The most appropriate form of communication used in undercover assignments is:
A. written
B. verbal
C. electronic
D. telephonic
正解:B
質問 2:
The most significant potential problem in an undercover investigation is the possibility that:
A. the criminal activity will continue after the Investigation is completed
B. the investigation will be exposed or compromised
C. there will be no financial recovery.
D. no criminal charges will result
正解:B
質問 3:
An individual with extensive experience, knowledge, and background m automobile paint is brought in to testify. This person is considered a/an:
A. lay witness
B. expert witness
C. direct witness
D. fact witness
正解:B
質問 4:
The four principle characteristics of internal theft scams are
A. diversion, conversion, disguise, and convolution
B. diversion, conversion, disguise, and divergence.
C. diversion, disguise, divergence, and dilution
D. diversion, conversion, illicit deceit, and defalcation
正解:B
質問 5:
in the FBI's Computer Analysis Response Team programs, the two-pronged approach to forensic examinations consists of investigations and
A. legal support
B. education
C. laboratory support
D. training
正解:C
質問 6:
Which type of security refers to the totality of all security and planning measures employed to ensure a successful outcome for a particular operation or activity, as well as the safety of the investigators involved?
A. Personal
B. Operational
C. Physical
D. Global
正解:B
質問 7:
When a suspect in a computer crime investigation has deleted computer riles, valuable evidence may still exist in the form of erased files. The data associated with these files can be preserved only through a:
A. hot bootup
B. cold bootup
C. bit stream backup
D. black box.
正解:C
高桥** -
受験直前までの仕上げ学習をガッチリサポート! Pass4Testさんの問題集はASIS-PCIていねい&わかりやすい解説