse, and the employee agrees as long as the employee gets one.

D.

The undercover investigator informs the employee that the manager has left the safe unlocked, and the employee opens It and removes cash

Full Access
Question # 9

Explanations of why people steal have historically referred to the Theft Triangle, which consists of:

A.

readily available items, the desire for emotional needs, and opportunity

B.

a desire,the need for self-esteem, and minimal punishment if detected

C.

a want, a low probability of detection, and a criminal inclination

D.

a need or want, rationalization, and opportunity.

Full Access
Question # 10

During a confrontational interview, the investigator should

A.

allow the suspect to offer denials

B.

usethe Behavior Analysis Technique.

C.

refuse to accept a moral justification for the act by the suspect

D.

accuse the suspect of committing the act under investigation

Full Access
Question # 11

At the conclusion of a successful fraud investigation, a reporting technique that describes lessons learned and outlines requiring future control enhancements is known as a/an:

A.

postmortem

B.

corrective action

C.

problem definition

D.

audit referral

Full Access
Question # 12

If an investigator has a conflict of interest, should:

A.

request a formal mediation process to provide the details of the conflict

B.

avoid allowing the conflict to interfere with the investigation

C.

disclose the conflict lo the client or the employer

D.

ignore the conflict and move forward with the investigation

Full Access
Question # 13

Which statement is correct regarding the distribution and protection of investigative reports?

A.

Repents delivered by the Investigator to the company's attorney of record for retention will likely be protected from subpoena

B.

Reports cannot be protected item disclosure during the Judicial process using the attorney-client privilege

C.

The qualified privilege accorded an investigative report can be lost It it was not disseminated widely to all stakeholders

D.

The distribution of investigative reports should only come through the client since delegating it to the investigator or the client's attomey can result in the loss Of the attorney-Client privilege

Full Access
Question # 14

Witnesses should be questioned in descending priority, as follows:

A.

The human resources department, persons who are not likely to be readily available at a later date, union steward, suspects, and legal counsel

B.

People who have the most pertinent information, hostile witnesses, suspects, persons who are not likely to be readily available at a later date, legal counsel, and the department manager.

C.

Persons who are not likely to be readily available at a later date, persons believed to have the most pertinent information, persons who are likely to be hostile witnesses, suspects

D.

Legal affairs, human resources department, union steward, suspects, risk management, and witnesses who have the most pertinent information

Full Access
Question # 15

During the interview process,hidden persuaders may be used to establish:

A.

a judgmental attitude toward interviewees

B.

a positive attitude and rapport with interviewees

C.

the harassment and coercion of interviewees.

D.

the interviewer’s true agenda

Full Access
Question # 16

Which of the fallowing is NOT considered to be necessary administrative information in an investigative report?

A.

Narrative summary

B.

Name of subject

C.

Reporting investigator/ case number

D.

Date of report

Full Access
Question # 17

Barring a published employer policy to the contrary, when lockers are searched in the workplace, employees can expect privacy if the:

A.

employees supply their own locks

B.

locker door is closed

C.

employer supplies the lock

D.

lockers are open to every employee

Full Access
Question # 18

Which of the following is NOT a consideration when using drones as a tool for surveillance in investigations?

A.

Proper maintenance and repair

B.

Technical specification and user manual

C.

Legal consideration and requirement for the use

D.

Comprehensive training and opportunity practice

Full Access
Question # 19

The practice of keeping data about sources of information is most commonly referred to as:

A.

carding

B.

filing

C.

holding

D.

securing

Full Access
Question # 20

Which of the following is the firstthing an investigator should do when attempting to gather information from the victim of a crime that just occurred?

A.

Attempt tocalm the victim

B.

Obtain contact information from the victim.

C.

Ask for a written statement.

D.

Ask the victim lo recall everything that happened

Full Access
Question # 21

Latent prints usually refer to:

A.

Impressions used for Identification purposes

B.

impressions that are left only by sweat

C.

Impressions made using Ink

D.

Impressions left at a crime scene

Full Access
Question # 22

The operational level of investigative management includes overseeing

A.

investigative techniques, allocation of resources, and evidence management

B.

case load case assessment, and evidence management

C.

evidence management, case management protocols, and financial resources

D.

reporting formats. Investigative techniques, and evidence management.

Full Access
Question # 23

For internal investigations, most credible information on losses, sexual harassment, and other problems are obtained through:

A.

undercover investigations

B.

covert cameras

C.

employee tips.

D.

pre-hire screening

Full Access
Question # 24

An anonymous employee contacts the ethics hotline and reports that a co-worker is selling drugs in the office. An investigation is initiated to determine if the allegations are true. What type of investigation is best suitedto obtain the necessary facts?

A.

Constructive investigation

B.

Undercover investigation

C.

Personnel background investigation

D.

Reconstructive investigation

Full Access
Question # 25

Another term for an interrogation is:

A.

cognitive interview

B.

confrontational interview.

C.

behavioral analysis interview

D.

general Interview.

Full Access
Question # 26

When an interviewee makes a statement such as "Let's suppose I'm guilty," the interviewer should:

A.

document an admission of guilt

B.

respond calmly.

C.

recognize this as a diversion technique by the Interviewee

D.

apply pressure to obtain a written statement.

Full Access
Question # 27

Physical evidence is often referred to as:

A.

demonstrative evidence

B.

substantive evidence

C.

indirect evidence.

D.

tangible evidence

Full Access
Question # 28

'The fraudulent appropriation of property by a person to whom it has been entrusted, or into whose hands it has lawfully comesis the definition of;

A.

embezzlement

B.

maiteasance

C.

larceny.

D.

misappropriation

Full Access
Question # 29

An officer who plants the seed of an idea in another person's mind to do wrong can be accused of:

A.

coercion

B.

conspiracy.

C.

entrapment

D.

solicitation.

Full Access
Question # 30

Lapping is described as:

A.

accepting short weights or counts from a vendor.

B.

undercounting goods on the receiving side and over counting goods on the shipping side of the warehouse

C.

crediting one account with money taken from another account.

D.

throwing perfectly good material into a dumpster and later reclaiming it when no one is around.

Full Access
Question # 31

The sealing arrangement and chair spacing of an interview room are dictated by the:

A.

investigator preference and expected length of the Interview.

B.

interviewee preference and office size.

C.

particular investigation and Interview techniques to be used

D.

time it takes to conduct the interview and layout of the room

Full Access
Question # 32

The primary purpose of creating a crime scene sketch is to:

A.

assist investigators in documenting the crime scene and cataloging evidence

B.

assist prosecutors, judges, and juries during prosecution

C.

record the exact locations of pieces of evidence and their physical relation to other pieces of evidence and the surroundings.

D.

provide a permanent record of the crime scene in case theoriginal photographic evidence is lost or destroyed

Full Access
Question # 33

To ensure delegated tasks are accomplished as scheduled. It Is important to maintain a/an:

A.

investigative calendar

B.

suspense log

C.

record of involvement

D.

project verification log

Full Access
Question # 34

When computer evidence is being seized, all of the following are priority objectives EXCEPT

A.

isolating the computer

B.

isolating power and phone connections.

C.

checking for physical traps

D.

Checking for CCTV surveillance

Full Access
Question # 35

All of the following ate mandatory requirements of a competent forensic computer examination EXCEPT:

A.

fining Windows to view graphic files and lo examine files

B.

using forensically sterile examination media.

C.

maintaining the Integrity of the original media

D.

marking, controlling, and transmitting printouts, copies of data, and exhibits

Full Access
Question # 36

The first priority o! any informant handling is the:

A.

knowledge and expertise of the informant.

B.

motive andreward of the Informant.

C.

reliability and trustworthiness of the informant

D.

security and safety of the informant

Full Access
Question # 37

During preparation tor courtroom testimony, the investigator should:

A.

practice providing as much information as possible

B.

display emotions for emphasis

C.

tell the attorney if there is a weak point in the case

D.

provide opinions to support the facts

Full Access
Question # 38

Al MINIMUM which of the following digital devices should an investigation unit have at their disposal?

A.

Radio frequency (RF) blocking bag

B.

Separate digital recorder and camera

C.

Global Positioning System (GPS) trackers

D.

Personal smart phone for recordings and photographs

Full Access
Question # 39

Which of the following is among the most Important and overlooked members of an undercover team?

A.

Lawyer

B.

Corporate security

C.

Human resource manager

D.

Client representative

Full Access
Question # 40

When an interviewer is seeking a confession, it Is most important to:

A.

stress the importance of the matter under investigation

B.

consider the interviewee's behavioral indicators of deception

C.

help the interviewee to rationalize actions and avoid embarrassment

D.

convince the Interviewee that it is futile to avoid confessing

Full Access
Question # 41

in most jurisdictions, qualifying as an expert witness primarily requires:

A.

professional certification as an expert witness in a specific field

B.

experience as a witness on a number of prior cases

C.

the witness to have authored relevant professional publications

D.

evidence of the education, experience, and professional credentials of the witness

Full Access
Question # 42

Which type of security refers to the totality of all security and planning measures employed to ensure a successful outcome for a particular operation or activity, as well as the safety of the investigators involved?

A.

Operational

B.

Physical

C.

Global

D.

Personal

Full Access