Inv Flashcards

1
Q

In a cognitive interview, what is the purpose of the reverse order technique

A

To help the witness recall events in a different sequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the main disadvantage of using forensic accounting in investigation

A

High cost, Time consuming nature, Complexity of the process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary role of a forensic document examiner

A

To analyze handwriting and documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the primary function of a forensic accountant in an investigation

A

Analyzing financial records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is the primary goal of evidence collection at a crime scene

A

To preserve the evidence for analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is a method for preserving evidence

A

Proper documentation and storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A person may effect an arrest without warrant when he/she

A

Has reasonable grounds to believe that the individual will fail to attend court

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following best describes the concept of saturation in surveillance operations

A

Ensuring continuous coverage, Overlapping surveillance efforts, Maximizing observer presence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In digital forensics what is the significance of a system log file

A

It records system and user activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the role of a forensic anthropologist

A

To analyze human remains for identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the primary role of a surveillance operation in an investigation

A

Gathering direct evidence of activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the primary purpose of surveillance in an investigation

A

To gather evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What of the following is not typically a part of the cognitive interview process

A

Asking Leading Questions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which type of surveillance involves following a subject

A

Mobile Surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the primary function of a forensic pathologist

A

Conducting autopsies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the primary goal of a security investigation

A

To identify and address security threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the main purpose of a root cause analysis in investigation

A

Identifying the cause of the incident , Preventing recurrence of incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is not a common type of investigation in the business context

A

Market research

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In the context of forensic interviews, what is the primary purpose of the Reid technique

A

To obtain a confession

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following is not a common method of analyzing financial statements in fraud investigations

A

Probability Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

During a buy-bust operation what is the primary risk to undercover agents

A

Exposure and potential physical harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following is a not primary consideration in the planning of a buy-bust operation

A

The financial cost of the operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

During an interrogation using the REID technique, what is the primary goal of the theme development phase

A

To create a psychological environment conducive to confession

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

In a cognitive interview, what is the purpose of using varied recall techniques

A

To trigger different aspects of memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following is a key component of a risk assessment in investigations

A

Identifying potential threats
Evaluating the probability of occurrence
Determining potential impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of the following is not a benefit of using video surveillance in investigations

A

Privacy Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the primary function of a forensic lab

A

To analyze physical and digital evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the main goal of an internal investigation

A

Identifying policy violations, Determining the cause of incidents, Implementing corrective actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the primary objective of an undercover operation

A

To gather information covertly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following is not a typical step in the investigation process

A

Closing the investigation without reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the main objective of conducting a root cause of analysis in an investigation

A

To identify the underlying reason for an issue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of the following is not a component of the fraud triangle

A

Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which of the following best describes the concept of beyond a reasonable doubt

A

The standard of proof in criminal cases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the main difference between a control hire and cold hire in undercover investigations

A

Control hires are pre planned. Cold hires are spontaneous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which of the following best describes Lima Syndrome

A

Captors develop sympathy for their hostages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which of the following is not an investigative interview principle

A

Leading Questions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is the main purpose of a risk assessment in an investigation

A

Identifying potential threats and vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is the primary objective of an employee background check in an investigation

A

To verify the accuracy of the employees resume

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which of the following is a primary benefit of using the cognitive interview technique

A

Enhanced recall of detailed information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is the primary goal of an internal investigation

A

Identifying policy violations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is the primary purpose of a chain of custody in an investigation

A

To document the timeline of the investigation
To ensure evidence integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is the role of a crime analyst

A

To analyze crime data and trends

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

This process should be reserved for individuals whose involvement in the issue under investigation is reasonably certain

A

Confrontational interview

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Which of the following is not a characteristic of an effective interview environment

A

Distraction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is the first step in conducting an investigation

A

Establishing objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

In an investigation what is the primary purpose of a polygraph test

A

To detect lies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is the main objective of conducting a forensic audit

A

To identify financial discrepancies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Which of the following is not an effective way to maintain the integrity of digital evidence

A

Allowing multiple people to handle the evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Which of the following is not a benefit of using open source intelligence (OSINT) in investigations

A

Ensuring evidence integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is the primary objective of a interview in an investigation

A

To obtain information and verify facts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Which of the following is not typically included in an investigation report

A

Detailed financial analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

In the context of investigations what does the term modus operandi refer to

A

The suspects method of operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Which factor is most important in witness credibility

A

Consistency of testimony

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Which of the following best describes a subpoena

A

A legal order to compel testimony or the production of evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Which of the following best describes a lead in an investigation

A

A potential source of information or evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

In digital forensics, what is the primary purpose of network traffic analysis

A

To identify unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Which of the following best describes the concept of reasonable suspicion

A

A belief based on facts that a crime may have been committed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Which of the following is not a typical step in the fraud investigation process

A

Marketing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What is the main disadvantage of physical surveillance

A

High cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What is the primary function of an investigative plan

A

To outline the steps and objectives of an investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Which of the following best describes the primary purpose of an undercover operation

A

To gather evidence without detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Which of the following is not a typical step in the investigative process

A

Making assumptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What is the purpose of an undercover agent

A

To gather information without being detected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

In the context of interview techniques, what is the primary advantage of using cognitive interviewing

A

It enhances the interviewees memory recall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What is the main purpose of litigation hold

A

To prevent evidence destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Which of the following is not an essential characteristic of a well conducted investigation

A

Expediency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Which of the following best describes lock in effect

A

Data migration difficulty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What is the purpose of an investigative report

A

To document findings and support conclusions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Which of the following is not a typical step in the evidence collection process

A

Manipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Which of the following best describes a sting operation

A

An operation where suspects are tricked into committing a crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Which of the following best describes Stockholm Syndrome

A

Hostages develop positive feelings towards their captors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

What is the importance of maintaining confidentiality during an investigation

A

To protect the integrity of the investigation and the privacy of involved parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

What is the main disadvantage of relying solely on digital evidence in an investigation

A

Potential for data manipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

What is the primary disadvantage of using physical surveillance in invesgitations

A

High Cost
Risk of detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Which of the following is not a preservation method for digital evidence

A

Encrypting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What is the main disadvantage of using covert surveillance in investigations

A

Risk of detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Which of the following statements about the Reid technique is True

A

It involves direct confrontation and accusation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

In an investigation what is the primary benefit of using forensic imaging software

A

It ensures data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

In the context of interviews, what does rapport building refer to

A

Establishing a connection to facilitate communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Which of the following is not a common error in digital evidence collection

A

Using write blocking tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Which of the following methods is not typically used to conceal embezzlement

A

Performing routine audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

During an interrogation using the REID technique, what is the primary goal of the theme development phase

A

To create a psychological environment conducive to confession

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

What is the primary function of an interview in an investigation

A

To gather information from witness and suspects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Which of the following best describes the term forensic analysis

A

A scientific examination of evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Which of the following is a defining feature of Stockholm Syndrome

A

Hostages develop positive feelings for their captors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Which of the following is a common technique used in investigations

A

Interviewing witnesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Which of the following best describes the concept of reasonable doubt

A

A standard of proof in criminal cases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Which technique is most effective for interviewing witnesses

A

Establishing rapport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Which of the following is not typically included in the principles of due diligence during investigations

A

Immediate confrontation with suspects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Which of the following is not a standard technique in digital forensics

A

Conducting interviews

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

What is the primary disadvantage of using biometrics in investigations

A

Hight cost, Legal and privacy concerns, Technical Complexity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

What is the purpose of a forensic lab in an investigation

A

To analyze physical and digital evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Which of the following is not typically considered a red flag for financial fraud

A

Frequent travel for business purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Which of the following is not an essential quality of an effective investigator

A

Bias

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

The principle of Unity of command is most relevant to which aspect of investigations

A

Organizational structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

What is the primary disadvantage of using open source intelligence (OSINT)

A

Legal and Ethical Issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

What is the purpose of a witness statement in an investigation

A

To document firsthand accounts of an incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

What is the purpose of an surveillance operation

A

To monitor activities for evidence gathering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

In the context of cognitive interviews, what is the context reinstatement technique used for

A

Enhancing witness memory recall by recreating the original context

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

In an investigation what is the primary function of an evidence locker

A

To secure physical evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Which of the following is not a method used to validate the authenticity of digital evidence

A

Physical examination of the hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

In the context of undercover investigations what does the cold hire imply

A

The agent has not prior relationship with the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

In an interrogation using the Reid technique. What is the primary purpose of the theme development stage

A

To suggest reasons why the suspect committed the crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

What is the primary purpose of a sting operation

A

Evidence gathering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Which of the following is not a method for ensuring the integrity of investigative files

A

Allowing unrestricted access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

In an interrogation using the Reid technique. What is the primary purpose of the minimization strategy

A

To reduce the suspects perceived consequences of confessing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

In cognitive interviews why it is important to allow the witness to recount events in their own words

A

To avoid influencing the witnesses memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

The Law of Tort deals with

A

Torts against person and property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

In digital forensics what is the primary purpose of creating a forensic image of a storage device

A

To replicate the contents exactly for analysis without altering the original

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

What is the primary challenge of using mobile forensic in investigation

A

Legal implications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

What is the main objective of a forensic interview

A

To gather detailed information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Which of the following is common challenge in conducting undercover operations

A

Maintaining the undercover agents cover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Which of the following best describes the chain of custody in evidence building

A

A record of all individuals who have handled the evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

What is the key benefit of OSINT

A

Public information access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Which of the following is the primary purpose of a surveillance operation

A

Gathering Evidence, Deterring criminal activity, Protecting Assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Which of the following is not a typical source of open source intelligence (OSINT)

A

Confidential informants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

What is the primary purpose of a root cause analysis in investigations

A

Identifying the underlying reasons for an incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

What is the key to effective report writing in investigations

A

Being, Clear, Concise and Objective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

In the context of digital forensics, what is the purpose of using a disk image

A

To replicate the contents of a disk for analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

What is the main purpose of a audit trail

A

To document financial transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Thefts of this nature are held to be impulsive acts committed by persons operating alone who pick up an item or two that is readily available when there is small risk of detection

A

Theft of opportunity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

What is the primary goal of a preliminary investigation

A

Crime determination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Which of the following best describes the term substantial evidence

A

Evidence that is reasonable mind might accept as adequate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

In the context of PEACE model, what does Account refer to

A

Allowing the suspect to tell their story uninterrupted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Which of the following is not a common symptom of financial statement fraud

A

Increased capital expenditures with no significant business expansion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

In forensics accounting what is the primary purpose of a Benfords law analysis

A

To identify unusual data patterns in financial statements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Which of the following best describes the purpose of a forensic analysis

A

Analyzing evidence in a laboratory setting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

In a digital forensic investigation what is the primary reason for creating a forensic image of a harddrive

A

To preserve the original data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

What is the significance of probable cause in investigation

A

Reasonable grounds for making a search or pressing a charge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

Which of the following is not a characteristic of a well conducted surveillance operation

A

Immediate confrontation of a the suspect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

What is the primary goal of an asset search in a fraud investigation

A

To locate hidden assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

In the context of digital forensics, what is the purpose of using a disk image

A

To replicate the contents of a disk for analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

In digital forensics what is the purpose of a write blocker

A

To prevent alterations to the original data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

what is the primary benefit of using multiple investigators in a complex case

A

Enhanced expertise
Increased resources
Faster resolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

Which of the following statements about chain of custody is incorrect

A

It is only necessary for physical evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

Which of the following is an example of testimonial evidence

A

A witness statement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

In the context of investigations what does the term due diligence refer to

A

The thoroughness of the investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

Which of the following is not a typical sign of data tampering in digital forensics

A

Regular file backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

What is the main disadvantage of using witness statements in an investigation

A

Potential for bias and inaccuracies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

What is investigation

A

Investigation is a systematic and through examination or inquiry into something or someone (the collection of facts and information) and the recording of that examination in a report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

Define investigation from management perspective

A

Management is defined as the act of conducting or supervising something or “the judicious use of means to accomplish an end

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

What are the primary purposes of an investigation

A

The primary purpose of any investigation thoroughly documenting incidents -identifying cause of undesirable situations - documenting and correlating facts surrounding any situation or allegation - identifying suspects involved in a crime or act of misconduct - completing information that proves or disproves an allegation or that implicates or exonerates an individual suspected or committing a crime or misconduct - allowing a decision to be made, often with respect to a level of trust or suitability determination, regarding an individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

What is defalcation

A

Failure to properly account for money held in a fiduciary capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

What are the considerations for an investigation

A

Investigation Considerations:
(a) The case level
(b) The strategic levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

Define the investigative functions at case level

A

At the case level: the purpose sets the context within which the investigation will be conducted and help keep the people working or the particular case focused

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

Define the investigative at the strategic level

A

Dictates the necessary planning, organizing, equipping, staffing and preparation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

What are the qualities of an effective investigation

A

Objectivity, thoroughness, relevance, accuracy and timeliness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

Who will ensure that the investigations are present at the case and strategic level of investigation?

A

It is management’s role to ensure these qualities are present at both level of investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

The most difficult requirements for the investigator is to maintain

A

Objectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

Many investigations are founded or working……….

A

Hypothesis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

The hypothesis is appropriately used as a tool as long as it remains within……….

A

The bounds of objectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

What is the common mistake of inexperience investigation

A

Failure to corroborate evidence is a common mistake of inexperienced investigations, but it can happen to anyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

. What shall an investigator do to aid in maintaining objectivity

A

To aid in maintaining objectivity, every investigator should consciously recognize his or her personal prejudice and neutralize the effects of those prejudices on investigative activities, including the formation of the hypothesis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

. What is crucial for successful outcome of a case

A

Investigators’ approach and demeanor is of critical importance to the successful outcome of a case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

The investigation accomplishes an air of objectivity by choosing

A

Words and phrases carefully and avoiding facial expression and body language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

During investigation, the first and foremost, the investigator must project

A

An air of objectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

Corroborating important aspects through different sources is a proven means of………….

A

Achieving thoroughness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

In the interest of thoroughness, a balance must be drawn between

A

An effort to follow every possible lead to its logical conclusion and gathering so much information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

What is the key determinant of relevance

A

The spectrum of details pertains, the depth of details and cause and effect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

What can arise and become extremely relevant in any type of investigation

A

Cause and Effect relationship

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

What is the least accurate forms of investigative information

A

Eyewitness accounts are among the least accurate forms of investigative information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

In the corporate environment, most credible information on losses, several harassment and other reportable incidents come from

A

Employee tips

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

Sound investigative technique dictates

A

Frequent tests for verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

If an informant is the only source of key data, the informant should be tested at least for

A

Consistency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

Who should carefully evaluate all investigative input

A

All investigative input should be carefully evaluated by the investigative management team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

Accuracy is also a key element in

A

Personal background and reemployment investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

Three things important for an investigation

A

In investigation it is important to: Open an investigation as soon as possible -Complete an investigation as quickly as possible - Avoid closing an investigation prematurely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

Why it is important to conduct an investigation as soon as an incident is reported

A

The important reason for conducting an investigation as soon as incident is reported or discovered because the value of physical or electronic evidence diminishes rapidly and witnesses others who possess relevant information provide the best information when the incident in fresh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

Once an investigation is under way it should be completed in …………… to conserve resource, allow operations to return normal as soon as possible, and deter other potential wrongdoers.

A

Expedient manners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

What reflect the professionalism of the investigation

A

Quick and decisive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

What is the impact of rush investigation

A

Rush investigation leads towards adverse impact including the possibility of increased liability risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

In which type of case resolution can be achieved

A

Resolution cannot be achieved in all cases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

What can help to minimize the problem of unrealistic expectation as an outcome of investigation

A

Regular and timely communication between senior security or investigative managers corporate or organizational decision makers will help minimize the problem of unrealistic expectations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

A crime scene investigation is an example of ………….

A

Reactive measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

The primary purpose of a private sector security organization is to…….

A

Protect the interests of the employing enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

Why in many cases, the public law enforcement agency having jurisdiction decides not to investigative an incident

A

Because of its workload and other priorities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

What are points that distinct private sector and public sector investigation

A

The distinction between the public sector and private sector has implication for- legal authority - resource allocation - program management – investigative outcome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

The value of private sector investigative capabilities are frequently measured in terms of …………………………

A

Recovery, restitution and risk reduction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q

The interest of the private sector enterprise may be best served by some combination of………………

A

Accepting restitution or taking administrative or employment action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q

Which investigation is broader in scope? Public or corporate

A

Corporate investigation tends to be broader in scope than those initiated by public law enforcement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q

What are the points that must be consider n determining investigation outcomes

A

In determining investigation outcomes of the case must consider - the legal requirements in the jurisdiction - organized labour contracts in force or pending -public and investor relations - the past practice of the enterprise in similar cases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q

Who should be always consulted before making any decision regarding the outcome of the investigation?

A

Legal counsel should always be consulted in making decision about the outcome of investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q

In private sector, a formal relationship should be formed between the

A

Investigator and appropriate legal counsel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q

What are the basic functions of management

A

Planning, organizing, directing, coordinating, and controlling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q

What are the three levels of investigation in which it should be managed

A

Investigation can be managed at the strategic, operational and case levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q

At which level of investigation legal counsel should be involved

A

Legal counsel must be involved at strategic level to ensure the proper focus of the investigation as it relates to company policy and procedures or civil or criminal states.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q

What are the issues at strategic level

A

Issues at strategic level include: - Who will head the investigate function - Where it will fit in the organizational structure - What its strategic goals and objectives will be - Where it will focus its efforts - How financial and personal resources will be allocated to the function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
188
Q

What are the functions of operations level

A

The operational level deals with the technical aspects of the investigative function and how the function works within its department

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
189
Q

What are the issues at operational level

A

Issues at operational level include: - Case load, case assessment, quality control, investigative policies and procedures, reporting formats, liaison, composition, supplies and equipment, evidence management, and outside contracts are considered at this level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
190
Q

What are the issues at case level

A

Issues at case level involves: - Individual investigations, the particular investigators. - Investigative technique - Case management protocols associated with them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
191
Q

Goals and objectives are critical to the investigations functions at which level of investigation

A

All three levels of investigations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
192
Q

Objectives are based on

A

The goals but more specific and may be more short –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
193
Q

Objectives can be used to gauge

A

The progress, success or achievement of a unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
194
Q

Specific, measurable goals are also known as

A

Metrics in modern organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
195
Q

How investigation metrics can be used

A

Metrics can be used to evaluate the performance of individuals, teams and organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
196
Q

Any investigative strategies developed must be compatible with the

A

Organization’s overall strategic business plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
197
Q

When developing the tactical objectives for an investigative project, the IU Chief should consult

A

The organization’s tactical business plan to ensure compatibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
198
Q

A significant issue that transcends the three levels of investigation management is that of ……………..(

A

Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
199
Q

What can seriously damage the effectiveness of an IU?

A

A lack of solid ethical standards can seriously damage the effectiveness of an IU or individual investigators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
200
Q

In order to be effective in gathering, corroborating, and integrating facts, investigators and IU rely on their………

A

Credibility and respectability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
201
Q

A reputation for unethical behaviour has a significant adverse impact on that……………

A

Trust relationship

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
202
Q

For small organizations with infrequent investigative needs, the use of an outside agency or contract service (outsourcing) is

A

A logical choice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
203
Q

The primary goal of a compliance investigation is to…..

A

Provide guidance regarding possible or potential violations of regulatory requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
204
Q

In almost all situations, what is a major factor in the decision to outsource or maintain an internal investigative capability?

A

Cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
205
Q

What is included in investigative cost elements

A

It include personnel expenses, contracts and retainers, equipment, consumables, and office expenses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
206
Q

What can be used to determine whether to outsource the investigative unit

A

The cost-benefit analysis is a useful tool to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
207
Q

To predict investigative budget, what is the best approach

A

The best approach is to base budget estimates on historical data, quantitative estimates of risk avoidance, support of organizational goals and factor in projected changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
208
Q

What are the advantages of internal investigation sources

A

The advantages of internal investigative sources are:
1- company exercise complete control of the investigative process and people,
2- ability to maintain closer liaison with local agencies and internal contacts,
3- better ability to protect sensitive information and keep it inside the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
209
Q

What are the advantages of outsourcing

A

The advantages of outsourcing are:
1- ability to expand or reduce workforce according to actual need,
2- responsibility for equipment, supplies and training can be transferred to the contractor,
3- specialists and experts can be called in as needed,
4- can be more cost-effective,
5- minimize overhead costs,
6-investigators may have a broader base of expertise and experience, 7- gives independent, outside objective appearance to investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
210
Q

What are the disadvantages of outsourcing

A

The disadvantages of outsourcing are :
1-quality control is largely in the hands of the contractor,
2- investigators may not be as familiar with the client’s company, mission, organization, and culture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
211
Q

What are the disadvantages of internal investigative resources

A

The disadvantages of internal investigative resources are:
1- high cost of maintaining an internal investigative capability,
2- need to maintain equipment that may not be used for a lengthy period,
3- need to maintain an investigative staff, including training, licensing, and personnel management,
4- especially if there is litigation, the investigation may be tainted as it has been conducted under company direction;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
212
Q

Optimally, the structure of an investigative function is

A

The result of a need assessment and a cost-benefit analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
213
Q

Investigative needs generally arise on…..

A

Short notice and on surge basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
214
Q

How the investigative mission fits into an organizations

A

The reporting chain, physical location of the investigative capability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
215
Q

The chain between source of investigation and investigation decision maker should be long or short

A

The shortest reporting chain between the sources of information and the final decision maker is the best

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
216
Q

If litigation is expected or some culpability of the company is suspected, the investigator should deliver the report directly to and only to the….

A

Legal counsel of record for the company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
217
Q

The reporting chain for investigative information or results is critical and can affect……….

A

Both outcome of specific cases and the effectiveness of the unit itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
218
Q

Does the reporting chain requires to follow the day to day organization chart

A

The reporting chain does not necessarily need to follow the day-to-day organization chart or supervisory chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
219
Q

What are the key considerations in selecting the physical location andlayout of IU

A

The key considerations in selecting the physical location and layout of the IU:
1-access to key information and people,
2- privacy,
3- the need to call people in or access them for interviews,
4- the need to move quickly around the facilty,
5- the possible need to store large amounts of information or evidence,
6- secure storage space for equipment and supplies, and 7- communications needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
220
Q

Define the space of an IU

A

Ideally, the IU would have a soundproof room with ample space for the investigation team to work together and post exhibits. The room should have internet access, telephones, and whiteboards, and it should be secured when not in use. Some teams refer such a location as a war room

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
221
Q

A corporate investigative function, outsourcing can mean……..(

A

Complete outsourcing of the investigative function to an outside under contract, contracting out for selected or specialized investigative support services as needed;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
222
Q

The decision to outsource and the outsourcing approach are usually based on…

A

A cost-benefit analysis and projected overall investigative needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
223
Q

The specialized services that are commonly called on to support corporate investigation are………….

A

1- Computer forensics,
2- forensic auditing,
3- handwriting analysis,
4-questioneddocument examination,
5- statement analysis, 6-forensic psychology,
7- forensic polygraph,
8- technical surveillance or counter surveillance to provide a deterrent to criminal activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
224
Q

. It is recommend that vendors be preapproved through a………(

A

Vetting process;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
225
Q

What are the responsibilities of IU Chief after being selected the vendor

A

Once vendor is selected, the IU chief should ensure that key provisions or clauses of the contract pass through to any consultants or subcontractors the vendor may use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
226
Q

Ultimately, the responsibility for ensuring the proper training, and licensing of contract investigators lies with the………..

A

Hiring organizations (company issuing the contract).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
227
Q

The structure and operation of an organization’s investigative function can have a great impact on………..

A

The financial and operational health of the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
228
Q

The IU is given credibility and authority through a functional charter issued by………

A

The CEO or an equivalent officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
229
Q

What is outlined by the policy statement

A

The policy statement outlines procedures for initiating and conducting investigations and it addresses reporting channels, coordination mechanisms, and disposition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
230
Q

To estimate the appropriate size of the unit, what is necessary to consider

A

It is necessary to consider the projected case load, nature of cases, geographic area covered, and administrative or other support needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
231
Q

What is considered to determine the unit size

A

The expected type of cases is a key determinant in unit size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
232
Q

Selecting professional personnel is an important aspect of setting up a …

A

Proprietary IU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
233
Q

Which skill is considered as the most critical for an investigator?

A

Communication skills are one of the most critical skills needed by an investigator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
234
Q

The core of any investigation is….(

A

The ability to elicit information from all sorts of people, both cooperative and uncooperative, with many different perspectives and at different levels is absolutely essential.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
235
Q

What are the skills that make a man good investigator

A

People with excellent observation, interpretation and correlation skills often make good investigators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
236
Q

The best investigators are people who have ………(

A

Good math skills

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
237
Q

In many respect, an investigation is………

A

An analytical process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
238
Q

What are the consideration that should be given to prepare temporary or long term evidence storage

A

The consideration should be given to preparing for either temporary or long-term evidence storage which are: keys or locks combinations to the evidence storage are should be given to only a few individuals,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
239
Q

Budgets and financial management are always important issues, particularly when………

A

Establishing a new function or unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
240
Q

The lifeblood of the investigative mission is…….

A

Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
241
Q

An employee hot line is…….

A

A cost effective way to obtain information with regard to employee malfeasance;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
242
Q

What are the four key areas of managing an investigation

A

1- investigative function,
2- investigative resource,
3- unit management,
4- case management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
243
Q

What is meant by lapping

A

Lapping means crediting one account with money from another account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
244
Q

What is meant by embezzlement or defalcation

A

Embezzlement or defalcation mean appropriation of property by a person to whom it has been entrusted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
245
Q

What is meant by skimming

A

Skimming means keeping some of the cash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
246
Q

One particularly important but often neglected type of investigation is ……

A

The due diligence investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
247
Q

What are the principle resources of an investigation unit

A

The principal resources of an IU are people, information, credibility, physical assets, and financial assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
248
Q

Why investigative funding needs are often difficult to project

A

Investigative funding needs are often difficult to project because they can be drastically affected by one or a few major cases as well as new regulatory requirement sort legislation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
249
Q

Justifying investigative budget requests is a…..

A

Daunting task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
250
Q

What can significantly improve the response to funding requests

A

Carefully tracking and managing operational and overhead costs can significantly improve the response to funding requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
251
Q

What represents the largest budget items for an IU

A

Costs for personnel and outside services generally represent the largest budget items for an IU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
252
Q

Define the investigative life cycle

A

The investigative life cycle are:
1-initiation,
2- investigation,
3- reporting,
4-results/follow-up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
253
Q

Most credible information on losses, sexual harassment, and other problems comes from

A

Employee tips

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
254
Q

What are the management responsibilities in investigation phase

A

Management responsibilities in the investigation phase include implementation of a case management systems and appropriate administrative control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
255
Q

Case assignment in larger units(with several investigators) may be based on….

A

caseload, experience, specialization, geography, or a combination of these factors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
256
Q

What is the ultimate consequence of poor case assignments

A

Poor case assignment can quickly lead to investigator disenchantment and degrade the IU’s effectiveness and its ability to resolve cases successfully

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
257
Q

Whose function is to manage an investigation assignment ledger?

A

Managing an investigative assignment ledger falls under the function of the controller or manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
258
Q

What are the factors that affect an investigation production

A

Investigative production is affected by the temperament, competence, and working pace of the investigator, by the complexity of the case, and by the availability of informants and other sources of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
259
Q

Documentation and record keeping are tedious but important aspect of……

A

Investigative management responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
260
Q

What are the key issues in managing the IU

A

Three key issues in managing the IU are:
1- setting objectives,
2- motivating the investigative staff,
3- training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
261
Q

What are the some investigation responsibilities that often neglected but important for effective operation of the unit

A

Setting objectives and monitoring progress toward them is a responsibility that is often neglected but is important for effective operation of the unit as well as demonstrating value to the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
262
Q

Investigative objectives must be

A

Specific and measurable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
263
Q

When a case file should be established

A

At the outset of each investigation and upon the approval of the IU manager, a case file should be established

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
264
Q

In investigation, best idea often result from …

A

Collaboration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
265
Q

What are the tasks that needed to be undertaken by the lead investigator

A

1- track liaison contacts and information provided,
2- maintain surveillance logs,
3- maintain evidence logs,
4- file original written statements and documentary evidence,
5- where applicable, track investigative costs by case,
6-maintain the suspense log,
7- report to regulatory agencies when required;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
266
Q

Typically, investigative results are conveyed in……..

A

A formal report of investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
267
Q

In investigation, legal matters must be considered for two reasons, what are the reasons

A

Legal matters must be considered for two reasons:
1- to protect the company against liability and,
2- to ensure that an appropriate conclusion can be reached if the case goes to court or another legal forum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
268
Q

What is invaluable in operation of an effective IU?

A

Professional working relationships are invaluable in the operation of an effective IU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
269
Q

For organization that requires frequent, large, or more complex investigations, what is advisable?

A

A criminal intelligence analysis function may be advisable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
270
Q

An important aspect of investigative management, which often receives less attention than is warranted, particularly in the private sector, is that of …..

A

Protecting case-specific investigative information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
271
Q

What is the consequence of improper handling of investigative information

A

Improper handling of investigative information can energize the rumor mill, harming the investigation, stock prices, market share, and corporate reputation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
272
Q

What is OPSECC

A

Operational security is the totality of all security and planning measures employed to ensure a successful outcome for a particular operation or activity as well as the safety of the investigators involved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
273
Q

What are the five cyclical steps included in OPSEC

A

The OPSEC process includes five cyclical steps :
1- identify assets (critical information),
2- define the threat(collectors, capabilities, motivations),
3- assess vulnerabilities,
4- analyze the risk(impact, priority, existing counter measures, etc;), 5-develop and implement countermeasures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
274
Q

An important rule of thumb is never to underestimate the lengths to which………

A

Adversaries will go to get what they want

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
275
Q

During investigation process vulnerabilities can be ……….

A

Be direct or indirect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
276
Q

What are the factors an investigative risk analysis based on

A

Investigative risk analysis based on :
1- the nature of the critical information,
2-the credible threats,
3- the identified vulnerabilities,
4- the consequences of an information compromise-assigns levels or priorities to the information risks;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
277
Q

A countermeasure against information risk is……

A

Anything that effectively negates or reduces an adversary’s ability to exploit information or vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
278
Q

Do you think culture is an issue in investigation

A

Cultural issues can become a factor in an investigation in almost any type of company, industry, or organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
279
Q

What is the difference in multinational and international investigation

A

The differences in multi-national and international investigations

Multinational investigations :These investigations can involve crimes such as terrorism, drug trafficking, money laundering, child pornography, intellectual property offenses, and corruption. Multinational investigations must consider the company’s strengths and vulnerabilities, as well as the different laws, regulations, and enforcement powers in the jurisdictions involved
International investigations : These investigations can cross multiple jurisdictions, countries, states, or borders. They can be for business, personal, litigation, or financial reasons. International investigations can take two to four weeks to complete, depending on the country being investigated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
280
Q

What are effect of working relationship with foreign counterpart or supporting agencies

A

In most cases, a close working relationship with foreign counterpart or supporting agencies can have immense benefits and greatly expedite successful resolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
281
Q

If you are paying for information who should be consulted first

A

Legal counsel should be consulted before payments are offered for information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
282
Q

What is the most significant problem in international investigation

A

Cultural differences are the most challenging problem in international investigations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
283
Q

What is the best way to help to ensure the an appropriate case conclusion

A

The best way to help ensure an appropriate case conclusion is to focus on the basic qualities of an investigation: objectivity, thoroughness, relevance, accuracy, and timeliness;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
284
Q

In every case effective and reliable investigations are…

A

Timely and accurate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
285
Q

What are the types of investigation

A

The types of investigation are :
1- incident investigation,
2- misconduct investigation,
3- compliance investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
286
Q

The initiation event in a private sector incident investigation is

A

Generally a security force incident report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
287
Q

Which investigation is one of the most common type of investigation

A

Incident investigation is the most common type of investigation in many business and organizational settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
288
Q

Who usually performs the incident investigation inquiry

A

The inquiry of incident investigation is often performed by a security supervisor or the security director rather than a full-time professional investigator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
289
Q

What is the most common form of workplace embezzlement

A

During an embezzlement investigation, cash disturbances are the most common form of workplace embezzlement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
290
Q

Who should approve the investigation protocol

A

Investigative protocol should be approved by executive management in order to lend credibility and authority to the process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
291
Q

The inquiry report of incident investigation is often a ……

A

Standardized from

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
292
Q

An important subcategory of constructive incident investigations is

A

The misconduct investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
293
Q

Write an important characteristic of workplace investigation

A

An important characteristic of workplace misconduct investigations is that they leave the employer particularly open to legal action by employees or former employees who feel they have been treated unfairly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
294
Q

What is the best way to prepare for misconduct investigation

A

The best way to prepare for misconduct investigations is to coordinate the matter as soon as possible with the human resources director and corporate legal counsel (or equivalent officials).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
295
Q

Does an experienced corporate investigator use techniques to induce an innocent person to confess guilt

A

Experienced corporate investigators do not use techniques that may induce an innocent person to confess to guilt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
296
Q

What are the suggested practices in misconduct investigation

A

The suggested practices in misconduct investigation include :
1- determine the proposed outcome or disciplinary action at the outset of the investigation,
2-use information sources both internal and external to the organization to help prove or disprove allegations,
3- gather relevant information from previous employers of the individual in question, 4- consider collecting electronic evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
297
Q

What can significantly impair the reputation of fairness in a corporate setting and thus damage the credibility of and confidence in the IU and individual investigator

A

The use of coercive interview techniques can significantly impair the reputation of fairness in a corporate setting and thus damage the credibility of and confidence in the IU and individual investigator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
298
Q

What is the main goal of an overt surveillance

A

The main goal of an overt surveillance is to prevent crime or misconduct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
299
Q

What are the focusing points of misconduct investigation

A

Misconduct investigations often focus on conflict of interest, corporate resource abuse, employee theft, workplace violence, and substance abuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
300
Q

If you are owner of a company, what are the decision you should take before misconduct investigation is initiated

A

Once a misconduct investigation has been initiated, the company must make several decisions. These decisions include:
1- whether any offense or infraction actually occurred,
2- whether reporting to law enforcement is required or appropriate, 3- how the employee will be notified of the findings and action to be taken

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
301
Q

What are the principal characteristics of internal theft

A

Principal characteristics of internal theft include diversion, conversion, disguise and divergence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
302
Q

What is the significant source of loss worldwide

A

Motivated by economic conditions, internal theft remains a significant source of loss worldwide.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
303
Q

Workplace violence investigation is generally considered one component of…….

A

An overall prevention/response/recovery program for workplace violence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
304
Q

The best prevention of exposure to workplace violence is ……

A

Pre-employment background investigation program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
305
Q

What are the results of substance abuse

A

On-the –job substance abuse costs include absenteeism, reduced productivity, accidents, theft, and increased healthcare costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
306
Q

Security and investigative professionals should remain alert to the …….

A

Possibility of false allegations regarding substance abuse and be prepared to take appropriate action in response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
307
Q

What is the purpose of corporate compliance program

A

The purpose of corporate compliance program is to protect the organization against violations of law, lapses in business ethics, and concomitant legal sanctions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
308
Q

A corporate compliance program encourages ……..

A

Enforcement, monitoring, and employee training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
309
Q

What is the key element of compliance program

A

Key element of compliance program is an effective reporting mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
310
Q

What can significantly reduce losses in most corporate and organizational environment

A

An effective hot line can significantly reduce losses in most corporate and organizational environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
311
Q

The efficacy of the hot line can be enhanced through …

A

An on-going awareness program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
312
Q

Records and database checks represent a………….

A

Key element of almost any investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
313
Q

What are the key component of an investigation

A

The collection, handling, processing, and use of evidence are a key component of investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
314
Q

What is meant by surveillance

A

Surveillance means observing the behaviour of another, usually secretly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
315
Q

The primary purpose of surveillance is to …

A

Obtain information about the identities or activities of those under investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
316
Q

What are the categories of surveillance

A

Surveillance can be broken down into three broad categories which are
Direct : Direct is covert
Preconstructive : Preconstructive is more public
Reconstructive : Reconstructive is reviewing information and evidence gathered from the other two techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
317
Q

What is ABC method

A

ABC method is conducted for foot surveillance and checkpoints in mobile surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
318
Q

Write about computer forensic

A

Computer forensic science is the science of acquiring, preserving, retrieving, and presenting data that has been processed electronically and stored on computer media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
319
Q

Define force multiplier in investigation

A

For investigative purpose, a force multiplier is any activity, capability, or resource that enhances the effectiveness or efficiency of the investigative function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
320
Q

What are the three important force multiplier in investigation

A

Three important force multipliers in investigations are

Human,
Environmental, and
Organizational.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
321
Q

What are the major cautions needed to be consider during online research

A

Three major cautions must be respected by the investigators while doing online research. These are:
1-invetigators and staff members may go off on a tangent, spending a great deal of time inefficiently by searching online for the sake of searching online,
2- there is a natural tendency to assume that information extracted from database or online sources is credible,
3- while most investigators enjoy searching the internet that may not be the best use of their time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
322
Q

Define liaison in investigation

A

Liaison in investigations comes in many forms: internal and external, formal and informal, and individual and organizational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
323
Q

Professional relationships are established through

A

Introductions, references, contacts(both formal and social), and mutual assistance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
324
Q

An excellent opportunity for establishing liaison contacts is through…

A

Professional and civic associations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
325
Q

In the global business environment, liaison relationships are …

A

Critical to effective investigations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
326
Q

What is required after a liaison is established

A

Once established

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
327
Q

A key asset of any investigator or IU is…

A

A good reputation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
328
Q

One high structured form of liaison isthe

A

Task force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
329
Q

When parochialism can occur

A

Parochialism can occur when joint task force members arrive with varying agendas, either individual or organizational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
330
Q

What is the result of parochialism

A

Parochialism inevitably causes conflict, whether explicit or subtle, and canseriously detract from the effectiveness of the unit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
331
Q

Is there any effect in reporting chain when JTF is established

A

Reporting chains can be confusing in the joint task force environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
332
Q

What is the result of reporting chain confusion

A

Reporting chains confusion can lead to the dissemination of fragmented and apparently contradictory information regarding task force progress, successes, needs, and relationships

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
333
Q

Can intelligence information play role of force multiplier

A

Intelligence information is a key force multiplier for IUs in almost in any settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
334
Q

Define the term “Operative”

A

The sub‐rosa aspects of the investigation centre on the true identity of the investigator, called the operative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
335
Q

What does the term “cold hire”

A

A cold hire means the investigator applies for a position and is processed just like any other applicant. This type of entry is preferred but is the least practical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
336
Q

What is the first task of an investigator after beginning of an undercover investigation?

A

relationship building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
337
Q

What is the most critical component of the entire undercover investigation

A

Interviews are the most critical component of the entire undercover investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
338
Q

What is the chief distinction between undercover and other types of investigations

A

The chief distinction between undercover and other type of investigations is that the undercover investigator neither conceals his or her presence nor attempts to operate unnoticed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
339
Q

What is buy bust

A

The buy‐bust is nothing more than arresting the perpetrator at the moment he or she is either buying or selling the property and question

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
340
Q

What is mean by conversion in terms of UI

A

Conversion means receiving money or property of another and fraudulently withholding or applying it to one’s own use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
341
Q

What is the most important activity for an undercover operative?

A

The most important activity for an undercover operative is learning the job and becoming familiar with surroundings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
342
Q

Who oversees the actual investigative casework

A

The project management team oversees the actual investigative casework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
343
Q

Who should be included in an undercover investigative team

A

Undercover investigative team should include:
1‐ a corporate decision maker,
2‐represenative from human resources,
3‐ a corporate security professional,
4‐ an attorney familiar with state and local employment law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
344
Q

What plays an important role in almost every successful theft investigation

A

Strategy and tactics play important roles in almost every successful theft investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
345
Q

What is the requirement of undercover investigation (in short)

A

Undercover investigation requires a highly structured process and flawlessly executed plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
346
Q

Who shouldn’t be used to play an undercover role

A

An employer should not use existing union employees in an undercover role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
347
Q

What is the most fundamental form of communication used in undercover assignments?

A

Written reports are the most fundamental form of communication used in undercover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
348
Q

What is critical to success of an undercover investigation

A

Knowing when and how to employ undercover investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
349
Q

What quality is essential for an undercover investigation

A

A qualified investigator from a reputable agency should be selected to conduct the fact-finding and drive the process of undercover investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
350
Q

How to avoid many problems during an undercover investigation

A

With proper planning and the necessary resource allocation many problems encounter during undercover investigation can be avoided

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
351
Q

What is the potential problem in an undercover investigation

A

The main potential problem in an undercover investigation is the possibility that the investigation will be exposed or communicated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
352
Q

What is the result of if employee made aware about undercover investigation before its completion?

A

If employees are made aware of an undercover investigation before its completion through some form of communication by management, morale and productivity may be adversely affected;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
353
Q

Who should be informed about undercover investigation in an organization

A

Only those with absolute need to know should be involved in or told of the undercover investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
354
Q

For what undercover investigation is preferred

A

Undercover investigation is the preferred method of investigating substance abuse and criminal activity in the workplace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
355
Q

Which investigation is least understood and most underused

A

Undercover is the least understood and most underused form of investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
356
Q

What is the chief distinction between undercover and other type of investigations

A

The chief distinction between undercover and other type of investigations is that the undercover investigator neither conceals his or her presence nor attempts to operate unnoticed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
357
Q

Undercover investigation should only be conducted when………

A

No other options are available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
358
Q

What is the requirement of an undercover investigation

A

Undercover investigation requires a highly structured process and flawlessly executed plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
359
Q

During undercover investigation, what is the result of professional pursuit of information?

A

The professional pursuit of information can lead to entrapment and may collide with personal need for safety, immunity, and privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
360
Q

Conversion means………

A

Receiving money or property of another and fraudulently withholding or applying it to one’s own use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
361
Q

Is it permissible to use an existing a union employee for undercover role?

A

An employer should not use existing union employees in an undercover role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
362
Q

What are the five distinct phases of undercover investigation?

A

Successful workplace undercover investigations unfold in five distinct phases:
1- planning and preparation,
2- information gathering,
3- verification and analysis,
4- disciplinary and corrective action,
5- prevention and education.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
363
Q

What is the key to an undercover investigation

A

Planning is the key to an effective undercover investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
364
Q

The risk embezzlement may be greater in an organization where……

A

The culture’s predominant value is economic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
365
Q

The objectives of an undercover investigation could include………

A

1-To identify the nature, scope, and perpetrators of a plan
2- to gather information so management can enforce its policies and take corrective action
3- to collect information in a way that is the least disruptive to the organization and its operations
4- to ensure the process provides the best return on investment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
366
Q

For the most part, today’s professional corporate undercover investigators are…….

A

Well educated, properly trained, and highly trained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
367
Q

Undercover investigators come in ………

A

All shapes, sizes, and colors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
368
Q

What are the personal factors to consider whether the undercover investigator fits to conduct the investigation

A

To ensure that the investigators fits in with the target audience, a number of personal factors should be considered, including sex, age, job experience, education, and ethnicity. In addition, the investigator should easily fit into the socioeconomic background and lifestyle of the workers he or she will be joining.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
369
Q

What are crucial for the successful outcome of an undercover investigation

A

Proper placement of the operative in undercover investigation is crucial to the investigation because the job selected must be one from which the mission’s objectives can be achieved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
370
Q

The most important activity for an undercover operative is ………..

A

Learning the job and becoming familiar with surroundings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
371
Q

What are some best internal positions for the undercover operative

A

Departments:
1-material handling
2- shipping and receiving
3- mailroom
4-customer service
5- uniformed security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
372
Q

The investigator can be placed into a cover position in two ways. These are……..

A

1- a cold hire
2- a controlled hire.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
373
Q

What is meant by cold hire in undercover investigation

A

A cold hire means the investigator applies for a position and is processed just like any other applicant. This type of entry is preferred but is the least practical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
374
Q

What is meant by controlled hire in undercover investigation?

A

A controlled hire means the employment process is manipulated covertly so that the operative is hired in the desired capacity and placed in the targeted location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
375
Q

When can information gathering phase begin

A

Once the client, the investigative agency, and the operative have agreed to the specifics of the undercover assignment, the information-gathering phase can begin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
376
Q

Who are included in the project management team of an undercover investigation

A

The project management team include:
1- the undercover investigator,
2- the project manager,
3- the client representative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
377
Q

Who can break the undercover investigation

A

The undercover investigator can make or break the investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
378
Q

Once undercover investigation begins, the investigator will first engage in …….

A

Relationship building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
379
Q

In which type of cases law enforcement can play a critical role (Undercover Investigation)?

A

Law enforcement agencies play a critical role in most workplace undercover investigations, in cases involving illegal drugs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
380
Q

What is the most fundamental form of communication during an undercover investigation?

A

Written reports are the most fundamental form of communication used in undercover assignments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
381
Q

One of the most popular formats for investigates reports today is ….

A

The structured narrative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
382
Q

How narrative reports are written

A

During undercover investigation, the narrative report is written in the third person, using descriptive text or “the operative” instead of in the first person using the pronoun “I”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
383
Q

The undercover investigative summary is written in the ……….

A

Third person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
384
Q

The frequency of undercover investigative summaries depends upon the needs and desire of ………….

A

The user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
385
Q

Does there any requirement of conventional or wireless communication in undercover investigation in these days?

A

Telephone communications, whether conventional or wireless, are a necessary component of today’s modern undercover investigations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
386
Q

The person designated to maintain and archive the closed case file of undercover investigation is called the…………

A

Custodian of record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
387
Q

What is the most critical component of the entire undercover investigation

A

Interviews are the most critical component of the entire undercover investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
388
Q

Interviews that follow an undercover investigation often begin with……….

A

Interviews that follow an undercover investigation often begin with those involved and work toward those less involved. This is done for a number of reasons, the most obvious being the perpetrators has already been identified by the operative and interviews of others before the interrogation of the suspect may tip him/her off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
389
Q

Once the discipline and corrective actions have been taken after undercover investigations, all files, records, tapes, and evidence should be provided to ……………

A

The case file custodian of record for storage and safekeeping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
390
Q

No discussion regarding employee misconduct is complete without…………

A

Mentioning prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
391
Q

Generally, workplace crime is a function of three fundamental elements, these are………

A

1- the quality of people the organization hires
2- the environment in which those people are placed
3- the quality of supervisor managing that environment and those people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
392
Q

Frequently, supervisor and manager are not equipped with the skills or tools necessary to prevent problems from recurring. What can help in this case

A

In this instance, education and training is the answer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
393
Q

What is the most frequently debated subject in undercover investigation

A

The timing of the removal of the operative from undercover operations is one of the most frequently debated subjects among undercover supervisors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
394
Q

The best time to remove the operative from undercover operations is ………..

A

Once he or she has been named as an offender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
395
Q

To remove undercover operative sooner from undercover operation sooner……….

A

Would only raise suspicions. If removed before the interviews begin, it will be clear to everyone that the person in question was an informant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
396
Q

Following a highly visible workplace investigation, communication should be open with…………

A

All levels of the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
397
Q

While undercover investigations can reveal a host of loss prevention issues, two types have become common in recent years, what are these two types?

A

1- drug investigations
2- theft investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
398
Q

Define entrapment?

A

Entrapment is best defined as including a person to commit a crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
399
Q

During the undercover operations, to overcome from any potential allegation of entrapment, what the operative should do?

A

The operative should qualify each person from whom he intends to purchase drug.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
400
Q

During undercover operations, the operative can qualify themselves from any potential allegation of entrapment through……

A

A simple report covering two points:
1- the operative should establish that behaviour or activity in question was pre-existing, or that the dealer has sold drugs previously
2- the operative should establish why the dealer wants to sell to him or her.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
401
Q

During the undercover operations, what are the guidelines for workplace drug purchases

A

The guidelines for workplace drug purchases to the operatives are:
1- qualify the dealer
2- coordinate with law enforcement
3- Buy down not up
4-makepurchase on company time
5-avoid actual drug use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
402
Q

To avoid any allegation of entrapment, what the operative should do

A

The operative should never invite another employee to commit criminal activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
403
Q

All workplace drug buys should be done under the control and supervision of …..

A

Law enforcement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
404
Q

In the workplace drug investigations, the operative should purchase the small quantity the dealer willing to sell. The employer must only demonstrate that …….

A

The dealer committed a policy violation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
405
Q

During workplace drug investigations, best or larger buys of drugs should be made……..

A

Near the conclusion of the undercover operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
406
Q

The focus of the workplace investigation should be workplace issues and misconduct, not the ……..

A

Enforcement of public law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
407
Q

How to preserve the operative’s credibility while working during an substance abuse undercover investigation?

A

To help preserve the operative’s credibility in the eyes of the client, routine drug testing should be done

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
408
Q

How you can prove an investigator is not a substance abuser

A

The result of periodic hair and urine testing can demonstrate that the investigator is not a substance abuser and has not used an illegal drug

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
409
Q

Does employee prosecution provides any return to the company

A

Surprisingly, employee prosecution rarely provides any return on the company’s investment. Disciplinary action is a preferred recours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
410
Q

Can undercover investigation be used to determine theft in workplace

A

Undercover investigations are often used to determine if theft is occurring at the workplace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
411
Q

Which investigation is mirror to any other undercover investigation

A

Theft investigations mirror any other undercover investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
412
Q

What can play a significant role in any theft investigation

A

Strategy and tactics play important roles in almost every successful theft investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
413
Q

In one of the most basic tactics used to investigate employee theft is

A

The operative appears to already be involved in some form of criminal activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
414
Q

A well-known undercover axiom says that where one finds substance abuse one will also find…………..

A

Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
415
Q

The prudent undercover investigator looking to solve a theft problem should first look for a…………

A

Substance abuse problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
416
Q

What is buy bust

A

The buy-bust is nothing more than arresting the perpetrator at the moment he or she is either buying or selling the property n question

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
417
Q

What is meant by sting operations

A

Sting operations usually involve elaborate setups and buy-busts. They might include the actual setup and operations of a business as a front or place where stolen goods are sold or traded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
418
Q

How invisible evidence markers are used

A

Invisible evidence markers are interesting products allow the user to surreptitiously mark property so that if it is stolen and then recovered its rightful owner can be identified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
419
Q

The most common and most economical form of corroborating evidence is……..

A

Videotape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
420
Q

What makes a drug investigation stronger

A

As in drug investigations, multiple buys from the thief makes the theft investigations make a stronger case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
421
Q

In theft investigation, the operative should purchase a…………

A

Minimal amount

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
422
Q

In theft investigations, how multiple purchase helps

A

Multiple purchases help:
1- eliminate the claim that the activity was spontaneous or an anomaly
2-help to prove that perpetrator is a true offender and not just someone who made a one-time mistake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
423
Q

What could be result of failing to exercise due diligence

A

Liability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
424
Q

Where is the origin of Due diligence

A

In the security industries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
425
Q

What is not a type of due diligence investigation?

A

Overt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
426
Q

Among the below which statement is incorrect about due diligence

A

Due diligence is a critical requirement for save time particularly transaction with OI parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
427
Q

What is critical to creating unbiased due diligence investigation

A

Verification of information from primary sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
428
Q

What is not included in the primary sources of information for due diligence investigation

A

News and media sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
429
Q

What is critical for a successful due diligence investigation

A

Communication between client and investigation firm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
430
Q

Which type of due diligence considers an acquisition in the context of its industry

A

Strategic due diligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
431
Q

The due diligence report should be

A

Coherent
Easy To Read and
Comprehensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
432
Q

The demand for international due diligence is heightened by ……….

A

a. Global economy
b. Terrorism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
433
Q

Common business usage defines due diligence as the investigative process for evaluating

A

A target company or a company’s assets for the purpose of acquisition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
434
Q

One of the most important reasons for conducting due diligence investigations is

A

To protect assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
435
Q

Verification information from primary sources is critical to creating unbiased due diligence. While a target may attempt to provide accurate data it is often skewed – sometimes inadvertently so. Information may be omitted – if a target wants a deal to reach a conclusion it will attempt to provide the most favourable information possible

A

One common error in due diligence investigations is relying on information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
436
Q

Comprehensive cohesive due diligence investigations are not only effective but also critical in weighing the advantages and disadvantages of mergers, recruitment, acquisitions investments and other deals

A

Comprehensive cohesive due diligence investigations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
437
Q

The first step in any due diligence investigation is to examine the issue at hand – the deal, the individual and the investment and understand what factors to focus on in order to find a solution

A

There is no single objective criterion for a due diligence investigation – the investigator must look at the question in hand and determine what is important for the particular problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
438
Q

There are numerous investigative resources for conducting due diligence investigations

A

Primary and secondary sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
439
Q

Communication between the client and the investigating firm is critical for a successful investigation. The client and the investigator should collaborate effectively to discuss the issues and determine what is the most important issue for the client

A

The client and the investigation firm should collaborate and discuss the issue what is important for the client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
440
Q

Traditional financial, legal and environmental due diligence is crucial to the success of any acquisition

A

This alone is not sufficient to predict long‐term success of any transaction. Instead a multi‐disciplinary approach is recommended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
441
Q

Strategic due diligence considers an acquisition in the context of its industry and asks – does it make sense to make this acquisition

A

This is the first step in the due diligence process. Strategic due diligence will provide the organization with the information to drive change and improve profitability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
442
Q

Financial due diligence analyses both quantitatively and qualitatively how an organization has performed financially in order to get a sense of their earnings in normal circumstances

A

It is crucial to look at the anticipation performance of a business as by the sense of there earning in normal circumstance’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
443
Q

What is due diligence investigation

A

Due diligence is” a measure or activity that is to be expected from a reasonable and person under the particular circumstances; not measured by an absolute standard, by dependent upon circumstance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
444
Q

What is the result if failure to exercise due diligence

A

A failure to exercise due diligence may sometimes result in liability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
445
Q

Common business usage defines due diligence as …..

A

The investigative process for evaluating a target company or a company’s assets for purpose of acquisition by a potential buyer/ acquirer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
446
Q

Due diligence loosely means………

A

Doing one’s homework on a particular subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
447
Q

Due diligence is originated in …….

A

The securities industry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
448
Q

What are the types of due diligence investigation

A

The types of due diligence investigations are financial, operational, covert, cultural, intellectual property, mergers and acquisition, human resources, legal information technology, and environmental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
449
Q

When due diligence investigations are valuable

A

Due diligence investigations are valuable in any situation where one or more parties deciding future actions or non-actions based on existing conditions or on represent a made by another party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
450
Q

The standard of due diligence investigation depends on…

A

The type of investigation, the goals of the investigation, the individual conducting the research, and the available information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
451
Q

What is emphasized in due diligence investigation

A

Diligence emphasizes the positive aspect of due care, while negligence describes the failure to exercise due care

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
452
Q

Failure to exercise due diligence-due care in investigation can result in….

A

Enormous costs to all parties involved, including the loss of money, and opportunities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
453
Q

One of the most important reasons for conducting due diligence investigation is………

A

To protect assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
454
Q

Does due diligence investigation has effect while transaction with other parties

A

Due diligence is a critical requirement for the protection of enterprise assets, particular transactions with outside parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
455
Q

Wider due diligence investigations may also examine……

A

A company’s strategy, information technology, operations, human capital, and culture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
456
Q

In due diligence investigation, the difficulty of obtaining the information depends on…….

A

The type of deal, and the type of information sought

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
457
Q

One common error in due diligence investigations………

A

Is relying on information from the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
458
Q

Verification of information from primary sources is critical to…….

A

Creating unbiased due diligence investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
459
Q

Comprehensive, cohesive due diligence investigations are not only effective but also critical in……….

A

Weighing the pros and cons of mergers, hiring, alliances, acquisitions, investments and other deals

460
Q

A good due diligence investigation is the necessary cornerstone for…….

A

Making a decision

461
Q

A poorly executed due diligence can………

A

Completely mislead parties

462
Q

While due diligence investigation does not guarantee the success of a venture, it provide ………

A

Valuable insights

463
Q

How a strong due diligence investigation can raise issues

A

At a minimum, a strong due diligence investigation can raise issues for further research verify or contradict given information, and point parties to new directions of information

464
Q

If the best practices are followed, the due diligence report serves as…..

A

A foundation for further consultation and negotiation

465
Q

What is the first step in any due diligence investigation

A

The first step in any due diligence investigation is to examine the issue at hand the person, the investment, etc and then understand what factors to focus on to answer problem

466
Q

The key to a good diligence investigation is to …

A

Understand the needs of the client and the transaction at hand

467
Q

What are the secondary sources of due diligence investigation

A

The secondary sources of information for due diligences investigation include:
1-government-maintained public records,
2-commercial record sources,
3- annual report other company records,
4- news and other media sources

468
Q

To receive the right type of service, the client of a due diligence company should provide ………….

A

Detailed background information and work closely with the firm.

469
Q

For a successful outcome of investigation what is critical

A

Communication between the client and the investigating firm is critical for a success investigation

470
Q

How should be the report of due diligence

A

The due diligence report should be coherent, easy to read and comprehensive

471
Q

The demand for international due diligence is heightened by…..

A

The global economy and terrorism

472
Q

What is crucial to the success of any acquisition

A

Traditional financial, legal, and environmental due diligence is crucial to the success acquisition.

473
Q

What considers an acquisition in the context of its industry

A

Strategic due diligence

474
Q

What is key component of merger and acquisition activities

A

Technology is a key component of merger and acquisition activities

475
Q

About 75 percent of all mergers and acquisitions fail to live up to expectations, this is often due to lack of ……………

A

An effective integration plan

476
Q

What are the facts that should be considered when conducting due diligence

A

It is crucial that when conducting due diligence, organizations consider all aspects to financial, operational, IT, and human capital – to assure a successful transaction

477
Q

Who can weak and havoc with an enterprise

A

A dishonest employee

478
Q

How a pre‐employment screening program benefits a business

A

1‐ it discourages applicants with something to hide and encourage applicants to be honest during the interview process,
2‐it demonstrate that a company has exercised due diligence, which may provide legal protection in a lawsuit and may also encourage good candidates to apply,
3‐ it ensures that a job candidate has the background, education, experience, and skills that he or she claims

479
Q

What are the factors that vary screening program from organization to organization?

A

1‐ Access to information,
2‐ nature of the position,
3‐ potential liability associated with incorrect performance of a job,
4‐ industry regulations

480
Q

Where is the focus of background investigation

A

A background investigation initially focuses on information provided by the applicant, which is typically found in the employment application, personal history questionnaire, résumé, and other biographical documents

481
Q

What is the goal of background investigation

A

A background check is a confirmatory type of investigation. This would include verification of information provided by an applicant, such as education and job history. The goal of background investigation or screening is to uncover information that an applicant might try to hide, such as criminal activity

482
Q

What are the resources required for any department in an organization assigned to conduct pre‐ employment investigation?

A

If any department in an organization assigned to conduct pre‐employment investigation, that department will need certain resources:
1‐ experienced and well‐trained investigative personnel,
2‐sufficient reference materials,
3‐ adequate communication

483
Q

What are the primary loss prevention strategies

A

Applicant screening and employee socialization are primary loss prevention strategies.

484
Q

What is the primary purpose of a background investigation

A

Prevent losses and mitigate damages

485
Q

What are common foundations of pre‐employment screening program

A

1‐ data collection,
2‐background investigation and screening,
3‐ data analysis and hiring decision.

486
Q

What is the standard of proof necessary to refuse to hire the applicant

A

Good faith

487
Q

What are the categories of application falsification? Write down the names where the red flags are putted in early application review

A

Application falsifications generally fall into two categories:
1‐wilful omissions of materials,
2‐misrepresentations of materials facts.

Red flags in early application review :
1‐ unsigned forms,
2‐incomplete addresses or post office box number,
3‐ conflicting dates of employment, education, or military service,
4‐ gaps in employment,
5‐ changes of occupation,
6‐ social security number variance(USA only),
6‐ommission of reasons for leaving

488
Q

What is the primary purpose of psychological test? Write down the names of psychological tests using in pre‐employment program

A

Make an employer informed hiring decision, Psychological test include:
1‐personality test,
2‐integrity testing

489
Q

During pre‐employment screening process, when all the screening results are returned the process of analysis of data begins

A

The process of analysis of data begins

490
Q

Write down in brief about a comprehensive, legally permissible, fairly executed background and pre‐employment screening program

A

A comprehensive, legally permissible, fairly executed background investigation and pre‐employment screening program is confirmatory and investigative in nature finds the most appropriate person of a particular job and can go a long way toward preventing losses and mitigating the damage caused by a bad hiring decision

491
Q

What is the most extreme form of workplace violation

A

Homicide, the most extreme form of workplace, is the fourth leading cause of fatal occupational injury

492
Q

Why legal counsel must review and endorse a pre‐employment screening and background program

A

Because of the myriad judicial and compliance issues associated with collecting and using personal information, legal counsel must review and endorse the program

493
Q

Write down the names of seven steps to a comprehensive pre‐employment screening policy?

A
  1. create clearly written, well defined job descriptions for all positions,
    2‐ assess the risk of each job classification in terms of reasonable(or foreseeable) potential for problems,
    3‐based on the preceding risk assessment, determine the scope of pre‐employment screening for each jobclassification,
    4‐ work with human resources and legal personnel to develop an appropriate hiring packet,
    5‐ establish criteria for evaluating information,
    6‐ communicate the pre‐employment screening policy and its purpose to the workforce,
    7‐ periodically review policy compliance
494
Q

What is the main source for data gathering? Where is the basic starting point for pre‐employment screening

A

The employer’s own application form must be the main source for data gathering and should be reviewed prior to conducting the pre‐hire investigation. Employment applications are the basic starting point for pre‐employment screening

495
Q

A background check is

A

Confirmatory type of investigation

496
Q

Why legislation in many countries is restricting pre‐employment evaluation

A

The main concerns are privacy and data protection.

497
Q

What is the best way to reduce internal theft?

A

Hire employees with integrity

498
Q

What are the primary things an organization shall do prior drug testing

A

Any organization conducting drug testing of any kind should have a clear, written policy outlining when testing will be conducted, how it will be conducted, and what the ramifications of test results are

499
Q

What are the categories of integrity or honesty test

A

a. Overt or direct testing
b. Indirect test

500
Q

Which test is considered as the most effective and quickest method of verifying background information

A

Polygraph testing

501
Q

Most common resources to conduct pre‐employment screening investigation

A

a. Security or asset protection department
b. Human resource department
c. Outside consumer reporting and investigative agency

502
Q

Quid pro quo

A

Give something in exchange for something else one receives

503
Q

Informants

A

Persons providing information, publicly or confidentially

504
Q

Suspect

A

A person who is believed to have committed an offense based on accumulated evidence, proximity to incidents etc

505
Q

Confrontational Interview

A

Confrontational questioning of a person suspected of committing an offense or serious breach of corporate policy

506
Q

Witness

A

Any person, other than a suspect, with information concerning an incident

507
Q

Pygmalion effect

A

A persistently held belief in another person such that the belief becomes a reality

508
Q

Stockholm syndrome

A

Emotional bond formed between hostages and their captor

509
Q

Define background investigation

A

A comprehensive, legally permissible, fairly executed background investigation and pre-employment screening program is confirmatory and investigative in nature finds the most appropriate person of a particular job and can go a long way toward preventing losses and mitigating the damage caused by a bad hiring decision

510
Q

Why legislation in many countries is restricting pre-employment evaluation and screening

A

The main concerns are privacy and data protection

511
Q

What are the primary loss prevention strategies

A

Applicant screening and employee socialization are primary loss prevention strategies

512
Q

The best way to reduce internal theft is to……..

A

Inventory management. Implement strict inventory management procedures, including regular stock checks and audits to ensure that all items are accounted for and that there are no discrepancies. This can help identify any missing items and deter employees from attempting to steal anything

513
Q

What can help minimize the risk of liability for improper hiring?

A

Pre-employment screening and investigation can help minimize the risk of liability for improper hiring

514
Q

Who will be held responsible for the on- duty or job-related negligence of employees?

A

It has been established that an employer will be held responsible for the on-duty or job-related negligence of employees

515
Q

Workplace violence is a serious concern for………

A

Security practitioners

516
Q

What is the fourth leading cause of fatal occupational injury

A

In the United States, homicide, the most extreme form of workplace, is the fourth leading cause of fatal occupational injury

517
Q

Everyone involved in a business- whether an owner or employee – is harmed by ……………

A

Workplace alcohol and drug abuse

518
Q

In the United States, the vast majority of current illicit drug users are…….

A

Employed

519
Q

The primary purpose of a background investigation is to…….

A

Prevent losses and mitigate damages

520
Q

From a legal perspective, pre-employment investigations provide organizations mitigation from…………

A

Negligent hiring and discrimination

521
Q

A pre-employment screening program benefits business in ……….

A

1- it discourages applicants with something to hide and encourage applicants to be honest during the interview process,
2-it demonstrate that a company has exercised due diligence, which may provide legal protection in a lawsuit and may also encourage good candidates to apply,
3- it ensures that a job candidate has the background, education, experience, and skills that he or she claims

522
Q

To develop effective background investigation and pre-employment screening program…………….

A

Upper management must first sanction and support the policy

523
Q

Ideally a team of security and human resource professionals should be tasked with ……………..

A

Developing and implementing the policy of background and pre-employment program.

524
Q

Because of the myriad judicial and compliance issues associated with collecting and using personal information, legal counsel ………………….

A

Must review and endorse the program

525
Q

Screening program vary from organization to organization, depending on few factors…………………

A

1- access to information,
2- nature of the position, and
3- potential liability associated with incorrect performance of a job,
4- industry regulations

526
Q

In today’s global business environment, security practitioners face unique challenges in ……………….

A

Obtaining and verifying applicant information

527
Q

What makes employee screening more complex

A

Global customs and compliance issues vary tremendously, making screening even more complex

528
Q

In the United States, access to personal information, such as credit, insurance and criminal history is governed by ………..

A

The Fair Credit Reporting Act

529
Q

What are the common functions of Pre- employment screening program

A

Pre-employment screening program have a common foundation:
1- data collection,
2-backgroundinvestigation and screening,
3- data analysis and hiring decision

530
Q

Write the seven steps of a comprehensive pre-employment screening policy

A

Seven steps to a comprehensive pre-employment screening policy :
1-create clearly written, well-defined job descriptions for all positions,
2- assess the risk of each job classification in terms of reasonable(or foreseeable) potential for problems,
3-based on the preceding risk assessment, determine the scope of pre-employment screening for each job classification,
4- work with human resources and legal personnel to develop an appropriate hiring packet,
5- establish criteria for evaluating information,
6- communicate the pre-employment screening policy and its purpose to the workforce,
7- periodically review policy compliance

531
Q

What described in job description

A

The job description describe:
1- the duties to be performed in a position,
2- the personal qualification required for the successful completion of those duties.

532
Q

What is crucial to the success of the pre-employment screening program

A

Because the requirements set out in the job description are the standards for preliminary screening of the applicant, an accurate, well-written job description is crucial to the success of the program

533
Q

The standard of proof necessary to refuse to hire the applicant is……..

A

Good faith

534
Q

A background investigation initially focuses on ……..

A

Information provided by the applicant, which is typically found in the employment application, personal history questionnaire, résumé, and other biographical documents

535
Q

What provides the first indication of whether an applicant is qualified for a position?

A

A résumé provides the first indication of whether an applicant is qualified for a position.

536
Q

It is important for a company not to accept a résumé in lieu of …….

A

An employment application or complete work history.

537
Q

What should be the main source of data gathering for employers

A

The employer’s own application form must be the main source for data gathering and should be reviewed prior to conducting the pre-hire investigation

538
Q

What is the basic starting point for pre-employment screening

A

Employment applications are the basic starting point for pre-employment screening.

539
Q

Who could be an excellent source of reference during pre-employment screening

A

During pre-employment screening, a former employer who still knows the subject would provide an excellent source of reference

540
Q

What is the most common pre-employment screening method

A

A criminal records check is the most common pre-employment screening method.

541
Q

What is an important tool in pre-employment screening process

A

The initial application review is an important tool in the pre-employment screening process

542
Q

What are the categories of application falsification

A

Application falsifications generally fall into two categories:
1- willful omissions of materials,
2-misrepresentations of materials facts

543
Q

What are the red flags in early application review

A

Red flags in early application review :
1- unsigned forms,
2- incomplete addresses or post office boxnumber,
3- conflicting dates of employment, education, or military service,
4- gaps in employment,
5-changes of occupation,
6- social security number variance(USA only),
6-ommission of reasons for leaving

544
Q

What length of gap in employment history should be investigated

A

All gaps in employment or life history, if more than one month should be investigated

545
Q

The initial interview during pre-employment screening provides

A

A chance to clarify any omissions

546
Q

A cooperative effort within the organization will result in……….

A

The optimum employee selection process

547
Q

What type of investigation a background check is

A

A background check is a confirmatory type of investigation. This would include verification of information provided by an applicant, such as education and job history.

548
Q

Background investigation or screening actively searches for……..

A

Information, performing such tasks as developing references or searching criminal records

549
Q

What is the goal of a background investigation

A

The goal of background investigation or screening is to uncover information that an applicant might try to hide, such as criminal activity

550
Q

Define pre-employment screening

A

Pre-employment screening is a process for determining whether a prospective employee is trustworthy or capable of performing the functions required for a particular job

551
Q

What you will include as the process of pre-employment screening

A

Pre-employment screening may include:
1- drug or alcohol screening,
2- psychological testing(personality and integrity testing),
3- general intelligence or aptitude testing,
4- medical screening and physical abilities tests, 5- polygraph tests

552
Q

The policy regarding drug testing must be communicated to…

A

All applicants and employees

553
Q

The main goal of psychological test is to………..

A

Help an employer make informed hiring decisions

554
Q

What are the types of psychological test

A

Psychological test include:
1-personality test,
2-integrity testing

555
Q

The personality test is particularly helpful in determining……

A

An applicant’s compatibility with a position

556
Q

Personality tests provide a psychological measure of an individual’s basic characteristics such as……….

A

Attitudes, emotional adjustment, motivations, interpersonal skills, and interests

557
Q

Define integrity or honesty testing

A

Integrity or honesty testing measures an applicant’s propensity toward undesirable behaviours such as lying, stealing, and drug or alcohol abuse

558
Q

Integrity or honesty testing is generally broken into…..

A

Two categories:
1- overt or direct testing,
2- indirect test

559
Q

Overt or direct integrity testing asks explicit questions about………

A

An applicant’s past dishonest acts or behaviours

560
Q

Indirect integrity testing examines concepts such as ……

A

Dependability and respect for authority

561
Q

The result of psychological testing should be used as only one of the factors in ………

A

Making a hiring decision

562
Q

What are the intelligence tests

A

Intelligence tests could consist of logic problems, word problems, pattern identification, or other kinds of questions

563
Q

What is aptitude test?

A

Aptitude test measure cognitive ability in a particular area, such as recall, vocabulary, or numerical perception

564
Q

What is the quickest method of background investigation

A

The polygraph testing is considered the quickest and most effective method of verifying background information on applicants

565
Q

To conduct pre-employment screening investigation, the three most common resources are ………..

A

1- security or asset protection department,
2- human resource department,
3- outside consumer reporting and investigative agency.

566
Q

If any department in an organization assigned to conduct pre-employment investigation, that department will need………

A

Certain resources:
1- experienced and well-trained investigative personnel,
2- sufficient reference materials,
3- adequate communication

567
Q

During pre-employment screening, when data analysis begins

A

During pre-employment screening process, when all the screening results are returned, the process of analysis of data begins

568
Q

The employment application should state that material omissions and misstatements are grounds to……

A

Terminate the employment process whenever discovered

569
Q

What will affect the future of background investigation

A

Privacy legislation will significantly affect the future of background investigations and pre-employment screening

570
Q

Pre-employment screening is an essential component of…….

A

Any good security program

571
Q

Purpose of an investigation

A

Objectively developing a reasonable conclusion based on the facts learned through the investigative process

572
Q

How to mark the nonverbal responses

A

Nonverbal responses include body movement and position changes, gestures, facial expressions, and eye contact. Nonverbal behaviour is internally motivated to reduce anxiety

573
Q

Does investigator want a second person in the interview room? Answer with the reason

A

The investigator may want to have a second person in the person in the room who can insulate the interviewer from potential accusations the interviewee and corroborate statements against interest, confessions, etc

574
Q

What is the key difference between an interview and an interrogation

A

In summary, a key difference between an interview and an interrogation is in the person being interview

575
Q

If you are conducting an interview is it permissible to record it without the consent of the interviewee?? What will you do under this circumstance?

A

When an interview needs to be recorded without the interviewee’s knowledge, prior consultation with legal counsel is critical

576
Q

Where the interview may be

A

An interview may be conducted in a private residence, on a street corner, or in a formal interview room

577
Q

What helps to demonstrate the financial ability of person who will be interviewed

A

Payroll files are helpful for evaluating the person’s financial stability

578
Q

When interviews become interrogation

A

A general rule of thumb is when the interviewee becomes a subject, target or the accused person in the interview, it becomes an interrogation.

579
Q

What the interviewer should do who is in doubt as to the proper course of action? What are the factors the interviewer should consider for planning the interview

A

An interviewer who is in doubt as to the proper course of action should consult with legal counsel

580
Q

What about the suspect who offers an evasive answer

A

A suspect who offers an evasive answer or an objection in response to a direct question does so because of an attempt to avoid the internal anxiety associated without right denial

581
Q

Who shouldn’t be considered for a long interview

A

A person who is physically debilitated or psychologically stressed should not be subjected to a lengthy interview

582
Q

Distinct the activities of truthful person and deceptive person during the course of interview

A

During the interview, the truthful person :
1‐ make general, sweeping denials,
2‐ offers unqualified, direct, and spontaneous answers,
3‐ exhibits a reasonable memory,
4‐responds to questions in a rational manner and a clear tone of voice

583
Q

What are the postures of truthful and deceptive people during an interview

A

The posture of truthful people during interview which are:
1‐ sits upright but not rigid,
2‐ positions himself or herself in front of the questioner,
3‐ leans toward the questioner when making a point,
4‐ appears relaxed and casual.

The posture of a deceptive people which are :
1‐ slouches or leans back in the chair,
2‐ sits unnaturally stiffly,
3‐ sits off to the side, not directly in front of the questioner,
4‐ pulls elbows close to the side, arms folded and locked in front, with legs crossed,
5‐ exhibits rapid and erratic posture changes

584
Q

According to chapter Interview & Interrogation what can have a serious effect on interview process

A

Age

585
Q

Give an example of cultural influence in interview

A

In Western cultures, eye‐to‐eye contact indicates sincerity. In Asian cultures, however ,eye contact with a person in a superior position is considered impolite. A person from an Asian culture might appear to be insincere in avoiding eye contact, but he or she may actually intend politeness

586
Q

What is key to a successful interview

A

Enlisting the cooperation of the interviewee is the key to a successful interview

587
Q

If you record information obtained from a person under the influence of alcohol or another substance is it reliable? If not then how you will validate it?

A

Information obtained from a person under the influence of alcohol or another substance is unreliable to some degree. A statement taken from such a person may be invalidated in a judicial proceeding

588
Q

What types of questions generally asked during an interview

A

In interviews, the two types of questions generally asked are open and closed

589
Q

What consisted theft triangle

A

The theft triangle consists of:
1‐ need or want (desire),
2‐ rationalization (motive), and
3‐ opportunity.

The interviewer should consider a number of factors in planning the interview which is:
1‐ location,
2‐ time factors,
3‐questioning order,
4‐ questions to ask, and
5‐ persons present

590
Q

What are the indicators of lying

A

Lie Signs:
1‐Tension‐relieving gestures, weak tone of voice, shifts in the chair, drops eye contact, crosses arms and legs into a closed posture, leans back in chair,
2‐ Quick and sudden movements or leaving the room while questioned,
3‐ Grooming gestures,
4‐ Placing hand over the mouth or eyes, crossing arms or legs, hiding hands or feet, holding forehead with hand, or placing the hands under or between the legs,
5‐Sits unnaturally stiffly,
6‐Avoids eye contact

591
Q

What happens if the interviewer and interviewee are of different sexes

A

It may be wise to include in the interview a witness of the same sex as the interviewee.

592
Q

How to accomplish rapport between interviewer and interviewee during an interview

A

During interview, the rapport between interviewer and interviewee can be accomplished by using hidden persuaders initiating a general discussion before direct questioning. During interview, maintaining eye contact with the interviewee by the interviewer promotes rapport

593
Q

If you are conducting an investigation how what will be your initial question

A

The initial question in the interview is normally a request for the interviewee to relate the events in the matter under investigation

594
Q

What do you understand by grooming gesture and cosmetic adjustment

A

Such gestures include rubbing and wringing the hands; stroking the back of the head; touching the nose, earlobes, or lips; picking or chewing fingernails; shuffling, tapping, swinging, or arching the feet; rearranging clothing or jewellery; dusting, picking lint from, or pulling threads on clothing; adjusting or cleaning glasses; and straightening or stroking the hair

595
Q

What are the three tools an investigator uses

A

The three tools that an investigator uses during an investigation are referred to as the three “I”s:
1- information,
2- interrogation,
3- instrumentation

596
Q

The principal tool of obtaining information is …….

A

The interview /interrogation

597
Q

What is considered as the most critical aspect of an investigation

A

Interviews of victims, witnesses, informants and confidential informants are considered the most critical aspect of an investigation as they are primary source of information

598
Q

The value of each interview or interrogation is based on ………..

A

The investigator’s knowledge, skills in eliciting information, and ability to evaluate the veracity of the information obtained

599
Q

The most prize talent an investigator can have is the……..

A

Ability to obtain information from individuals through questioning

600
Q

Throughout the process of interview or interrogation, it is vital to conduct interviews in accordance with ………

A

Statutes, regulations, and standards of fairness

601
Q

Information obtained from investigations can be used to…….

A

Improve loss prevention

602
Q

When an interview become an interrogation

A

A general rule of thumb is when the interviewee becomes a subject, target or the accused person in the interview, it becomes an interrogation

603
Q

Define an non-accusatory interview

A

An informational interview is non-accusatory, while the confrontational interview can be accusatory and is generally highly structured

604
Q

An undercover investigation in the workplace uses the terms

A

Administrative interview

605
Q

Define an investigatory interview

A

The investigatory interview is a complex, structured process used when the subject is known to have committed the offense alone or with others and the investigator has reason to believe the subject committed the offense

606
Q

What is an interview

A

An interview is a non-accusatory conversation in which both investigative and behaviour-provoking questions are asked in order to develop investigative information.

607
Q

What is an interrogation

A

An interrogation is an accusatory process designed to persuade the subject to tell the truth about his or her involvement in, or guilty knowledge of, the issue under investigation

608
Q

What is the key difference between an interviews and interrogation

A

In summary, a key difference between an interview and an interrogation is in the person being interview

609
Q

Define interrogation , confrontational interview or investigatory interview

A

An interrogation, confrontational interview, or investigatory interview is a very direct and sometimes accusatory session with a person suspected of committing an offense.

610
Q

Does general interview is a non-accusatory interview

A

General interview is a non-accusatory questioning of a person to gather information that pertains to the matter under investigation. All persons in an investigation should be interviewed- victims, witness, and suspects

611
Q

What is a confrontational interview

A

Confrontational interview is a questioning of a person suspected of committing an offense or serious breach of corporate policy. Also known as an interrogation. This process should be reserved for individuals whose involvement in the issue under investigation is reasonable certain

612
Q

Who is a suspect

A

Suspect is a person who is believed to have committed an offense based on accumulated evidence, proximity to the incident, motive, access to restricted areas, witness statements, etc

613
Q

In the most basic sense, the purpose of an interview is to……….

A

Aid an investigation into the truth

614
Q

In interview, questioning techniques should be ……….

A

Objective, factual questions focused on obtaining evidence

615
Q

The lease four objectives in an interview

A

1- to obtain valuable facts,
2- to eliminate the innocent,
3- to identify the guilty,
4- to obtain a confession

616
Q

The characteristic of general interview are

A

1-non-accusatory,
2- dialogue,
3- variable environment,
4-private/semiprivate,
5- guiltunknown,
6- no rights warning,
7- not lengthy,
8- cooperation,
9- unstructured,
10- some planning,
11- note taking acceptable

617
Q

The characteristics of confrontational interview

A

1-accusatory,
2- monologue,
3- controlled environment,
4- absolute privacy,
5- guilt indicated,
6- rights warning,
7- lengthy,
8- hostility,
9- structured,
10- extensive planning,
11-note taking inhibits

618
Q

To achieve the goal of the interview- truthful information-the interviewer must recognize……………..

A

The emotions and feeling of the interviewee

619
Q

What are the Maslow’s human needs

A

Maslow human needs are:
1- physiological or survival needs,
2- safety or physical and emotional needs,
3-affection needs,
4- esteem needs,
5- self-fulfillment needs.

620
Q

The theft triangle consists of

A

1- need or want (desire),
2- rationalization (motive), and
3- opportunity

621
Q

A major factor in obtaining a confession is the……….

A

Interviewer’s ability to help the offender form a socially acceptable rationalization for having committed the offense

622
Q

What sets the tone of the interview

A

The interviewer’s demeanor sets the tone of the interview

623
Q

What indicates professionalism and expectation of a successful interview

A

Making positive comments on the investigation, and the interview indicates professionalism and expectation of a successful interview

624
Q

By utilizing the floating point strategy of continuously re-evaluating a hypothesis as information is obtained, an investigator can…….

A

Adjust questions accordingly

625
Q

Give a characteristic of an inexperienced investigator

A

Inexperienced investigators often neglect the skill of listening when interviewing suspects.

626
Q

What are the characteristics of active listening

A

Active listening includes:
1- attentiveness,
2-concentration,
3-acceptance,
4-detachment,
5- and patience

627
Q

Enlisting the cooperation of the interviewee is the key to a…….

A

Successful interview

628
Q

The most important factor of a successful interview is…….

A

The ability of the interviewer to establish a favourable rapport with the interviewee.

629
Q

A good interviewer does not assume………….

A

An adversarial role but should remain an objective and neutral fact finder

630
Q

Untruthful interviewees often experience a ………..

A

High degree of stress during interviews

631
Q

An investigator should take a number of actions in preparation for an interview. What is the most critical of these preliminary actions

A

The most critical of these preliminary actions is to learn the case information thoroughly

632
Q

Optimally, before the interview ,the interviewer knows few elements in detail, what are these elements

A

1- who will be interviewed,
2- what the interview is about, and
3- the conditions under which the interview will be conducted

633
Q

How an interviewer can establish a rapport easily

A

With knowledge of some personal characteristics of the interviewee, the interviewer can establish rapport more easily with interviewee.

634
Q

What aids in accurate evaluation of the interviewee’s truthfulness

A

A proper understanding of the personal characteristics aids in accurate evaluation of the interviewee’s truthfulness

635
Q

Which type of investigator can go to great lengths to conduct a personality profile to identify an individual’s mental, emotional and psychological characteristics

A

Criminal investigators go to great lengths to conduct a personality profile to identify an individual’s mental, emotional and psychological characteristics

636
Q

What included in investigation action plan

A

Investigative action must be planned with the end in mind; possible civil or criminal actions should always be considered

637
Q

An interviewer who is in doubt as to the proper course of action should consult with ………….

A

Legal counsel

638
Q

The interviewer should consider a number of factors in planning the interview which is…………………

A

1- location,
2- time factors,
3-questioning order,
4- questions to ask, and
5- persons present

639
Q

The choice of interview site depends on…………

A

The nature and phase of the investigation, the apparent involvement of the interviewee, the issue of interviewee confidentiality, and the desired level of formality.

640
Q

A witness who has no other apparent involvement in the matter under investigation may be interviewed in………….

A

The office or at home

641
Q

Which location would be preferred for a subject who is expected to be uncooperative

A

For an interview with a subject who is expected to be uncooperative, a security office or interview room is the preferred location

642
Q

Flexibility and adaptability are required in…………

A

The selection of interview locations

643
Q

The need for interviewee confidentiality may dictate that the interview be conducted in…………

A

A discreet location

644
Q

Describe an interview room

A

The interview room should be free of unnecessary, distracting objects. A straight chair with a padded seat and back, and without rollers, should be provided for the interviewee

645
Q

Generally, during the interview the distance between the subject and the investigator should be………………

A

About five feet

646
Q

Why the interview subject should always have a clear path to the room’s exit

A

The interview subject should always have a clear path to the room’s exit. Otherwise, allegations of coercion or false imprisonment might be made and sustained

647
Q

To obtain accurate information, interviewers should interview only……

A

One interviewee at a time

648
Q

Write about time issues during an interview

A

Several time issues must be considered in interviews:
1- time since the incident,
2-time scheduled for interviews in other investigations,
3- availability of the interviewee,
4- availability for the interviewer,
5- anticipated length of the interview

649
Q

In an incident investigation, when should be the interview conducted

A

The interviews should be conducted as soon as possible after the event to capture witnesses recollections while they are fresh

650
Q

In a business situation, the interview should be conducted during ……..

A

Business hours when the interviewee is expected to be working

651
Q

Write the descending priority of questioning witnesses

A

Witness who should be questioned are, in descending priority : 1- persons who are not likely to be readily available later, 2- persons believed to have the most pertinent information concerning the matter under investigation, 3-pesons who are likely to be hostile witnesses.

652
Q

The offender or offending group or hostile witnesses is interviewed

A

Last.

653
Q

Can random questioning bring success to an interview

A

In general, random questioning is not productive and indicates a lack of professionalism, which the interviewee can readily observe

654
Q

Why the investigator may want to have a second person in the interview room

A

The investigator may want to have a second person in the person in the room who can insulate the interviewer from potential accusations the interviewee and corroborate statements against interest, confessions, etc

655
Q

If a witness to interview is present, he or she should sit to……..

A

The side of both the interviewee and interviewer and at a reasonable distance from them.

656
Q

If the interviewer and interviewee are of different sexes, it may be wise to include in the interview a witness of………….

A

The same sex as the interviewee

657
Q

If interviewee confidentiality is concern, the interviewee should sit…………

A

Facing away from the door

658
Q

Write about the use of audio or video tool during an interview

A

An audio or video recording of the interview is a valuable tool for confirming statements made by all persons present. It helps confirm the voluntary participation of the interviewee and preclude charges of coercion

659
Q

When an interview needs to be recorded without the interviewee’s knowledge, prior consultation with…………..

A

Legal counsel is critical

660
Q

If the interviewee does not consent and discreet recording is not feasible, the interviewer must take……….

A

Notes

661
Q

Write few elements an interview recording should capture

A

An interview recording should capture at least few elements :
1- consent of the interviewee at the beginning,
2- date, time, and place of the interview,
3- complete identification of the interviewee,
4- identification of all persons present,
5- statement of possible uses of the information furnished,
6- identification of persons leaving the room and time of exit,
7- identification of persons entering the room and time of entry,
8- start time, stop time, and purpose of any breaks,
9- reaffirmation of the interviewee’s consent to the interview and recording

662
Q

What are the primary question an interviewer should ask an interviewee before the interview begins

A

Before the interview commence, the interviewee should be questioned as to alcoholic beverages consumed within the last 24 hours and as to any medication taken. The interviewer should note the quantity of alcohol and the name and dose of any medication

663
Q

Someone who is excessively active, has dilated pupils, hasn’t eaten or slept in days may be under the influence of ………..

A

Amphetamines and at best unreliable

664
Q

Does they physical and psychological condition of the interviewee have an effect

A

The physical and psychological condition of the interviewee can have a profound effect on the reliability and admissibility of the information obtained

665
Q

What is Stockholm Syndrome

A

Hostage may form an emotional bond with their captors (known as the Stockholm syndrome) that render their interview suspect

666
Q

What is Pygmalion effect

A

An interviewer could have a Pygmalion effect on the interviewee influencing the behaviour. The Pygmalion Effect is a persistently held belief in another person such that the belief becomes a reality

667
Q

What is the main concept of Pygmalion effect

A

The main concept of Pygmalion Effect is that if you believe that someone is capable of achieving greatness, then that person will indeed achieve greatness

668
Q

A person who is physically debilitated or psychologically stressed should not be subjected to a ………

A

Lengthy interview

669
Q

Effect of prejudice in an interview

A

An interviewee’s prejudice toward an individual or group can contaminate the interview process and prejudice on the part of the interviewer will harm the entire process

670
Q

Give an example of tort of slander

A

It is tort of slander if an investigator deliberately and knowingly makes a false and damaging statement about the subject of an investigation

671
Q

Does age have any effect on interview process

A

Age can have a serious effect on the interview process. The investigator who spends a few extra minutes in friendly conversation may be rewarded with unexpected cooperation and detailed information

672
Q

What are the key steps to take at beginning of an interview

A

There are key steps to take at the beginning of an interview which are:
1- identifies the interviewee,
2- identify the interviewer,
3- clarify the interview topic, and
4- establish rapport

673
Q

The function of the interviewer is to ……….

A

Elicit information from the interviewee.

674
Q

What is essential to establish rapport during an interview

A

To establish rapport during interview, clear communication is essential, so a good rapport must exist between the interviewer and interviewee. A haughty or superior approach by the interviewer will to establish rapport between interviewer and interviewee.

675
Q

What should an interviewer do if an interviewee verbally attacks him / her

A

If an interviewee verbally attacks an interviewer, the interviewer should remain controlled, understanding, and non-judgmental

676
Q

What is “Yes Conditioning

A

Yes conditioning”, generally elicits an affirmative response and facilitates the cooperation of the interviewee

677
Q

During interview, the rapport between interviewer and interviewee can be accomplished by using………..

A

Hidden persuaders initiating a general discussion before direct questioning

678
Q

During interview, maintaining eye contact with the interviewee by the interviewer promotes……..

A

Rapport

679
Q

The interviewer should begin with what type of questions

A

Broad, general questions and then ask more specific ones

680
Q

The initial question in the interview is normally …………

A

A request for the interviewee to relate the events in the matter under investigation

681
Q

What are the common two types of questions asked during an interview

A

In interviews, the two types of questions generally asked are open and closed

682
Q

To put an interviewee at ease, the beginning of the interview should contain what type of question

A

“Closed” questions, which are specific questions that offer a limited number of possible responses

683
Q

In the primary phase of interview, what type of question can occur

A

A narrative type of question should occur

684
Q

The basic interrogatives (who, what, where, why, and how) are most useful in formulating………

A

Open-ended questions

685
Q

The open ended questions elicit a……….

A

Narrative answer, not a simple yes or no

686
Q

During the interview, the leading questions should be……..

A

Avoided.

687
Q

What are the verbal responses

A

Verbal responses include both spoken and gestures and also vocal characteristics a stone, speed, pitch, and clarity

688
Q

What are the non-verbal responses

A

Nonverbal responses include body movement and position changes, gestures, facial expressions, and eye contact

689
Q

Write few cautions that need to be respected during an interview process

A

During the interview process, few note of cautions need to be respected in regard to the verbal and nonverbal behaviour which are 1- no single word or nonverbal behaviour automatically means a person is lying or telling the truth,
2-the assessment of a subject’s truthfulness should be based on the overall behavioural pattern displayed, not on any single observation,
3- evaluation of behaviour symptoms should consider the subject’s intelligence, sense of social responsibility, and maturity,
4-some behavioural characteristics that suggest deception may also be displayed by a truthful subject who feels fear, anxiety, anger, or mistrust

690
Q

What are the indicators of truth

A

Indicators of Truth :
1- Answers are direct and spontaneous,
2-One answer for a given question,
3- Harsh, realistic words, such as rob, rape,
4-Speak clearly,
5- Exhibits a reasonable memory,6- Offers general denials

691
Q

What are the lie signs

A

Lie Signs :
1- Delays response or repeats question,
2-Evasive answers,
3-Irrational,fragmented sentences,
4- “memory problems”,
5- Use verbal “coatings”,
6- Overly factual answers,
7-Façade of religion or oaths,
8- Nervous laughter or wisecrackcamouflage,
9- Likely to challenge minute details of factual information offers very specific denials.

692
Q

Deceptive subjects respond to questions with…….

A

Complicated, detailed explanations that include factual information and are overly broad for the questions

693
Q

What are the characteristics of pathological liars

A

Pathological liars are likely to invent stories when relating the actual facts would be simpler and more convenient

694
Q

A verbal response coupled with nervous laughter or a wise crack is a common attempt to………….

A

Camouflage deception

695
Q

What are the signs of truthful person

A

During the interview, the truthful person :
1- make general, sweeping denials,
2- offers unqualified, direct, and spontaneous answers,
3- exhibits a reasonable memory,
4-responds to questions in a rational manner and a clear tone of voice;

696
Q

What are the signs of deceptive person

A

During the interview, the deceptive person :
1- offers very specific denials,
2- avoids realistic words,
3- makes seemingly irrelevant comments,
4- gives delayed, evasive, or vague answers,
5- exhibits an unusually poor, selective, or remarkable memory,
6-qualifies answers or users religion or oaths to supports statements, and
7- speaks in an irrational, fragmented, mumbled, or subdued manner

697
Q

Nonverbal behaviour is responsible for…….

A

More than half of the information and meaning of a message communicated in a conversation

698
Q

Physical activities of the deceptive person may be categorized into the general types…………

A

1- significant posture change,
2-grooming gestures and cosmetic adjustments,
3-supportive gestures

699
Q

Physical deceptive activities grooming gestures and cosmetic adjustments include………

A

1- rubbing and wringing the hands,
2- stroking the back of the head,
3- touching ,the nose, earlobes, or lips,
4-picking or chewing fingernails,
5- shuffling, tapping, swinging, or arching the feet,
6- rearranging clothing or jewelry,
7- dusting, picking lint from, or pulling threads on clothing,
8- adjusting or cleaning glasses,
9- straightening or stroking the hair.

700
Q

Physical deceptive activities supportive gestures include ……..

A

1- placing a hand over the mouth or eyes when speaking,
2- crossing arms or legs,
3-hiding the hands or feet,
4- holding the forehead with a hand,
5- or placing the hands under or between the legs

701
Q

The posture of truthful people during interview which are…….

A

1- sits upright but not rigid,
2- positions himself or herself in front of the questioner,
3-leans toward the questioner when making a point,
4- appears relaxed and casual

702
Q

The posture of a deceptive people which are……..

A

1- slouches or leans back in the chair,
2- sits unnaturally stiffly,
3- sits off to the side, not directly in front of the questioner,
4- pulls elbows close to the side, arms folded and locked in front, with legs crossed,
5- exhibits rapid and erratic posture changes.

703
Q

An important nonverbal sign is……….

A

The suspect’s degree of eye contact with the interviewer

704
Q

Deceptive people generally do not look directly at the interviewer; they look……

A

Down at the floor, over to the side, or up at the ceiling

705
Q

What is the cornerstone of any investigation

A

Evidence is the cornerstone of any investigative decision

706
Q

The interviewer who shows respect for the culture of the interviewee will establish ………..

A

Rapport more easily

707
Q

who developed BAI

A

The Behaviour Analysis interview (BAI) was first developed about 40 years ago by the John E. Reid, founder of John E Reid & Associates

708
Q

Define BAI

A

A BAI is a systematic evaluation of a subject’s verbal and nonverbal behaviour during the course of a structured interview in which both investigative and behaviour provoking questions are asked

709
Q

Common investigation questions are

A

Investigative questions are who, what, when, where, why, and how of the incident

710
Q

How you will define behaviour provoking question

A

Behaviour-provoking questions in a BAI are designed to draw out specific verbal responses or behaviour that can be studied to distinguish between a truthful person and a person who is lying

711
Q

Write few examples of behaviour proving questions

A

More than 30 behaviour-provoking questions have been developed and used during BAI’s.
The examples of these questions which are used in credit cards stolen investigation:
1- purpose question,
2- you question,
3- knowledge questions,
4-suspicion question,
5- vouch question

712
Q

Give an example of purpose question

A

Purpose question: what is your understanding of the purpose of this interview? The truthful response provides an accurate description of events. The deceptive subject’s response is a vague and nonspecific description of events

713
Q

Give an example of you question

A

It is the shortest distance to identifying the offender. The example is “over the past several weeks we have had a number of credit cards disappear from the bank and specifically the mail room. If you had anything to do with stealing these missing cards, you should tell us”.

714
Q

Give an example of knowledge question

A

Knowledge question: the example “do you know for sure who did steal any of the missing credit cards?” The truthful subjects often volunteer suspicion and the deceptive subject gives a brief, unemotional denial.

715
Q

Give an example of suspicion question

A

Suspicion question: the example “who do you suspect may have stolen these missing credit cards?” The truthful subject gives the question careful thought and a deceptive response without giving the question any careful thought

716
Q

Give an example of vouch question

A

Vouch question: the example “is there anyone with whom you work who feel is above suspicion and would not do anything like this? “The truthful subject will give the question thought and typically eliminate possible suspects and the deceptive one, will not vouch for others. This question is also known as a “trust question

717
Q

What is considered the most effective process for persuading a deceptive suspect to tell the truth

A

The Reid Nine Steps of interrogation process is considered the most effective process for persuading a deceptive suspect to tell the truth.

718
Q

The Reid Nine Steps of interrogation process is generally conducted only when……

A

The investigator is reasonably certain about the suspect’s involvement in the fact

719
Q

What are the steps of Reid Nine

A

The Reid Nine Steps of Interrogation process are :
1- Positive Confrontation,
2- Theme Development,
3-Handling Denials,
4-Overcoming Objections,
5-Keeping a Suspect’s Attention,
6-Handling a Suspect’s Passive Mood,
7-Presenting an Alternative Question,
8- Having the Suspect Relate Details,
9-Converting an Oral Confession

720
Q

Define positive confrontation phase

A

During positive confrontation phase, after an exchange of greetings, the interrogator confronts the suspect with an accusation of guilt. This type of accusation is made only when the suspect’s guilt seems very clear. Otherwise, the statement should be less direct. During positive confrontation phase, following the confrontation, the interrogator pauses to evaluate the suspect’s reaction to the statement and then repeats the initial statement of involvement. Then the interrogator sets the investigation file aside, sits down directly opposite the suspect, and makes a transition to a sympathetic and understanding manner.

721
Q

. How to handle denials

A

In handling denials, the interrogator should interject a blocking statement whenever the suspect inters an “I didn’t do it plea because the more often the suspect denies guilt, the more difficult it becomes to admit later

722
Q

How innocent suspect reacts during interview

A

The innocent suspect generally will not ask to make a statement but will, instead, without any display of etiquette, promptly and unequivocally maintain innocence

723
Q

Most suspect’s objection statements can be categorized in two general groups……….

A

1- trait objections,
2- factual objections

724
Q

Give example of trait objections

A

“I wasn’t brought up the way” or a person who would do something like that is really stupid” are example of trait objections

725
Q

Give examples of factual objections

A

“I don’t even have the safe combination, “I didn’t even know him”, or “I don’t need the money” are the examples of factual objections

726
Q

While converting an confession into written, what are the formats that can be used?

A

One of four formats can be used:
1- statement written by the suspect,
2- statement authored by the interrogator but read and signed by the suspect,
3- statement taken down by a secretary or stenographer and transcribed into a typed document for the suspect to read and sign, 4- recorded statement (audio or video) by the suspect

727
Q

How to reduce false confession

A

Provide alternate scenario & refrain suggesting answers and providing details

728
Q

What are other suspect Interviewing techniques

A
  1. The PEACE model ,
  2. The WZ non-confrontational method,
  3. The Kinesic Interview
729
Q

What is evidence

A

Evidence is that which provides proof or an indication of an assertion

730
Q

What are the forms of evidence appearance

A

Evidence appears in
1- oral,
2- documentary, and
3- physical forms

731
Q

What are the classifications of evidence that court considers

A

There are three classifications of evidence that the courts will consider, they are

Oral
Documentary
Physical form

732
Q

What are the basic categories of evidence

A

Testimonial - statements or the spoken word from the victim(s) or witness(es).
Physical - also referred to as real evidence, consists of tangible articles such as hairs, fibers, latent fingerprints, and biological material

733
Q

What is the fundamental difference between direct and indirect evidence

A

Direct evidence is first-hand knowledge and by contrast, indirect evidence is a highly informed inference

734
Q

Why indirect evidence also called circumstantial evidence

A

Indirect evidence is also called circumstantial evidence where something is inferred to have happen because testimony given on a series of events leads one to believe that it did have happened

735
Q

Whether hearsay evidence is director indirect? Does it admissible during trial

A

Hearsay evidence falls into the category of indirect evidence. Hearsay evidence is normally not admissible in a trial.

736
Q

What is “Materiality”? What does mean by it

A

The rule that applies most often in determining the importance of evidence and its ability to prove a point is called “Materiality”. Materiality means:
1- what are the quality and substance of evidence,
2- connection of evidence to the incident or case

737
Q

Write an exception to hearsay rule

A

An exception to the hearsay rule is when a person making the statement about what another person said made statements against self-interests

738
Q

What is “Res Gestae”

A

Res gestae (things done) is an exception to the rule against hearsay evidence

739
Q

What is the underneath belief of “res gestae”

A

Res gestae is based on the belief that because certain statements are made naturally, spontaneously and without deliberation during the course of an event, they leave little room for misunderstanding/misinterpretation upon hearing it by someone else and thus court believe that such statements carry a high degree of credibility.

740
Q

Which evidence can be admitted under the “Res Gestae”

A

Evidence which can be admitted into evidence as Res gestae fall into three headings:
1- words or phrases which either form part of, or explain a physical act,
2-exclamations which are so spontaneous as to belie concoction and, 3- statements which are evidence as to someone’s state of mind

741
Q

Why it is important to gather the evidence after an incident

A

After an incident, security practitioners should gather evidence carefully so that such evidence can be used to establish a timeline, resolve the issue, analyze how the incident occurred, and if necessary modify security measures to prevent future incidents.

742
Q

When the defense side is entitled to the information in criminal and non-criminal cases?

A

In both criminal and non-criminal cases the defense is entitled to the information during discovery

743
Q

What is the procedure of marking evidence

A

Evidence should be marked with the investigator’s initials at the time it is gathered

744
Q

What is the procedure of maintaining the chain of custody of evidence that was seized to present at trial

A

Limiting the individuals who handle the evidence to the smallest number possible and properly documenting each transfer will maintain the chain of custody and assist the prosecution when introducing in at trial as the same evidence that was seized.

745
Q

What is oral evidence? Is it director indirect?

A

Oral evidence is a spoken statement regarding a person’s knowledge, which may be direct or indirect and gained through any manner.

746
Q

What are the key points to remember during preliminary scene investigation?

A

During the preliminary scene investigation, it is necessary to preserve and document the scene, including information from witnesses and physical assets.

747
Q

During investigation after securing the scene what is the next step the investigator should take?

A

After securing the scene the investigators first calm the victim and attend to any injured persons

748
Q

During investigation after securing the scene what is the next step the investigator should take is to calm the victim and attend to an injured persons and what is the next step

A

Then investigator should do :
1-identify any perpetrators and detain them if still present at the scene,
2-determine what type of incident has occurred,
3- broadcast an updated description of incident, perpetrators, and vehicles,
4- verify the identityofwitness,
5- separate witnesses, and instruct them to avoid discussing details of the incident with other witnesses, 5- canvass the area for other witnesses

749
Q

What affect the accuracy of that information obtained by an investigator during the course of investigation

A

The manner in which the preliminary investigating officer obtains information from a witness affects the amount

750
Q

When interviewing a witness, the preliminary investigating officer should consider some approaches. What are these approaches?

A

These approaches are:
1- establish rapport with the witness,
2- inquire about the witness’s condition,
3-use open-ended questions, augmented with closed-ended questions, and avoid leading questions,
4- clarify the information with the witness,
5-documentinformation obtained from the witness, including the witness’s identity,
6-encourage the witness to contact investigators with any further information,
7-encourage the witness to avoid contact with the media or exposure to media accounts concerning the incident,
8-instruct the witness to avoid discussing details of the incident with other potential witnesses .

751
Q

In the course of developing rapport with witness, the investigator can learn about the witness’s…………

A

Communication style.

752
Q

What is the key to collect more information from a witness

A

If the preliminary investigating officer can establish rapport with the witness, then witness will be then more comfortable during the interview and will likely provide more be then more comfortable during the interview and will likely provide more

753
Q

What happens when the investigator inquire about the witness’s condition

A

When the investigator inquire about the witness’s condition, it helps to contributes to rapport and also alert the investigator to physical or mental conditions

754
Q

What allows for an unlimited response from the witness in his or her own words, thereby generating a greater amount of unsolicited information

A

An open-ended question

755
Q

Which type of questions tends to be more accurate and promote more effective listening on the part of the investigator

A

Open-ended responses Source

756
Q

What limits the amount or scope of information that the witness can provide

A

Close-ended question

757
Q

What should the investigator do if the witness is unresponsive to open-ended questions or provides imprecise responses?

A

The investigator should follow with more directed questions.

758
Q

What is the procedure for questioning witness during the beginning of every new topics?

A

For each new topic, the investigator should begin with open-ended questions and augment them with closed-ended questions if necessary

759
Q

Which of the below type of investigative question method suggest an answer and may distort the witness’s perception or memory

A

Leading Questions

760
Q

Why the independence of witnesses is important

A

So that investigators can judge whether the information they provided is consistent with other witness’s statements and other evidence developed in the investigation

761
Q

What maximizes the effectiveness of witnesses’ participation and interviewer efficiency

A

Preparing for an interview

762
Q

What the investigator should done before conducting interview

A

The investigator should:
1- review available information,
2- plan to conduct interview as soon as the witness is physically and emotionally capable,
3- select an environment that minimizes distractions and is comfortable for the witness,
4-obtain key materials,
5- determine the nature of the witness’s prior law enforcement, security, or corporate contacts

763
Q

Which type of statements can be used for corroboration

A

Independent witness statements

764
Q

What are the principles that underlie the interviewing of cooperative witnesses

A

1- social dynamic between the interviewer and witness,
2- facilitation of the witness’s memory and thinking,
3- communication between the interviewer and witness.

765
Q

How an interviewer can personalize an interview

A

The interviewer can personalize the interview by treating the witness as an individual.

766
Q

How to develop social dynamics

A

Social dynamic can be developed if the interviewer shows understanding and concern by asking about the witness’s health, empathizing with the witness

767
Q

A rapport between the interviewer and witness is especially helpful when ………….

A

The investigator seeks personal or intimate information from a witness

768
Q

To encourage the witness to volunteer information without prompting, what the interviewer should do?

A

The interviewer should do:
1- state expectations,
2- ask open-ended question,
3-avoid interruptions, and
4- allow pauses.

769
Q

During the interview, what discourage the witness from playing an active role and disrupt his or her memory

A

Interruptions

770
Q

Much of the information about an incident is stored in the …………..

A

Witness’s mind

771
Q

How the interviewer can promote information retrieval from witness

A

In several ways:
1- minimize distractions,
2- encourage the witness to mentally recreate the incident,
3- tailor questions to the witness’s narrative

772
Q

If the witness is thinking or talking about the perpetrator’s face, the interviewer should ask the questions about the……….

A

Face and not other aspects of the incident, such as license plate

773
Q

During the interviewing process, what are the issues that an interviewer is concerned

A

With many issues, such as resolving an incident, enforcing corporate rules, and preparing for civil litigation.

774
Q

For the most productive interview, both the interviewer and witness should

A

Communicate their needs and information to each other.

775
Q

Oral evidence is given great weight by……………

A

Jurors and judges alike

776
Q

It is important that investigator make no promises or offers of a reward to encourage a witness to make a statement, this will void the statement if discovered. What else could be result of this

A

It may also lead to a charge of witness tampering against the investigator

777
Q

What can sometimes determine the origin or authenticity of questioned writing

A

Examination of handwriting characteristics

778
Q

While examining handwriting characteristics, some factors can lead to inconclusive results. What are these factors

A

1- insufficient quantities of questioned or known writing,
2- lack of contemporaneous questioned and known samples,
3- distortion or disguise in the questioned or known writing,
4- insufficient identifying characteristics,
5-submissionof photocopies evidence instead of original evidence

779
Q

In obtaining a known sample of handwriting , what the investigator should do

A

1- give instruction( oral or written) only concerning the text to be written,
2- ensure that all exemplars are on separate pieces of paper,
3- ensure that the writer and witness initial and date each pages of writing,
4- do not allow the writer to see the previous exemplars or the questioned writing,
5- obtain exemplars from dictation until normal writing has been produced,
6- obtain exemplars from the right and left hands,
7- obtain hand printing exemplars in both uppercase and lowercase letters,
8-obtain exemplars written rapidly, slowly, and varied slants,
9- obtain a sufficient quantity of exemplars to account for natural variation in the writing,
10- obtain un-dictated writing, such as business records, personal correspondence, and cancelled checks.

780
Q

What are the types of false signature

A

1- traced signature,
2- simulated signatures, and
3- freehand signature

781
Q

While sipping documentary document, what the investigator should do

A

1- protect the evidence from inadvertent indented writing,
2- mark documents unobtrusively by writing the collector’s initials, date, and other information in pencil,
3-whenever possible, submit the original evidence to the laboratory, 4- refrain from storing or shipping photocopies in plastic envelopes

782
Q

How many categories, as an security investigator you can divide physical evidences? What are these categories

A

Physical evidence can be divided into five categories,
1- corpus delicti,
2-associative,
3-identifying,
4- tracing,
5- trace

783
Q

Corpus delicti relates to which types of evidence

A

The evidences that prove a crime has been committed, such as the body at a homicide scene.

784
Q

Associative evidence (also known as circumstantial evidence) links a suspect with the ………

A

Scene of a crime, such as fingerprints, or DNA

785
Q

What is tracing evidence

A

Tracing evidence are those article that assist in the possible identification and location of a suspect, such as a credit card receipt or a laundry mark or tag on a piece of clothing.

786
Q

Trace evidence that will undergo examination in the criminalities section or a crime lab includes……..

A

Fibers, paints, dyes, glass, and similar elements

787
Q

What is included as impression evidence

A

Impression evidence includes firearms, tool marks, bite impressions, and footprints.

788
Q

Success in the physical evidence increase when an incident scene search is planned, coordinated, and executed by knowledgeable security employees. What is required to coordinated, and executed by knowledgeable security employees

A

Must keep in mind:
1- the best search options are usually the difficult and timeconsuming,
2- physical evidence cannot be over documented,
3- a search may either a cautions search of visible areas or a vigorous search of concealed areas,
4-searches must be timely so that they are conducted while evidence may still be available.

789
Q

During scene search, the security professional in charge should take some steps first. What are the steps

A

1- discuss the search with involved personnel before arrival at the scene, if possible,
2- ensure that personnel are aware of the types of evidence usually encountered and the proper handling of the evidence,
3- make preliminary personnel assignments before arriving at the scene, if possible.

790
Q

What are the combinations of scene search team

A

The combination of scene search team are :
1- person in charge,
2- photographer,
3-sketch preparer,
4- evidence recorder,
5- scene supervisor

791
Q

What are the responsibilities of person in charge during a scene search

A

During the scene search, the responsibilities of person in charge are: 1- ensures scene security,
2- prepare administrative log,
3- conduct preliminary survey (initial walkthrough),
4- prepare narrative description,
5- resolve problems, and
6- make final decisions.

792
Q

What are the responsibilities of scene supervisor during a scene search

A

During the scene search, the responsibilities of scene supervisor are : 1- establish communication with the appropriate corporate executives,
2- obtain evidence collection and packaging material s and equipment,
3- prepare the paperwork to document the search,
4-provide appropriate protective clothing, communication, lighting, shelter, transportation ,equipment, food, water, medical assistance, and security for search personnel,
5- take extensive notes,
6- consider the safety of all personnel,
7- be alert for evidence.

793
Q

To secure and protect the scene, what the on-site team should perform

A

1- take control of the scene immediately,
2- determine the extent to which the scene has been protected,
3- designate one person to be in charge of final decision making and problem resolution,
4- take extensive notes,
5- keep out unauthorized personnel,
6-records who enter and leaves

794
Q

What is a tool for planning search

A

The preliminary survey is a tool for planning a search

795
Q

While producing narrative of the incident scene, what are the key points it should include

A

It should include key points which are:
1- case identifier,
2- date, time, and location,
3- weather and lighting conditions,
4- identity and assignments of personnel,
5-condition and position of evidence

796
Q

While doing incident scene search, photograph the most…………………

A

Fragile areas of the incident scene first.

797
Q

In incident scene search, the sketches are used to record

A

Location of items, conditions, and distance and size relationships.

798
Q

While making sketch during incident scene search, what it should include

A

It should include:
1- case identifier,
2- date, time, and location,
3- weather and lighting condition,
4-identity and assignment of personnel,
5- dimensions of rooms, furniture, doors, and windows,
6- distance between objects, persons, bodies, entrances, and exits,
7- measurements showing the location of evidence(in reference to two unmovable items),
8- key, legend, compass, orientation, scale, scale disclaimer, or combination thereof.

799
Q

Why the actual collection of evidence is most critical

A

The actual collection of evidence is most critical because during the time of physical evidence collection process most errors occur. That is why it is important to teach the proper process of securing a crime scene in any basic law enforcement or security officer training course

800
Q

The most common type of physical evidence is …………………

A

Fingerprints, so care should be taken to collect and preserve them first

801
Q

Two suggestions for physical evidence collection

A

During physical evidence collection process use a search pattern (grid, strip or lane, spiral) and search from general to specific

802
Q

During physical evidence collection process, photograph……………

A

All items before collection and notate the photographic log

803
Q

During physical evidence collection process, why it is required to arrange two persons in the place

A

To observe evidence in place, during recovery, and being marked for identification. Mark directly on the evidence when necessary, but first attempt to place identifying marks on evidence containers

804
Q

As a minimum, the best way to certify a piece of evidence is with…………

A

With the investigator’s initials

805
Q

What can establish the actual chain of custody for evidence collection

A

The proper marking of evidence at the time of seizure and transfer establishes the actual chain of custody

806
Q

For evidence to be admissible, what it must prove

A

It must be proven that the evidence was not tampered with, thus the chain of custody must be maintained and documented throughout the process to identify all the individuals whom came in contact with the evidence

807
Q

After the incident scene search, what should be done

A

Release the incident scene after the final survey

808
Q

On completion of the incident scene search, what should be noted in the release documentation

A

Note in release documentation:
1- the time and date of the release,
2-to whom the scene was released, and
3- by whom it was released

809
Q

On completion of the incident scene search, what is required to be ensured

A

Ensure that the evidence is:
1- collected according to legal requirements,
2-documented,
3- marked for identification

810
Q

On completion of the incident scene search who is the only person to allow to release the scene?

A

Only person in charge is allow to release the scene

811
Q

Why it is required to call the laboratory before packaging and shipping evidence

A

For specific instructions

812
Q

While shipping evidence completely seal the outer container, why

A

So that tampering with the container would be evident

813
Q

While shipping evidence, affix “EVIDENCE” and “BIOHAZAR” labels, if appropriate, on the inner container. If any of the evidence needs to be examined for latent prints, the inner container. If any of the evidence needs to be examined for latent prints, affix a……………

A

“LATENT” label on the inner container

814
Q

According to the U.S department of transportation regulations 49CFR 172.101, a trained and qualified evidence technician must assist with………….

A

Typing, labelling, packaging, and shipping of all hazardous materials

815
Q

What are the guidelines must be followed when shipping live ammunition

A

1- package and ship ammunition separately from firearms,
2- label the outside of the container “ORM-D, Cartridge, Small Arms, 3- note on the declaration of dangerous goods the number of packages and gross weight of the completed packages in grams.

816
Q

The process for determining whether a material is a hazardous waste should be done by ………………

A

Qualified personnel

817
Q

Hazardous materials that are removed from incident scene are considered evidence and would not fall under ……………….

A

RCRA waste provision

818
Q

What can be used to determine the general rifling characteristics such as calibre and physical features of the rifling impressions and the manufacturer of the bullets?

A

Fired bullets can be examined to determine

819
Q

What can be used to determine the calibre or gauge, the manufacturer, and whether there are marks of value for comparison

A

Examination of cartridge cases or shot shell casing

820
Q

What is used for estimating muzzle-to – garment distances during an investigation where bullet is fired

A

Pattern of gunshot residue can be duplicated using a questioned firearm and ammunition combination fired into test materials at known distance. These patterns serve as a basis

821
Q

Clothing with blood must be air-dried and labelled on the inner and outer containers. What should be written in the label

A

“BIOHAZARD”

822
Q

What can be used to determine the calibre or gauge and whether there are marks of value for comparison

A

Examination of unfired cartridges or shot shells can

823
Q

Examination of what can also determine whether the ammunition was loaded in and extracted from a specific firearm

A

Examination of unfired cartridges or shot shells can

824
Q

Examination of what can determine the gauge and the manufacturer

A

Wadding components

825
Q

During computer forensic examinations, generally submit only the

A

Central processing units and the internal and external storage media

826
Q

Two sources of DNA are used in forensic analysis. What are these two

A

These are:
1-Nuclear DNA,
2-Mitochondrial DNA

827
Q

As there are classifications of DNA, which type of DNA is typically analysed in evidence containing blood, semen, saliva, body tissue, and hairs that have tissue at their root ends

A

Nuclear DNA

828
Q

Which type of DNA is analysed in evidence containing naturally shed hairs, hair fragments, bones, and teeth

A

Mitochondrial DNA is typically analyzed

829
Q

The appropriate methods for collecting, packaging, and preserving DNA evidence depends on the……………..

A

Liquid or solid state and the condition of the evidence. The more the evidence retains its original integrity until it reaches the laboratory, the greater the possibility of conducting useful examination

830
Q

For DNA analysis, what amount of blood should be collected by the medical personnel?

A

Medical personnel shall collect at least 5 milliliter tubes of blood in purple-top tubes with EDTA as an anticoagulant

831
Q

What a blood examination request letter should contain

A

A blood examination request letter should contain:
1- brief statement of facts relating to the case,
2- claims made regarding the source of the blood,
3- whether animal blood is present,
4- whether the stains were laundered or diluted with other body fluids,
5-information on the victim’s medical condition or that of any persons of interest, such as AIDs, hepatitis, or tuberculosis

832
Q

What can determine whether particles of glass originated from a broken source of glass

A

Glass comparison examinations

833
Q

What can determine can determine the direction and type of the breaking force and the sequencing of shots.

A

Glass fracture examinations

834
Q

Why Hair analysis is used? What can be found from human hair analysis?

A

Hair analysis can determine whether hairs are animal or human. Race, body area, method of removal, damage, and alteration can be determined from human hair analysis.

835
Q

How many hairs are required for hair analysis

A

For hair analysis, collect at least 25 known hairs from different parts of the head or public region.

836
Q

Write about photogrammetry? Differentiate between a photogrammetry request and facial comparison request

A

Dimension can be derived from photographic images through the use of mathematical formulas or on-site comparison. Examples of photogrammetry include If a facial comparison is requested, ensure that the face or head fills more than half the frame. If photogrammetry is requested, include the dimensions of the scene to the nearest 1/8 inch and include a diagram or print from the surveillance film indicating the location of the measurements.

837
Q

What is the ideal place to develop latent prints

A

The laboratory is the best place to develop latent prints.

838
Q

Write down two considerations for taking photographic latent prints

A

While taking photographic latent prints use a 35 mm or medium-format camera with a macro lens capable of half-size to full-size reproduction and use T-Max 400 film, set the aperture of f/11 and use the metering system to select a suitable speed

839
Q

To investigate which types of incident lubricant examinations are conducted

A

Lubricant examination may be conducted in sexual assault, vehicular homicide, and heavy equipment sabotage cases

840
Q

Why metallurgical testing are used

A

Metallurgical testing of materials can determine whether inferior components were substituted in contracting frauds

841
Q

Why metal fragmentations examinations are used during investigation

A

Metal fragmentations examination can determine how metal fragmentations were formed. If fragments were formed by impulsive (short duration, high-strain rate)loading, it can be determined whether an explosive was detonated and what the magnitude of the detonation velocity was

842
Q

When product tampering are occurred

A

Product tampering occurs when a commercial product is internationally distorted to harm someone or for extortion purposes

843
Q

What are the considerations while taking incident scene photographs

A

While taking incident scene photographs, images should be taken using a 35mm or medium-format film camera. Color film may be preferable to black-and- white. In most ambient light situations, use 100 ISO film

844
Q

Impressions in snow are difficult to photograph, why? And what is can be the solution?

A

Because of lack of contrast. It is best to attempt to photograph the impressions as if in soil.

845
Q

If the evidence itself cannot be submitted to the laboratory

A

It can be cast with dental stone and the cast submitted to a laboratory

846
Q

A file of shoe manufacturers’ designs and a file of tire tread and the reference material can be searched to determine ……………

A

Brand names and manufacturers

847
Q

Which types of examination are used to disclose the presence of drugs and poisons in biological specimens

A

Toxicology examinations can disclose the presence of drugs and poisons in biological specimens and food products. The examinations can determine the circumstances surrounding drug- or poison –related incidents and accidents

848
Q

Biological evidence in drug-facilitated assaults must include a………….

A

Urine sample. The urine must be collected as soon as possible after the assault and not more than 96 hours after the alleged drugging

849
Q

What are determined by the authenticity examinations

A

Authenticity examinations are conducted to determine whether video recordings are original, continuous, unaltered, and consistent with the recording device used to make the recording

850
Q

Which types of examinations are used to maximize the clarity of the video signal through video processors and time base correctors

A

Enhancement examinations are conducted to maximize the clarity of the video signal through video processors and time-base correctors

851
Q

Special effects such as a mosaic can be added to video recordings to protect……….

A

A person’s identity

852
Q

During incident scene investigation, personnel operating in or around contaminated environments must be aware of the various ways in which hazards may enter and harm the body. These are …………..

A

Inhalation, skin contact, ingestion and injection

853
Q

How to avoid contamination during evidence collection process

A

In the evidence collection process, while personnel operating in or around contaminated environments, by applying proper work practices and by ensuring adequate ventilation it possible to minimize the risk of airborne contaminant inhalation.

854
Q

When respiratory protection is required during evidence collection

A

In the evidence collection process, while personnel operating in areas with airborne contaminants, respiratory protection must be worn. Only certified personnel are allowed to wear respiratory protection

855
Q

What are the consequence of contamination while evidence collection

A

In the evidence collection process, contamination through the skin can result from direct contact or by absorption. Systemic effects, such as dizziness, tremors, nausea ,blurred vision, liver and kidney damage, shock, or collapse, can occur when the substances are absorbed through the skin and circulated throughout the body

856
Q

Fundamental to the blood borne pathogens standard is the concept of

A

Universal precautions

857
Q

Under the blood borne pathogens standard, it is required to treat all blood, body fluids, or other potentially infectious materials as if infected with blood borne diseases. What are the example of blood borne diseases?

A

Hepatitis B virus (HBV), hepatitis C Virus (HCV), and human immunodeficiency virus(HIV).

858
Q

What is engineering control against contamination while evidence collection

A

As part of the universal precautions on blood borne pathogen safety engineering controls and prudent work practices can reduce or eliminate exposure to potentially infectious materials. Some examples of engineering controls include puncture-resistant containers used for storage and disposal of sharps and paints stirrers and long-handled mirrors for use in locating and retrieving evidence in confined or hidden spaces

859
Q

What can be done with Pyrophoric materials

A

Pyrophoric materials, such as phosphorus, sodium, and barium, can be liquid or solid and can ignite in air temperatures less than 130 degrees F (54 degrees Celsius) without an external source.

860
Q

What are Oxidizers and function

A

Oxidizers, such as nitrates, hydrogen peroxide, and concentrated sulfuric acid, are a class of chemical compounds that readily yield oxygen to promote combustion. They should not be stored with flammable and combustible materials or substances that could rapidly accelerate their decomposition

861
Q

What is the function of Material Safety Data Sheets

A

In the United States, Material Safety Data Sheets on various chemicals provide guidance on hazardous properties, disposal techniques, personal protection, packaging and shipping procedures, and emergency preparedness

862
Q

What is confined space

A

A confined space is an enclosed area that is large enough for personnel to enter and work but that has limited or restricted means of entry and exit.

863
Q

Nitrile provides protection from…….

A

Acids, alkaline solutions, hydraulic fluid, photographic solutions, fuels, lubricants, aromatics, petroleum, and chlorinated solvents. It also offers some resistance to cuts and snags

864
Q

Neoprene offers resistance to

A

Oil, grease, acids, solvents, alkalies, bases, and most refrigerants

865
Q

Polyvinyl chloride (PVC) is resistant to

A

Alkalies, oils, and limited concentrations of nitric and chromic acids

866
Q

What can lower the risk of developing latex allergies

A

Powder free gloves with reduced protein content will lower the risk of developing latex allergies. Personnel allergic to latex can usually wear nitrile or neoprene.

867
Q

When face shields offer better protection

A

Face shields offer better protection when there is a potential for splashing or flying debris. Face shields must be worn in combination with safety glasses or goggles

868
Q

Protective eyewear should be worn ………..

A

Over prescription glasses

869
Q

What include critical elements for the safe use of respiratory

A

Critical elements for the safe use of respirators include a written program, training, medical evaluation, fit testing, and a respirator-maintenance program

870
Q

From eye of a security employee what is describe the journey of testimony

A

Security employees can view testimony as a journey that begins with an incident; depends on procedures and reports; features judges, counsel, and witnesses, requires pre-testimony review, and ends with testimony given with full knowledge of the techniques of testifying and traps of opposing counsel

871
Q

Acceptance as an expert witness typically requires such measures as……..

A

Experience, education, teaching, research, and publication of articles in the field

872
Q

Lawyers are trained to look for inconsistencies in testimony and exploit them to their advantage. There are some types of inconsistencies that could lead a jury to believe witness is dishonest. What are these inconsistencies?

A

1- inconsistencies in the witness’s own statement,
2- inconsistencies between the witness’s different statements,
3- inconsistencies between the witness’s statement and what others said,
4- inconsistencies between the witness’s statement and other evidence.

873
Q

In the process of testimony, regarding body language and answering strategy issues, what witness should do

A

Witnesses should do :
1-look comfortable but do not slouch, rest head on hand, chew gum, play with earnings or moustache, or move around in the chair,
2- ask for a reason break or drink of water if needed,
3- speak authoritatively but not arrogantly,
4- answer questions directly but volunteer nothing,
5-be aware of time and distance distortions, as few people estimate accurately,
6- admit to meeting with counsel,
7- admit discussing the case with others, if the discussions are notprivileged,
8- keep an even temper even if opposing repeats the question numerous times with increasing incredulity,
9- make opposing counsel ask simple questions, not multiple questions within a question.

874
Q

During the process of testimony, when answering questions, witnesses should

A

Emphasize self-confidence, speak clearly and give positive, direct, and definitive answers whenever possible

875
Q

What are the elements security employees should be aware of while giving testimony

A

1-Counsel might try to gauge the witness’s ability to withstand serious crossexamination,
2-an attorney might summarize a witness’s answer in the attorney’s words,
3- counsel might violate rules of evidence and seek hearsay, conversation information, rumors, and opinions,
4- the attorney might ask for witness’s notes,
5- the attorney might ask trick questions

876
Q

What can help the security employee testify more effectively

A

Knowing what to expect of the opposition can help the security employee testify more effectively

877
Q

What is the dress Code for the Security Employees during testimony

A

While witness present to the court to give testimony, to be effective witnesses, security employees should dress appropriately for the jury and jurisdiction

878
Q

While giving testimony, security employee should strive to be …………..

A

Personable, charming, professional, polite, earnest, and knowledgeable and must also emphasize self-confidence

879
Q

When witnesses reveal their opinions in front of other witnesses, they raise the risk of ………………..

A

Impeachment problems (possibly due to a misinterpretation of their words) and may prematurely reveal their testimony to the opposition

880
Q

Write few notes about security witness incident site visit

A

The security witness should visit the incident site-ideally, in conditions similar to those prevailing when the incident occurred (time of day, time of year, lighting, either etc).

881
Q

Who is responsible for gathering of the evidence and chain of custody ofthe evidence?

A

The security employee should also be prepared to testify on the gathering of the evidence and the chain of custody

882
Q

What is the only way to ensure the evidence exists in its entirety as noted in e exists in its entirety as noted in descriptive documents and evidence taps?

A

If physical evidence will be used in court, the security employee should physically examine it during the pre-trail conference. This is the only way to ensure the evidence exists in its entirety as noted in descriptive documents and evidence tags

883
Q

What is examined by pre-testimony review examination

A

The proper pre-testimony review examines:
1- notes and reports on the incident,
2- evidence that is advisable, accessible, and retrievable,
3- documentary evidence from any subsequent actions or hearing

884
Q

What security employees must do before review their notes and discuss their testimony?

A

Before testifying, in any venue, security employees should review their notes and discuss their testimony with counsel including any concerns they have about a weak point in the case

885
Q

How witnesses can often detect how jurors view them and their answer

A

Through casual glance, witnesses can often detect how jurors view them and their answer

886
Q

How people experience in their life

A

People experience life through their sense(neurological); communicate primarily through spoken language(linguistic); and organize information and actions through a self-ordered mechanism called a program(programming);

887
Q

What is Neuro-linguistic programming

A

Witnesses may be able to communicate better with juries by using an interview technique called Neuro-linguistic programming

888
Q

For whom cross-race effect is especially important

A

The cross-race effect may make it especially important for security witnesses to build a rapport with the jurors and show themselves as knowledgeable

889
Q

Like most people, jurors are influenced by………..

A

Their personality, culture and life experience

890
Q

What is meant by voir dire

A

Juries consist of jurors, selected citizens required to render a decision based on the facts presented to them. Jurors are not professional arbiters of fact. Typically their names are drawn from the voter rolls in a jurisdiction. Once sworn in the jury candidates are put through a legal process known as voir dire where the attorneys and /or judge ask questions to determine their suitability to be on the jury for the trail in question.

891
Q

Who are the court room participants

A

The courtroom participants are judges, juries, counsel and witnesses

892
Q

What is meant by decess tecum

A

It is also important to have a pre-trial meeting were opposing litigants get together to exchange information that each believes is necessary to their position. They will request a deces tecum (produce all tangible evidence) from each other as well as written questions called interrogatories.

893
Q

The testimonial evidence the security professional will be presenting in court is call

A

” parole” or “ spoken word” and the attorney will want to make sure that It supports the case

894
Q

Shortly before testimony to the court, there is a need of preparation which may consist of …………

A

A site visit and a review of notes, reports, photos, and diagrams

895
Q

Why a incident has a better credibility than a mental recollection

A

An accurate and timely capture of facts and impressions of the incident in a report or notes is much credible than mental recollection, which is diminished and altered by time and events

896
Q

The testimony preparation starts with…………….

A

The accurate and timely capture of facts and impressions of the incident in a report or notes.

897
Q

The preparation of testimony begins………….

A

Long before thoughts of litigation.

898
Q

Who should provide relevant reports and notes to counsel?

A

Security employees should provide all relevant reports and notes to counsel

899
Q

Why witnesses (security employees)should examine the evidence first

A

Witness (security employees) should examine the evidence before taking the stand because its appearance may have changed and it may appear in a different order than expected.

900
Q

How security employees should mark evidences?

A

Security employees should mark evidence with their initials, the date, and a tracking or report number, in the same location whenever possible.

901
Q

Every security incident should be treated as …………….

A

If it could result in a courtroom appearance

902
Q

From the first day on the job, security employees should realize that their

A

Observations, reports, or findings, coupled with their demeanour and their ability to articulate events may be the key to the verdict.

903
Q

What is the basis of opinion by an opinion witness

A

An opinion witness may provide an opinion on the matter at hand, based on analysis of the evidence according to accepted scientific standards and scholarly research methods

904
Q

What are the skill / qualification to be accepted as an opinion witness(expert witness)?

A

To be accepted as an opinion witness, also known as an expert witness or forensic witness, one must demonstrate training, education, and experience in a specific subject

905
Q

What is hearsay witness? What is the exception associated with hearsay witness

A

Hearsay witness- relating what some other person may have said-may or may not be admissible

906
Q

Fact witness testimony is typically restricted to matters that……………..

A

The witness actually saw, heard, smelled, touched, or tasted

907
Q

Who should give a testimony

A

A person who gives testimony- a witness- is usually either a fact witness or an opinion witness. Security employees could be either

908
Q

How should be the testimony of security employees

A

Security employees’ testimony must always be truthful and at the same time follow court guidelines and counsel’s strategy

909
Q

Why security employees should learn the rules and processes related to giving testimony?

A

Because the experience of testifying in a courtroom can be intimidating

910
Q

When Security employees called for testify they should be paired with whom

A

Security employees called to testify are usually paired with legal counsel

911
Q

Security employees are often called to give testimony because of the incidents they encounter……………..

A

In their work

912
Q

Testimonial evidence generally represents………………….

A

Major portion of the evidence presented in court

913
Q

What is the main goal of an overt surveillance

A

The main goal of an overt surveillance is to prevent crime or misconduct

914
Q

What are the focusing points of misconduct investigation

A

Misconduct investigations often focus on conflict of interest, corporate resource abuse, employee theft, workplace violence, and substance abuse

915
Q

If you are owner of a company, what are the decision you should take before misconduct investigation is initiated

A

Once a misconduct investigation has been initiated, the company must make several decisions. These decisions include:
1- whether any offense or infraction actually occurred,
2- whether reporting to law enforcement is required or appropriate, 3- how the employee will be notified of the findings and action to be taken

916
Q

What are the principal characteristics of internal theft

A

Principal characteristics of internal theft include diversion, conversion, disguise and divergence

917
Q

What is the significant source of loss worldwide

A

Motivated by economic conditions, internal theft remains a significant source of loss worldwide

918
Q

Workplace violence investigation is generally considered one component of……..

A

An overall prevention/response/recovery program for workplace violence

919
Q

The best prevention of exposure to workplace violence is ……….

A

Pre-employment background investigation program.

920
Q

What are the results of substance abuse?

A

On-the –job substance abuse costs include absenteeism, reduced productivity, accidents, theft, and increased healthcare costs.

921
Q

Security and investigative professionals should remain alert to the …….

A

Possibility of false allegations regarding substance abuse and be prepared to take appropriate action in response.

922
Q

What is the purpose of corporate compliance program?

A

The purpose of corporate compliance program is to protect the organization against violations of law, lapses in business ethics, and concomitant legal sanctions.

923
Q

A corporate compliance program encourages ……..

A

Enforcement, monitoring, and employee training.

924
Q

What is the key element of compliance program?

A

Key element of compliance program is an effective reporting mechanism

925
Q

What can significantly reduce losses in most corporate and organizational environment

A

An effective hot line can significantly reduce losses in most corporate and organizational environments

926
Q

The efficacy of the hot line can be enhanced through…….

A

An on-going awareness program

927
Q

Records and database checks represent a………….

A

Key element of almost any investigation

928
Q

What are the key components of an investigation

A

The collection, handling, processing, and use of evidence are a key component of investigation

929
Q

What is meant by surveillance

A

Surveillance means observing the behaviour of another, usually secretly

930
Q

The primary purpose of surveillance is to …….

A

Obtain information about the identities or activities of those under investigation

931
Q

What are the categories of surveillance

A

Surveillance can be broken down into three broad categories which are
Direct,
Preconstructive, and
Reconstructive.

Direct is covert, Preconstructive is more public, and reconstructive is reviewing information and evidence gathered from the other two techniques

932
Q

What is ABC method

A

ABC method is conducted for foot surveillance and checkpoints in mobile surveillance

933
Q

Write about computer forensic

A

Computer forensic science is the science of acquiring, preserving, retrieving, and presenting data that has been processed electronically and stored on computer media

934
Q

Define force multiplier in investigation

A

For investigative purpose, a force multiplier is any activity, capability, or resource that enhances the effectiveness or efficiency of the investigative function.

935
Q

What are the three important, force multiplier in investigation

A

Three important force multipliers in investigations are
human,
environmental, and
organizational.

936
Q

Can intelligence information play role of force multiplier

A

Intelligence information is a key force multiplier for IUs in almost in any settings

937
Q

What is the result of reporting chain confusion

A

Reporting chains confusion can lead to the dissemination of fragmented and apparently contradictory information regarding task force progress, successes, needs, and relationships

938
Q

Is there any effect in reporting chain when JTF is established

A

Reporting chains can be confusing in the joint task force environment

939
Q

What is the result of parochialism

A

Parochialism inevitably causes conflict, whether explicit or subtle, and can seriously detract from the effectiveness of the unit

940
Q

When parochialism can occur

A

Parochialism can occur when joint task force members arrive with varying agendas, either individual or organizational

941
Q

One high structured form of liaison is the…..

A

Task force

942
Q

A key asset of any investigator or IU is…..

A

A good reputation

943
Q

What is required after a liaison is established

A

Once established

944
Q

In the global business environment, liaison relationships are ……

A

Critical to effective investigations

945
Q

An excellent opportunity for establishing liaison contacts is through…….

A

Professional and civic associations

946
Q

Professional relationships are established through……..

A

Introductions, references, contacts (both formal and social), and mutual assistance

947
Q

Define liaison in investigation

A

Liaison in investigations comes in many forms: internal and external, formal and informal, and individual and organizational

948
Q

What are the major cautions needed to be consider during online research

A

Three major cautions must be respected by the investigators while doing online research.
These are:
1-investigators and staff members may go off on a tangent, spending a great deal of time inefficiently by searching online for the sake of searching online,
2- there is a natural tendency to assume that information extracted from database or online sources is credible,
3- while most investigators enjoy searching the internet that may not be the best use of their time.

949
Q

What is the main challenge when analyzing audio recordings in a noisy environment during an investigation

A

Audio enhancement software may be unable to filter background noise effectively

950
Q

Which of the following is not a preservation method for digital evidence

A

Encrypting

951
Q

What is the primary limitation of using encrypted messaging services in a covert investigation

A

It can be difficult to establish the authenticity of decrypted messages

952
Q

What is the most significant limitation of using private surveillance footage as evidence in a criminal investigation

A

There may be privacy concerns about how the footage was obtained

953
Q

What is the primary challenge when interviewing a suspect who is a sociopath

A

Their tendency to lie easily and convicingly

954
Q

What is the primary risk associated with using undercover agents in corporate espionage investigations

A

They may become compromised and forced to reveal their true identity

955
Q

Which of the following is not a common method of fraud scheme

A

Phishing

956
Q

In complex financial fraud investigations, why is the collection of metadata often essential

A

It helps to establish the origin of digital communications

957
Q

Which type of evidence is considered that most reliable in a court of law

A

Physical evidence

958
Q

What is the primary legal concern when using location tracking apps as evidence in an investigation

A

Location data may require a warrant or consent to be admissable

959
Q

Why might suspects deliberately engage in overt communication during counter surveillance efforts

A

To overwhelm investigators with irrelevant information

960
Q

In a fraud investigation which tool is most effective for tracking illicit transaction across multiple jurisdictions

A

Data analytics

961
Q

What is the primary effect of opiates on the human body that makes them a focus of narcotics investigations

A

They function as depressants, often leading to abuse and overdose

962
Q

When analyzing digital evidence, how might a suspect use steganography to evade detection

A

By embedding hidden messages within seemingly benign images or files

963
Q

Which of the following is not a common method for ensuring the integrity of physical evidence

A

Immediate analysis

964
Q

In a sting operation, which of the following techniques is most likely to result in the successful prosecution of a suspect

A

Allowing the suspect to initiate all illegal activities

965
Q

Which of the following is not an element of criminal liability

A

Intention

966
Q

What is the primary benefit of using network analysis in fraud investigations

A

Mapping relationships between suspects

967
Q

During an interrogation, which of the following techniques is associated with the Reid technique

A

Offering alternative explanations for the suspects actions

968
Q

What is the primary objective of a forensic interview with a child witness

A

To gather accurate and reliable information

969
Q

In a cognitive interview what is the purpose of a using varied recall techniques

A

To trigger different aspects of memory

970
Q

In complex investigations, what is the most significant risk of using multiple cooperating witnesses

A

Witnesses may contradict each other, weakening the credibility of the case

971
Q

Which of the following is not a very digital evidence acuthencity

A

Encryption

972
Q

In an internal investigation, which of the following factors is most likely to invalidate the findings

A

Conflict of interest by the investigator

973
Q

Which of the following best describes corroboration in investigations

A

Verifying information through multiple sources

974
Q

Which of the following would be the most effective technique to use during a sensitive interview with a traumatized witness

A

The cognitive interview technique

975
Q

Which of the following is a not a typical method of surveillance

A

Direct confrontation

976
Q

Which type of evidence is typically most reliable in a corporate investigation involving employee misconduct

A

Documentary evidence

977
Q

Which interrogation technique is most likely to produce false confessions from vulnerable individuals

A

REID technique

978
Q

In which type of operation is it critical to ensure that the suspect initiated all illegal actions to avoid claims of entrapment

A

Sting Operation

979
Q

What is the main disadvantage of using narco analysis as part of a legal investigation

A

It may result in unreliable of fabricated information
It is legally inadmissible in most courts

980
Q

Some facts about drug users that may assist in recognizing problem areas during a drug investigation are set forth as follow. Indicate the one that is erroneous

A

Chronic abuse of drugs is generally not considered a symptom of mental or emotional illness

981
Q

Which of the following best descries a major challenge of conducting interviews with children using the cognitive interview technique

A

Heightened risk of false memories

982
Q

In the context of evidence collection what does contamination refer to

A

The introduction of foreign materials or tampering with evidence

983
Q

Which of the following is not a standard procedure for handling digital evidence

A

Analyzing the evidence on the original device

984
Q

In an interview based on the PEACE model, which phase is dedicated to summarizing and reflecting on the information gathered

A

Engage
Plan
Evaluate

985
Q

When conducting a financial investigation, why is it essential to understand the placement stage of money laundering

A

To detect when illegal funds are first introduced into a financial system

986
Q

Which of the following methods is most appropriate for protecting the integrity of digital evidence during the collection process

A

Creating a forensic copy, using write blocking technology

987
Q

Which of the following it the best way to manage investigation risks

A

Conducting a risk assessment
Implementing mitigation strategies
Monitoring investigation progress

988
Q

Which of the following is a potential drawback of undercover investigations

A

Legal entrapment claims

989
Q

How can a suspect use digital dead drops to evade detection in an investigation

A

By posting seemingly harmless files in public forums for later retrieval

990
Q

Which of the following is not a typical method for verifying the authenticity of a digital signature

A

Encrypting the signed document

991
Q

Which of the following is not a common method for analyzing financial statements in fraud investigations

A

Probability analysis

992
Q

When analyzing digital evidence which tool is often used to extract information from encrypted devices

A

EnCase

993
Q

In an internal investigation, which of the following actions could be considered an ethical violations by the investigator

A

Sharing confidential information with unauthorized individuals
Failing to disclose conflicts to interest
Leading the witness to a particular conclusion

994
Q

Which of the following is an example of physical evidence

A

A security camera recording

995
Q

Why is it important to secure any wireless networks in proximity to a target during a surveillance operation

A

To prevent the suspect from intercepting surveillance communications

996
Q

What is the most effective countermeasure to avoid being tracked via digital surveillance tools

A

Avoiding interaction with digital networks entirely

997
Q

In complex investigations, what is the most significant risk of using multiple cooperating witnesses

A

Witnesses may contradict each other, weakening the credibility of the case

998
Q

What is the primary purpose of root cause analysis in an investigation

A

Preventing future incidents

999
Q

Which of the following is not a common technique for collecting digital evidence

A

Conducting physical surveillance

1000
Q

In the surveillance operation, what is the primary risk of relying exclusively on one surveillance technique

A

It limits the ability to collect evidence from diverse perspectives

1001
Q

In digital forensics what is the primary purpose of a hash function

A

To generate a unique identifier for data integrity verification

1002
Q

Which type of interview technique is most effective in eliciting accurate memories from a witness with cognitive

A

The cognitive Interview Technique
The PEACE model

1003
Q

In the context of investigations, what does the term chain of custody refer to

A

The documentation of evidence handling

1004
Q

How might deep packet inspect (DPI) technology be used during a cyber investigation

A

To analyze the content of data packets transmitted across a network

1005
Q

During a financial investigation, how might shell corporations be used to obscure illicit activity

A

They are used to funnel money through layers of legitimate business transactions

1006
Q

Which of the following is not a method for validating the integrity of digital evidence

A

Chain custody of documentation

1007
Q

How does the Gramm Leach Bliley Act (GLBA) affect the handling of financial information in investigations

A

It mandates financial institutions to protect consumer information, limiting access without consent

1008
Q

Which of the following is not a type of forensic analysis used in investigations

A

Behavioral analysis

1009
Q

What is the primary role of an interviewer in the PEACE model

A

To facilitate the open and honest dialogue

1010
Q

Which of the following best describes the concept of a cold hire in undercover investigations

A

A suspect is hired without knowing they are under investigation

1011
Q

In drug investigations, what is a primary challenge when identifying hallucinogenic mushrooms (psilocybin)

A

They metabolize quickly and may not show up in standard drug tests

1012
Q

Which of the following best describes the principle of corroboration in investigations

A

Using multiple sources to verify information

1013
Q

What is the main challenge of using social engineering techniques in security investigations

A

Legal implications

1014
Q

Which investigative method is most likely to prevent bias

A

Using multiple sources of evidence
Blind interviewing techniques

1015
Q

Which is one potential limitation of mobile surveillance apps in investigations

A

The might drain the battery, alerting the suspect to the surveillance

1016
Q

What is the main disadvantage of relying solely on physical evidence

A

Susceptibility to environmental conditions

1017
Q

Which of the following is the most effective method for protecting digital evidence from tampering during transport

A

Sealing it in a tamper evident bag

1018
Q

Which of the following legal risks is associated with sting operations

A

The suspect might could claim entrapment in court

1019
Q

What is the primary function of an investigative audit

A

Verifying the accuracy of financial records

1020
Q

What is the main purpose of conducting a control hire in an undercover operation

A

To test the reliability of informants

1021
Q

Which of the following is not a fraud triangle component

A

Detection

1022
Q

What is the primary purpose of using root cause analysis in a workplace incident investigation

A

Understand the systematic reasons for the incident

1023
Q

Evidence of truthfulness relates to what specific words

A

Reference to rape, kill, steal

1024
Q

The greatest problem in investigation is

A

Objectivity

1025
Q

In a simple case what report may be the final and opening report

A

Initial report

1026
Q

What test determines a job candidates numerical perception

A

Aptitude test

1027
Q

An enquiry into the history and behaviour of an individual under consideration for access to sensitive assets is

A

Background screening

1028
Q

What enquiry can help recruit the right person to do a job

A

Pre-employment screening

1029
Q

What testing is recommended for applicant whose responsibility will be the haulage to distant trips in a company

A

Integrity test

1030
Q

What interviewee will give a specific denial

A

Deceptive interviewee

1031
Q

What type of questioning is recommended at the primary phase of an interview

A

Narrative types

1032
Q

Initiating a general discussion before direct questioning in order to accomplish rapport is achieved through

A

Hidden persuaders

1033
Q

What critical consensus must be made when operating a JTF from the onset

A

Defining critical information

1034
Q

What is best defined as inducing a person to commit a crime

A

Entrapment

1035
Q

What is the most misunderstood form of Investigation

A

Undercover

1036
Q

During an interview, what should generally be the distance between subject and the investigator

A

5 feet

1037
Q

The key difference between an interview and an interrogation is

A

The person being interviewed

1038
Q

All gaps in employment history, if more than what period should be investigated

A

30 days

1039
Q

Why are pre-employment and background screening conducted

A

Prevent looses and mitigate damages

1040
Q

What are the principle tool of obtaining information during an investigation

A

Interviews/Interrogation

1041
Q

How does thoroughness affect an investigation

A

Drawing a balance between an effort to follow every possible lead to its logical conclusion and gathering so much information

1042
Q

What are the three ‘‘I’’s that are referred to as the tools of the investigator

A

Information,
Interrogation,
Instrumentation

1043
Q

The…………………….. report can be a supplement to a progress report but it must be able to stand separately from the progress report

A

Special report

1044
Q

What is entailed in the theft triangle

A

Desire, rationalization opportunity

1045
Q

How does a security manager ensures he gets support in establishing the proprietary investigative unit

A

Show value to the organization and demonstration that the unit pays for itself

1046
Q

What makes a woman to continue to stay in an abusive relationship

A

Economic assistance

1047
Q

If a suspect made a sweeping statement during an interview what is he insinuating

A

Truthfulness

1048
Q

What is the usefulness of an investigation report in relation to corporate future planning

A

Points to systematic features the represent significant causal factors
Assist in taking informed decision to correct conditions that allowed the incident to occur in the first place
Creates synergy as results are used to resolve issues at hand

1049
Q

How can an investigator maintain good liaison relationship

A

Make sure each party derives some benefits without taking advantages of each other
Follow legal limits and agency regulations on maximum value of liaison gifts
Maintain contact regularly even when there is no specific information to exchange
Never violate the trust of a liaison contact

1050
Q

If during a theft investigation an issue of fraud was discovered what is the recommended action of the investigator

A

Focus on the initial objective of the theft investigation

1051
Q

In an applicant’s screening which process should be done last

A

Back grounding

1052
Q

A useful tool to determine whether to maintain or outsource the investigative unit is

A

Cost benefit analysis

1053
Q

The main source of data gathering in conducting a pre-hire investigation is

A

Application form

1054
Q

The theft triangle concept is

A

An explanation of why people steal

1055
Q

In retail investigation a negative variance between the book count and actual count of various items in inventory

A

Shrinkage

1056
Q

What is the cornerstone of any investigative decision

A

Evidence

1057
Q

A report written in the case of an investigation that gives an investigator update and the detail lead is

A

Progress report

1058
Q

What is the biggest challenge in investigating compliance issues in any organization

A

Getting employees to come forward and report wrong doing at all levels of investigation

1059
Q

In what way should background investigation be carried out

A

Covertly

1060
Q

The science of acquiring, preserving, retrieving and presenting data that have been processed electronically and stored is

A

Computer forensic

1061
Q

When should an investigator be taking notes during an interview

A

When it will have minimal distraction on the interview process

1062
Q

List the verbal behaviour of a truthful person

A

Makes general denial
Makes sweeping denials
Offers unqualified answers

1063
Q

The surreptitious placement of a property trained and skilled investigate in a workplace is

A

Undercover investigation

1064
Q

What is the situation where abductees develop interest in his or her kidnapper called

A

Stockholm syndrome

1065
Q

A suspect who uses very definitive statement is a sign of what

A

Truthfulness

1066
Q

What is the most critical attribute of an investigator

A

Communication skills

1067
Q

The first step the investigator should take before the interview is

A

Learn the case information thoroughly

1068
Q

In the U.S what legislation governs the process of background screening

A

F C R A

1069
Q

What is the major factor in the decision to outsource or maintain an internal investigative capability is

A

Cost

1070
Q

List the best approach to base investigation budget due to its difficulty to accurate prediction is

A

Basing budget estimates on historical data
Quantitative estimates of risk reduction
Support of organizational goals

1071
Q

Restitution figures in an investigative unit can help in demonstrating

A

Units return-on-investment

1072
Q

Providing guidance regarding possible violation of regulatory requirements is the primary goal of

A

Compliance investigation

1073
Q

What is the objective of an interview

A

To obtain valuable fact
To obtain a confession
To identify the guilty
To eliminate the innocent

1074
Q

In the most basic sense what is the purpose of an interview

A

Aid an investigation into the truth

1075
Q

The main purpose of an investigation is

A

Determine the truth in a matter under question

1076
Q

Which is considered the most priced talent an investigator can have

A

Ability to obtain information from individuals through question

1077
Q

This simple yet sophisticated format still presents information in chorological orders, but includes more details. It is note-worthy for its simplicity and reliability as its conversational in tone’’ what is been described

A

Structured narrative

1078
Q

What report documents events observed by the operative other than the normal happening in the course of the investigation

A

Special report

1079
Q

What are the basic steps in report writing

A

Gather the facts
Record the facts
Organise the facts
Write the report

1080
Q

A particularly important but often neglected type of investigation in the corporate arena is

A

Due diligence

1081
Q

The key to a successful interview is

A

Enlisting the cooperation of the interviewee

1082
Q

The most important factor of a successful interview

A

The ability of the interviewer to establish a favourable rapport with the interviewee

1083
Q

Adjusting questions during the interview accordingly by continuously re-evaluating a hypothesis as information is obtained is called

A

Floating point strategy

1084
Q

Which informant is most likely to provide false or biased information

A

Anonymous informant

1085
Q

List the most important resources required for background and pre-employment screening

A

 Asset protection department
 Human resource department
 Outside consumer reporting and investigative agency

1086
Q

This is used to exclude suspects from an investigative pool of subjects so as to conserve investigative resources. this is called

A

Profiling

1087
Q

A key but often overlooked step by the investigator in the protection of the investigation information is

A

Realistically determining what information at what phase of the investigation is sensitive and therefore warrants protection

1088
Q

The best way to reduce internal theft in an organization is

A

Hire employees with integrity

1089
Q

List the verbal behaviour of a deceptive person

A

Offers very specific denials
Avoids realistic words
Qualifies answers

1090
Q

Any activity, capability or resource that enhances the effectiveness or efficiency of the investigative function is called

A

Force multiplier

1091
Q

What in future will significantly affect the background investigation and pre-employment screening

A

Privacy legislations

1092
Q

What report details any leads that remains to be followed in an investigation

A

Progress report

1093
Q

In the U.S what percentage of illicit drug users are employed

A

74.9%

1094
Q

List red flags in the early job application review

A

 Unsigned form
 Gaps in employment
 Changes of occupation

1095
Q

In an investigative interview, who should be interviewed last

A

The offender or offending group

1096
Q

Before conducting an interview what is required of the investigator

A

Become familiar with all available historical information

1097
Q

A book keeper who works excessive hours and seldom takes a vacation may be engaged in what

A

Dishonesty

1098
Q

The most available and valuable source of information in an investigation is

A

Persons involved in the matter

1099
Q

An interview conducted with an employee who has defrauded the company of a large sum of money is

A

Interrogation

1100
Q

Why are interviews of interviews of victim, witness, and informant considered the most critical aspect of an investigation

A

They are the primary source of information

1101
Q

An effect on the interviewee influencing behaviour is referred to as

A

Pygmalion effect

1102
Q

A technique generally used to elicit an affirmative response and facilitate the cooperation of the interviewee is known as

A

Yes conditioning

1103
Q

The most cost-effective way of corroborating evidence is

A

Videotape

1104
Q

A report given at the beginning that every major points covered by the report requires at least one sentence and permits a quick assessment by the reader is

A

Synopsis

1105
Q

For ease of understanding the narrative portion of an undercover operative report should be written in

A

First person

1106
Q

What serves as the basis for post-investigation administration action

A

Written report

1107
Q

What are important force multipliers in investigation

A

Online-information sources
Liaison
Intelligence information

1108
Q

The best prevention of exposure to workplace violence is

A

Pre-employment background investigation

1109
Q

What is the principal characteristics of internal theft in a corporate arena

A

Conversion,
Diversion,
Disguise,
Divergence

1110
Q

What represents a key element of almost any investigation is

A

Records and database checks

1111
Q

The success of an investigator is sometimes measured by

A

Ability to interview/Interrogate people

1112
Q

ABC technique in investigation is adopted in which type of investigation

A

Foot surveillance

1113
Q

What category of investigation is a misconduct investigation

A

Constructive

1114
Q

A key element of any compliance program within an organization is

A

An Effective reporting mechanism

1115
Q

An important aspect of investigative management which often receives less attention than is warranted particularly in the corporate sector is

A

Protecting case-specific investigative information

1116
Q

Activities in the investigative functions that are often among the first items to become neglected especially when caseloads increase and time pressure is experienced is

A

Formal documentation

1117
Q

Most credible information on losses, sexual harassment and other problems comes from

A

Employee tips

1118
Q

In the U.S which law requires publicly traded companies to have as an integral part of the organization an effective compliance and ethics program

A

Sarbane-oxley Act of 2002

1119
Q

Most investigation units focus on a particular function or sets of functions these functions are generally referred to as

A

Types of investigation

1120
Q

The lifeblood of the investigative mission in any corporate sector is

A

Information

1121
Q

What is crediting one account with the money from another account

A

Lapping

1122
Q

The appropriation of property by a person to whom it has been entrusted is referred to as

A

Embezzlement

1123
Q

List where an undercover operative can be positioned

A

Uniform security
Customer service
Shipping and receiving

1124
Q

List the advantages of maintaining an internal investigative capability

A

Company exercise complete control of the investigative process
Better ability to protect sensitive
Much greater familiarity with the organization’s mission

1125
Q

The primary purpose of a private sector security investigator is

A

Protect the interest of the employing enterprise

1126
Q

This investigation should be the exception and not the rule and the technique should only be contemplated when no other options are available, which type of investigation is being referred to

A

Undercover investigation

1127
Q

Which is among the least accurate forms of investigative information

A

Eye witness account

1128
Q

A collection of photography’s taken of criminals and incorporated into a criminal database for future criminal identification by victims is called

A

Mug photo

1129
Q

An investigator who is corroborating important aspects of an investigation through different sources is trying to achieve what

A

Thoroughness

1130
Q

A credit card receipt is which type of physical evidence

A

Tracing

1131
Q

Tool mark is which type of evidence

A

Associative

1132
Q

A voucher a witness observed being forged by a book keeper is an example of which evidence

A

Real evidence

1133
Q

Fingerprints, bite mark or blood found at the scene are which type of evidence

A

Identifying

1134
Q

What type of evidence is finger print?

A

Impression evidence

1135
Q

What establishes the chain of custody of an evidence

A

The proper marking of evidence at the time of seizure and transfer

1136
Q

List the correct sequence of evidence collection?

A

Search
Photographing,
Recovery,
Marking,
Packaging

1137
Q

In collection of evidence most errors occur during

A

Collection of physical evidence

1138
Q

What supplements photography

A

Sketch

1139
Q

Whose responsibility is it to record the method of shipment and tracking numbers on the chain-of-custody form?

A

Security staff

1140
Q

Photographing the condition of evidence is done before

A

Recovery

1141
Q

A highly informed inference about an incident is an example by

A

Circumstantial evidence

1142
Q

That which provides proof or an indication of an assertion is an example of

A

Evidence

1143
Q

Information usually in the form of letters, figures and other marks are examples of POA

A

Documentary evidence

1144
Q

The best search options are usually

A

The most difficult

1145
Q

This is neither an asset nor liability of an organization but ownership stake. What is so being described

A

Corporate good will