Weekend Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

PCI Sample Questions Answers

Questions 4

At the conclusion of a successful fraud investigation, a reporting technique that describes lessons learned and outlines requiring future control enhancements is known as a/an:

Options:

A.

postmortem

B.

corrective action

C.

problem definition

D.

audit referral

Buy Now
Questions 5

Which of the following points does NOT support budget Justification for an investigative unit?

Options:

A.

Accurate and detailed tracking of Investigative cost

B.

Effective implementation of cost management measures

C.

Demonstration of restitution and recovery benefits

D.

Aligning investigative objectives to business strategic objectives

Buy Now
Questions 6

Which of the following is NOT an essential element ol investigative reports?

Options:

A.

Summary

B.

Preface

C.

Narrative

D.

Conclusion

Buy Now
Questions 7

What should be done to capitalize on memories and evidence in an investigation?

Options:

A.

Open and complete an investigation as soon as possible, but avoid closing prematurely

B.

immediately obtain audio recordings of the interviews with those that have first hand knowledge

C.

Ask interviewer to rationalize their thoughts to make sure what they are telling you makes sense

D.

Use new bags to collect and store all investigation findings to ensure there is no contamination

Buy Now
Questions 8

Basic rules surrounding evidence collection are to:

Options:

A.

get all evidence thatcan have any bearing on the case, mark It. properly wrap, package, and preserve from contamination: establish a chain of custody and show continuity between the discovery of the evidence and its subsequent presentation

B.

video record all evidence, collect the minimal amount of evidence necessary to support the facts and circumstances, mark the evidence, secure the evidence until presentation to a court of law

C.

collect any evidence relevant to the case, secure the evidence unless otherwise requested by management, establish a chain of custody, mark all evidence with "the mark" of the primary investigator

D.

secure the scene of the offense, mark all evidence, establish chain of custody, set all evidence aside in one central location for later Identification.

Buy Now
Questions 9

An undercover operative should "quality" each subject targeted to buy Illegal drugs to:

Options:

A.

determine how many employees are drug dealers

B.

overcome the risk of detection-

C.

determine when me dealer has possession of drugs

D.

overcome allegations of entrapment

Buy Now
Questions 10

The practice of keeping data about sources of information is most commonly referred to as:

Options:

A.

carding

B.

filing

C.

holding

D.

securing

Buy Now
Questions 11

A standard element of preparing an investigative report is to

Options:

A.

evaluate and edit

B.

be dear and verbose.

C.

organize facts and opinions

D.

distribute for feedback

Buy Now
Questions 12

A key difference between an Interview and an interrogation is the

Options:

A.

meeting location

B.

number of Investigators involved

C.

person being interviewed

D.

meeting length

Buy Now
Questions 13

Evidence thattends to prove a point of an issue is best defined as:

Options:

A.

indirect

B.

material

C.

competent

D.

circumstantial

Buy Now
Questions 14

An undercover investigation has yielded enough information to allow the operative to be removed. What is the correct procedure m removing the operative?

Options:

A.

The operative should be removed with a plausible explanation, preferably when named as an offender

B.

The operative should be removed prior to any Interviews taking place with suspected offenders

C.

The operative should never remain in place even If their cover story has not been compromised.

D.

The operative should be removed as soon as possible

Buy Now
Questions 15

When computer evidence is being seized, all of the following are priority objectives EXCEPT

Options:

A.

isolating the computer

B.

isolating power and phone connections.

C.

checking for physical traps

D.

Checking for CCTV surveillance

Buy Now
Questions 16

Physical evidence is often referred to as:

Options:

A.

demonstrative evidence

B.

substantive evidence

C.

indirect evidence.

D.

tangible evidence

Buy Now
Questions 17

Allowing an accounts payable clerk access to the vendor master file so the clerk can add or delete names is a violation of which of the following fraud prevention practices?

Options:

A.

Offline entry controls and limits

B.

Separation of duties

C.

Signature authorities

D.

Rotation of duties

Buy Now
Questions 18

What are the most common tour sources of Information an investigator uses?

Options:

A.

Victims, witnesses, informants, and confidential informants

B.

Victims, bystanders, suspects, and snitches

C.

Victims, witnesses, informants, and bystanders

D.

Neighbors, relatives, witnesses, and bystanders

Buy Now
Questions 19

Which of the following is NOT a consideration when using drones as a tool for surveillance in investigations?

Options:

A.

Proper maintenance and repair

B.

Technical specification and user manual

C.

Legal consideration and requirement for the use

D.

Comprehensive training and opportunity practice

Buy Now
Questions 20

Corporate undercover investigations can best be described as:

Options:

A.

the surreptitious placement of a properly trained and skilled investigator

B.

the most effective method for identifying suspects

C.

the safest method for identifying potential criminal behavior in the workforce

D.

a person operating unnoticed in a workforce

Buy Now
Questions 21

What is one of The three 'i's?

Options:

A.

intellect

B.

Intuition

C.

Initiative

D.

Information

Buy Now
Questions 22

The -functional chatter" of an investigative unit is Issued by the;

Options:

A.

Chiefexecutive officer.

B.

director of security.

C.

chiefoperations officer

D.

director of legal affairs

Buy Now
Questions 23

An electronic access control record reveals that at the time or a computer theft, an employee was m the vicinity. The record would be considered

Options:

A.

entirely non- incriminating

B.

direct evidence

C.

circumstantial evidence.

D.

prima facie evidence

Buy Now
Questions 24

An individual with extensive experience, knowledge, and background m automobile paint is brought in to testify. This person is considered a/an:

Options:

A.

expert witness

B.

fact witness

C.

direct witness

D.

lay witness

Buy Now
Questions 25

The most important reason to conduct investigations as soon as an incident is reported or discovered is:

Options:

A.

to reduce the chances of obtaining false alibis

B.

witnesses Tend to be less cooperative if too much time has elapsed

C.

to allow operations to return to normal as soon as possible

D.

the value of physical or electronic evidence diminishes rapidly.

Buy Now
Questions 26

A method to evaluate the levels of accuracy, timeliness, and completeness of the recordings of business transactions is:

Options:

A.

financial auditing

B.

fiscal compliance

C.

business accounting

D.

financial management

Buy Now
Questions 27

One way to control the dissemination of case information is to:

Options:

A.

maintain a sequential file log

B.

maintain an attached cover sheet with the sensitivity level identified

C.

post completed reports only on company computers

D.

conduct a reporting analysis for distribution to the investigative team.

Buy Now
Questions 28

An investigator isasked to conduct surveillance ofa local unions organizing activities. The investigator should advise the prospective client that

Options:

A.

a union representative must be notified 48 hours prior to the start of the surveillance

B.

the law requires a minimum of two undercover investigators

C.

the law prohibits surveillance of union organizing activities

D.

surveillance is legal if held in a public place

Buy Now
Questions 29

A subsidiary fact from which theexistence of the ultimate fact in determining whether guilt or innocence may be inferred is whichof the following kinds of evidence?

Options:

A.

Circumstantial

B.

Real

C.

Testimonial

D.

Admissible

Buy Now
Questions 30

During a confrontational interview, the investigator should

Options:

A.

allow the suspect to offer denials

B.

usethe Behavior Analysis Technique.

C.

refuse to accept a moral justification for the act by the suspect

D.

accuse the suspect of committing the act under investigation

Buy Now
Questions 31

Which of the following is characteristic of an experienced Investigative interviewer?

Options:

A.

Impatience

B.

Thinking ahead

C.

Inactive listening

D.

Detachment

Buy Now
Questions 32

Explanations of why people steal have historically referred to the Theft Triangle, which consists of:

Options:

A.

readily available items, the desire for emotional needs, and opportunity

B.

a desire,the need for self-esteem, and minimal punishment if detected

C.

a want, a low probability of detection, and a criminal inclination

D.

a need or want, rationalization, and opportunity.

Buy Now
Questions 33

The best method to protect information obtained from a confidential source is to

Options:

A.

share details with senior company managers only.

B.

make no written documentation of sensitive data

C.

develop a mechanism with code names or numbers

D.

protect open information

Buy Now
Questions 34

A defendant's res gestae statements to police are:

Options:

A.

admissible

B.

not admissible

C.

hearsay

D.

admissible only of appropriate warnings have been given

Buy Now
Questions 35

An interviewer/interrogator is much more likely to gain the cooperation of an individual by exhibiting a/an:

Options:

A.

angry and aggressive manner

B.

cairn manner.

C.

Easygoingand lackadaisical manner.

D.

businesslike. impersonal manner.

Buy Now
Questions 36

Al MINIMUM which of the following digital devices should an investigation unit have at their disposal?

Options:

A.

Radio frequency (RF) blocking bag

B.

Separate digital recorder and camera

C.

Global Positioning System (GPS) trackers

D.

Personal smart phone for recordings and photographs

Buy Now
Questions 37

Which of the following investigative methods used in robbery investigations is considered a reactive measure?

Options:

A.

Integrity test

B.

Stakeout

C.

Infiltration

D.

Crimescene investigation

Buy Now
Questions 38

Which of the following is a quality found in a positive interview attitude?

Options:

A.

Congruence

B.

Caution

C.

Conformance

D.

Conjuncture

Buy Now
Questions 39

If an investigator has a conflict of interest, should:

Options:

A.

request a formal mediation process to provide the details of the conflict

B.

avoid allowing the conflict to interfere with the investigation

C.

disclose the conflict lo the client or the employer

D.

ignore the conflict and move forward with the investigation

Buy Now
Questions 40

Which of the following relates to the influence of an investigator's behavior on an interviewee's behavior?

Options:

A.

Adelphi technique

B.

Systems approach

C.

Stockholm syndrome

D.

Pygmalion effect

Buy Now
Questions 41

'The fraudulent appropriation of property by a person to whom it has been entrusted, or into whose hands it has lawfully comesis the definition of;

Options:

A.

embezzlement

B.

maiteasance

C.

larceny.

D.

misappropriation

Buy Now
Questions 42

Misappropriation of trust funds or money held in any fiduciary capacity is referred to as:

Options:

A.

concealment

B.

defalcation.

C.

conversion

D.

switching

Buy Now
Exam Code: PCI
Exam Name: Professional Certified Investigator (ASIS-PCI)
Last Update: Oct 5, 2025
Questions: 141
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now PCI