Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

PCI PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

PCI PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Professional Certified Investigator (ASIS-PCI)
  • Last Update: Sep 12, 2025
  • Questions and Answers: 141
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

PCI Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

PCI Practice Exam Questions with Answers Professional Certified Investigator (ASIS-PCI) Certification

Question # 6

What is one of The three 'i's?

A.

intellect

B.

Intuition

C.

Initiative

D.

Information

Full Access
Question # 7

When an investigator is attempting to match a photocopy with the machine that was used to make it. they should:

A.

secure all obtained exemplars in a plastic envelope.

B.

obtain at least ten exemplars with a document on the glass plate, with the cover up

C.

obtain at least ten exemplars with no document on the glass plate, with the cover down

D.

have a qualified technician remove the machine hard drive for examination

Full Access
Question # 8

Primary reasons to protect investigative information include the potential for all of the following EXCEPT:

A.

damage to the careers of witnesses

B.

significant civil liability.

C.

damage to important relationships with other agencies or companies

D.

damage to the reputation of previously convicted individuals

Full Access
Question # 9

Which of the following investigative methods used in robbery investigations is considered a reactive measure?

A.

Integrity test

B.

Stakeout

C.

Infiltration

D.

Crimescene investigation

Full Access
Question # 10

A deceptive person is more likely to:

A.

qualify answers or use religion or oaths lo support statements

B.

make general, sweeping denials

C.

offer unqualified, spontaneous answers

D.

respond to questions in a rational manner and clear tone of voice

Full Access
Question # 11

John has accepted a management role in a new organization and has been requested to conduct aRisk Assessment. As partof that process he willneed to determine what the risks are thatcan affect the organization. This is called Risk Identification and will Identify?

A.

The acceptance or mitigation of the risk

B.

The source and potential impact of the risk.

C.

The likelihood and consequence of the risk.

D.

The investigative process used to address the risk

Full Access
Question # 12

Once a decision has been reached by the investigative team that an undercover investigation is necessary, the team must first

A.

develop a cover story for an undercover investigator.

B.

seek permission from Human Resources

C.

seek permission from executive management.

D.

seek an agency or vendor experienced in undercover investigations

Full Access
Question # 13

The "policy statement" of an investigative unit is a document that:

A.

outlines procedures for initialing and conducting investigations

B.

expresses the purpose for the creation of the unit

C.

establishes the rules governing prosecution

D.

create the strategy by which cases are conduced

Full Access
Question # 14

The practice of keeping data about sources of information is most commonly referred to as:

A.

carding

B.

filing

C.

holding

D.

securing

Full Access
Question # 15

For internal investigations, most credible information on losses, sexual harassment, and other problems are obtained through:

A.

undercover investigations

B.

covert cameras

C.

employee tips.

D.

pre-hire screening

Full Access
Question # 16

in the FBI's Computer Analysis Response Team programs, the two-pronged approach to forensic examinations consists of investigations and

A.

education

B.

training

C.

legal support

D.

laboratory support

Full Access
Question # 17

The primary purpose of a background investigation Is to:

A.

compile evidence that may be cause for termination at a later date

B.

prevent losses and mitigate damage

C.

differentiate between suspects and non-suspects

D.

risk suspects to other suspects

Full Access
Question # 18

Altering a stock certificate to inaccurately list the owner of the certificate with intent to defraud is best described as

A.

false representation

B.

false entry in corporate records

C.

forgery

D.

identity theft

Full Access
Question # 19

An undercover investigation has yielded enough information to allow the operative to be removed. What is the correct procedure m removing the operative?

A.

The operative should be removed with a plausible explanation, preferably when named as an offender

B.

The operative should be removed prior to any Interviews taking place with suspected offenders

C.

The operative should never remain in place even If their cover story has not been compromised.

D.

The operative should be removed as soon as possible

Full Access
Question # 20

The preferred point of view for writing an undercover narrative report is the:

A.

third person

B.

first person.

C.

second person

D.

either first or second person

Full Access
Question # 21

Undercover investigations should only be chosen as a preventive measure when no other alternatives are available and when

A.

the situation being investigated involves a specific department

B.

resources are limited

C.

union activity is suspected

D.

the company can reasonably expect a significant return on their Investment

Full Access
Question # 22

Anything thateffectively negates or reduces the ability of an adversary to exploit information or vulnerabilities is called:

A.

exposure

B.

risk avoidance

C.

a protection method

D.

a countermeasure

Full Access
Question # 23

When coven physical surveillance is not possible, the investigator should

A.

attempt technical surveillance

B.

close the case file and report to the client/employer.

C.

switch to interviewing all subjects as soon as possible

D.

conduct physical surveillance, ignoring risk of disclosing the investigation

Full Access
Question # 24

Subsequent reports that are added to an initial investigative report are called:

A.

progress reports

B.

special reports

C.

addendum reports.

D.

interm reports

Full Access
Question # 25

Which statement best describes the value of employee hotlines in the private sector?

A.

Employee hotlines are a cost-effective means to obtain information regarding employee misconduct, which investigative Units rely upon as a valuable information resource.

B.

An employee hotline leads to many false and malicious complaints.

C.

information obtained from employee hotlines cannot be considered credible when they relate to sexual harassment incidents because of the sensitive nature of the allegations associated with these complaints.

D.

While costly to maintain, corporations view employee hotlines as an important tool to identify employee misconduct, which often cannot be detected by other means.

Full Access
Question # 26

in an undercover investigation, the major reason to Involve legal counsel as part of the management team is to:

A.

assist in working with a prosecutor.

B.

assist in managing personality conflict among the management team.

C.

defend the investigator should the Investigator be sued

D.

protect the investigator's work product from discovery.

Full Access
Question # 27

An interviewer/interrogator is much more likely to gain the cooperation of an individual by exhibiting a/an:

A.

angry and aggressive manner

B.

cairn manner.

C.

Easygoingand lackadaisical manner.

D.

businesslike. impersonal manner.

Full Access
Question # 28

Which of the following is the term for receiving the money or property of another and fraudulently withholding or applying it for one's own use?

A.

Concealment

B.

Misrepresentation

C.

Conversion

D.

Representation

Full Access
Question # 29

What significant issue transcends strategic, operational, and case levels of Investigative management?

A.

Experience

B.

Ethics

C.

judgment

D.

Thoroughness

Full Access
Question # 30

When computer evidence is being seized, all of the following are priority objectives EXCEPT

A.

isolating the computer

B.

isolating power and phone connections.

C.

checking for physical traps

D.

Checking for CCTV surveillance

Full Access
Question # 31

Explanations of why people steal have historically referred to the Theft Triangle, which consists of:

A.

readily available items, the desire for emotional needs, and opportunity

B.

a desire,the need for self-esteem, and minimal punishment if detected

C.

a want, a low probability of detection, and a criminal inclination

D.

a need or want, rationalization, and opportunity.

Full Access
Question # 32

Oven surveillance is a technique best used to:

A.

deter criminal activity.

B.

conceal the location of a camera

C.

reduce necessary resources

D.

reduce the chance of being detected

Full Access
Question # 33

A retired police officer with experience as an investigator applies for a position as an investigator. During the interview, the applicant makes an inappropriate joke regarding race. With regard to the interviewer's decision of whether to hire the applicant, the joke should.

A.

not be taken into consideration, because the applicant's experience is more important than personal beliefs

B.

not be taken into consideration, because such jokes are generally not an indication of a person's beliefs

C.

be taken into consideration, because investigators must be able to operate in a multicultural environment

D.

be taken into consideration, because it is inappropriate to make jokes at an interview.

Full Access
Question # 34

By definition, the crime of "conspiracy" requires

A.

one or more persons profiting from an illegal act.

B.

an agreement by two or more persons to commit an illegal act.

C.

two or more persons committing a federal illegal act

D.

premeditation on by one or more persons to commit an Illegal act.

Full Access
Question # 35

The ultimate test of a good investigative report is that the report:

A.

results in a conviction

B.

is in the first person.

C.

includes a conclusion

D.

docs not cause the reader to have any questions

Full Access
Question # 36

The primary purpose of creating a crime scene sketch is to:

A.

assist investigators in documenting the crime scene and cataloging evidence

B.

assist prosecutors, judges, and juries during prosecution

C.

record the exact locations of pieces of evidence and their physical relation to other pieces of evidence and the surroundings.

D.

provide a permanent record of the crime scene in case theoriginal photographic evidence is lost or destroyed

Full Access
Question # 37

if criminal activity occurs within the enterprise, the Interest of the private sector may be best served by:

A.

relying solely on the public sector enterprise to handle the criminal activity.

B.

accepting restitution or taking administrative or employment action

C.

not exposing criminal activity to the media

D.

always terminating the employee involved in the criminal activity.

Full Access
Question # 38

When an interviewer is seeking a confession, it Is most important to:

A.

stress the importance of the matter under investigation

B.

consider the interviewee's behavioral indicators of deception

C.

help the interviewee to rationalize actions and avoid embarrassment

D.

convince the Interviewee that it is futile to avoid confessing

Full Access
Question # 39

When testifying in court. Investigators are NOT subject to:

A.

berating

B.

juror scrutiny.

C.

intense questioning

D.

second-guessing by attorneys or other officials

Full Access
Question # 40

A special report documents:

A.

the overall investigation and its primary conclusion

B.

the need for an investigation and the costs associated with it

C.

elements of the crimes committed and the theories involved

D.

an action other than normal in the course of the investigation

Full Access
Question # 41

A subsidiary fact from which theexistence of the ultimate fact in determining whether guilt or innocence may be inferred is whichof the following kinds of evidence?

A.

Circumstantial

B.

Real

C.

Testimonial

D.

Admissible

Full Access
Question # 42

'The fraudulent appropriation of property by a person to whom it has been entrusted, or into whose hands it has lawfully comesis the definition of;

A.

embezzlement

B.

maiteasance

C.

larceny.

D.

misappropriation

Full Access