Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

PCI Professional Certified Investigator (ASIS-PCI) Questions and Answers

Questions 4

Which type of security refers to the totality of all security and planning measures employed to ensure a successful outcome for a particular operation or activity, as well as the safety of the investigators involved?

Options:

A.

Operational

B.

Physical

C.

Global

D.

Personal

Buy Now
Questions 5

The primary reason for an investigator to use closed questions at the beginning of an interview is to:

Options:

A.

encourage affirmative responses

B.

elicit a physical reaction

C.

put the intervieweeal ease

D.

limit the scope of responses

Buy Now
Questions 6

Which of the following is the term for receiving the money or property of another and fraudulently withholding or applying it for one's own use?

Options:

A.

Concealment

B.

Misrepresentation

C.

Conversion

D.

Representation

Buy Now
Questions 7

With regard to evidence searches, which statement is FALSE?

Options:

A.

search must be timely.

B.

Physical evidence cannot be overdocumented.

C.

A search may be either a cautious search or a vigorous search

D.

The best search options are the quickest and the simplest.

Buy Now
Questions 8

Undercover investigations should only be chosen as a preventive measure when no other alternatives are available and when

Options:

A.

the situation being investigated involves a specific department

B.

resources are limited

C.

union activity is suspected

D.

the company can reasonably expect a significant return on their Investment

Buy Now
Questions 9

The four principle characteristics of internal theft scams are

Options:

A.

diversion, conversion, disguise, and divergence.

B.

diversion, disguise, divergence, and dilution

C.

diversion,conversion, disguise, and convolution

D.

diversion, conversion, illicit deceit, and defalcation

Buy Now
Questions 10

Pocketing small amounts from incoming payments and then applying subsequent remittances on other items to cover the missing cash is an example of:

Options:

A.

replacement.

B.

fraud.

C.

kiting.

D.

lapping

Buy Now
Questions 11

Which of the following points does NOT support budget Justification for an investigative unit?

Options:

A.

Accurate and detailed tracking of Investigative cost

B.

Effective implementation of cost management measures

C.

Demonstration of restitution and recovery benefits

D.

Aligning investigative objectives to business strategic objectives

Buy Now
Questions 12

Physical evidence is often referred to as:

Options:

A.

demonstrative evidence

B.

substantive evidence

C.

indirect evidence.

D.

tangible evidence

Buy Now
Questions 13

in the FBI's Computer Analysis Response Team programs, the two-pronged approach to forensic examinations consists of investigations and

Options:

A.

education

B.

training

C.

legal support

D.

laboratory support

Buy Now
Questions 14

Altering a stock certificate to inaccurately list the owner of the certificate with intent to defraud is best described as

Options:

A.

false representation

B.

false entry in corporate records

C.

forgery

D.

identity theft

Buy Now
Questions 15

Once selected and sworn in. the jury is questioned by the attorneys and/or the judge about background and possible bias. This process is known as:

Options:

A.

voir dire

B.

habeas corpus

C.

corpus delicti

D.

prima facie

Buy Now
Questions 16

A Professional Certified Investigator (PCI) is investigating a theft and identifies the location and equipment used to hide the missing parts The PCI Is alone, takes pictures of the equipment, and returns to the office.What is the best procedure for the PCI to follow?

Options:

A.

Catalogue the evidence

B.

Include the pictures in the report

C.

Bring the subject of the investigation

D.

Exclude evidence from personal device

Buy Now
Questions 17

When coven physical surveillance is not possible, the investigator should

Options:

A.

attempt technical surveillance

B.

close the case file and report to the client/employer.

C.

switch to interviewing all subjects as soon as possible

D.

conduct physical surveillance, ignoring risk of disclosing the investigation

Buy Now
Questions 18

The mostsignificant potential problem inan undercover investigation is the possibility that:

Options:

A.

no criminal charges will result

B.

there will be no financial recovery.

C.

the criminal activity will continue after the Investigation is completed

D.

the investigation will be exposed or compromised

Buy Now
Questions 19

Under negligent hiring provisions, an employer can be held liable if the act committed by the employee is

Options:

A.

foreseeable

B.

preventable

C.

purposeful

D.

careless

Buy Now
Questions 20

Which of the fallowing is an exception to the hearsay rule?

Options:

A.

When the person making the statement about what another person said made statements against self-interest

B.

When the other person's statement was overheard by two or more reputable witnesses

C.

When the other person's statement was later put into writing by whoever overheard it

D.

When the other person is unavailable for the proceeding

Buy Now
Questions 21

The first priority o! any informant handling is the:

Options:

A.

knowledge and expertise of the informant.

B.

motive andreward of the Informant.

C.

reliability and trustworthiness of the informant

D.

security and safety of the informant

Buy Now
Questions 22

The operational level of investigative management includes overseeing

Options:

A.

investigative techniques, allocation of resources, and evidence management

B.

case load case assessment, and evidence management

C.

evidence management, case management protocols, and financial resources

D.

reporting formats. Investigative techniques, and evidence management.

Buy Now
Questions 23

How many measurements should be taken from a fixed object when annotating measurements of items on a sketch?

Options:

A.

One

B.

Two

C.

Three

D.

Four

Buy Now
Questions 24

'The fraudulent appropriation of property by a person to whom it has been entrusted, or into whose hands it has lawfully comesis the definition of;

Options:

A.

embezzlement

B.

maiteasance

C.

larceny.

D.

misappropriation

Buy Now
Questions 25

What is one of The three 'i's?

Options:

A.

intellect

B.

Intuition

C.

Initiative

D.

Information

Buy Now
Questions 26

Which of the following is characteristic of an experienced Investigative interviewer?

Options:

A.

Impatience

B.

Thinking ahead

C.

Inactive listening

D.

Detachment

Buy Now
Questions 27

formation considered to be indirect is:

Options:

A.

first-hand

B.

nor actionable.

C.

never admissible

D.

hearsay

Buy Now
Questions 28

Which of the following is NOT characteristic of an interrogation?

Options:

A.

Accusatory

B.

Extensive planning

C.

Dialogue

D.

Structure

Buy Now
Questions 29

A forensic entomologist may be called upon to determine an approximate time ot death when:

Options:

A.

drug overdose or poisoning is suspected

B.

the cause of death cannot be determined

C.

there is insect evidence in the corpse

D.

the person has been dead for several days before discovery.

Buy Now
Questions 30

Which of the following is a quality found in a positive interview attitude?

Options:

A.

Congruence

B.

Caution

C.

Conformance

D.

Conjuncture

Buy Now
Questions 31

What is the purpose of link analysis?

Options:

A.

Trace malicious software to its creator in criminal exploits

B.

Identify interconnections between people, places, and activities

C.

Track illegal money from Inception of criminal activity until it is laundered

D.

Examine suspects in an investigation to determine who committed the illegal act

Buy Now
Questions 32

Latent prints usually refer to:

Options:

A.

Impressions used for Identification purposes

B.

impressions that are left only by sweat

C.

Impressions made using Ink

D.

Impressions left at a crime scene

Buy Now
Questions 33

During the interview process,hidden persuaders may be used to establish:

Options:

A.

a judgmental attitude toward interviewees

B.

a positive attitude and rapport with interviewees

C.

the harassment and coercion of interviewees.

D.

the interviewer’s true agenda

Buy Now
Questions 34

Which of the following investigative methods used in robbery investigations is considered a reactive measure?

Options:

A.

Integrity test

B.

Stakeout

C.

Infiltration

D.

Crimescene investigation

Buy Now
Questions 35

One way to control the dissemination of case information is to:

Options:

A.

maintain a sequential file log

B.

maintain an attached cover sheet with the sensitivity level identified

C.

post completed reports only on company computers

D.

conduct a reporting analysis for distribution to the investigative team.

Buy Now
Questions 36

Barring a published employer policy to the contrary, when lockers are searched in the workplace, employees can expect privacy if the:

Options:

A.

employees supply their own locks

B.

locker door is closed

C.

employer supplies the lock

D.

lockers are open to every employee

Buy Now
Questions 37

When an investigator is attempting to match a photocopy with the machine that was used to make it. they should:

Options:

A.

secure all obtained exemplars in a plastic envelope.

B.

obtain at least ten exemplars with a document on the glass plate, with the cover up

C.

obtain at least ten exemplars with no document on the glass plate, with the cover down

D.

have a qualified technician remove the machine hard drive for examination

Buy Now
Questions 38

An anonymous employee contacts the ethics hotline and reports that a co-worker is selling drugs in the office. An investigation is initiated to determine if the allegations are true. What type of investigation is best suitedto obtain the necessary facts?

Options:

A.

Constructive investigation

B.

Undercover investigation

C.

Personnel background investigation

D.

Reconstructive investigation

Buy Now
Questions 39

Which statement is correct regarding the distribution and protection of investigative reports?

Options:

A.

Repents delivered by the Investigator to the company's attorney of record for retention will likely be protected from subpoena

B.

Reports cannot be protected item disclosure during the Judicial process using the attorney-client privilege

C.

The qualified privilege accorded an investigative report can be lost It it was not disseminated widely to all stakeholders

D.

The distribution of investigative reports should only come through the client since delegating it to the investigator or the client's attomey can result in the loss Of the attorney-Client privilege

Buy Now
Questions 40

A pretrial meeting that involves opposing litigants and alms to produce all tangible evidence is called a:

Options:

A.

voir dire.

B.

derogatory

C.

duces tecum

D.

mens rea

Buy Now
Questions 41

The preferred point of view for writing an undercover narrative report is the:

Options:

A.

third person

B.

first person.

C.

second person

D.

either first or second person

Buy Now
Questions 42

Primary reasons to protect investigative information include the potential for all of the following EXCEPT:

Options:

A.

damage to the careers of witnesses

B.

significant civil liability.

C.

damage to important relationships with other agencies or companies

D.

damage to the reputation of previously convicted individuals

Buy Now
Exam Code: PCI
Exam Name: Professional Certified Investigator (ASIS-PCI)
Last Update: Oct 15, 2025
Questions: 141

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99