Deck 9: Investigations, Intelligence Operations, and Reporting

Full screen (f)
exit full mode
Question
An investigation is warranted when:

A) An accident occurs.
B) Unexplainable property losses are discovered.
C) Personal misconduct is reported.
D) Criminal activity is observed.
E) All of the above.
Use Space or
up arrow
down arrow
to flip the card.
Question
In a security and protective services environment, investigations are conducted to:

A) Ensure compliance.
B) Support litigation.
C) Prevent accidents.
D) Trace and locate criminals.
E) All of the above.
Question
Human resource investigations include all but which of the following areas?

A) Employee backgrounds
B) Workplace violence
C) Employment discrimination
D) Legal drug use
E) All of the above are the subject of human resource investigations.
Question
As part of a due diligence inquiry, an organization should verify an applicant's ________ and any other information contained in an employment application.

A) Criminal history
B) Credit history
C) Employment history
D) Academic history
E) All of the above.
Question
________ injuries are attributed to a single act or event rather than development of the injury over an extended period of time.

A) AOE
B) BOE
C) COE
D) DOE
E) All of the above.
Question
Employees who abuse substances in the workplace may:

A) Suffer or cause injuries.
B) Damage property.
C) Have a propensity to steal.
D) Experience poor attendance.
E) All of the above.
Question
As a possible defense to a wrongful termination lawsuit, an employer should present proof of all but which of the following?

A) A proper investigation
B) Warnings given
C) Meticulous documentation
D) Insufficient cause of termination
E) Reasonable actions taken
Question
The purpose(s) of a criminal investigation is (are) to:

A) Determine if a crime occurred.
B) Interrogate a suspect.
C) Prosecute an offender.
D) Establish guilt.
E) All of the above.
Question
Evidentiary items collected during a criminal investigation should be:

A) Forwarded to the human resources department.
B) Stored with the investigative report.
C) Destroyed after a criminal trial commences.
D) Preserved and secured.
E) All of the above.
Question
Physical evidence collected during an investigation should be:

A) Placed in appropriate containers, if necessary.
B) Marked with identifying information.
C) Logged into the investigative report.
D) Secured and transported properly.
E) All of the above.
Question
________ may be utilized to gather information when conventional investigative methods fail to produce desired results.

A) Stationary surveillance.
B) Fixed surveillance.
C) Moving surveillance.
D) Undercover operations.
E) All of the above.
Question
A common form of internal theft involves:

A) Accounts payable diversions.
B) Cash conversions.
C) Inventory conversions.
D) Receivable conversions.
E) All of the above.
Question
Sources of information in an investigation include all but which of the following?

A) Victims and witnesses
B) Records and informants
C) The investigator's intuition and beliefs
D) Physical evidence and the Internet
E) All of the above.
Question
The Employee Polygraph Protection Act of 1988 places restrictions on the use of a polygraph or similar instrument except when it is used for:

A) Pre-employment screening.
B) Internal theft investigation.
C) Random testing of discharged employees.
D) Government agency personnel screening.
E) All of the above.
Question
Potential industrial espionage threats to an organization include:

A) The organization's employees.
B) Competitors.
C) Persons external to the organization.
D) Other nations.
E) All of the above.
Question
________ reports are used to document additional information acquired subsequent to an original report.

A) Contact
B) Incident
C) Crime
D) Supplemental
E) All of the above.
Question
Substance abusers are ________ productive than individuals who do not abuse.

A) More
B) Far more
C) Similarly
D) Less
E) All of the above are correct.
Question
Pitfalls to conducting business intelligence include unethical and illegal conduct such as:

A) Trespassing.
B) Computer hacking.
C) Wiretapping.
D) Targeting employers of a competitor.
E) All of the above are correct.
Question
An investigation is strictly a scientific process through which adherence to specific rules is absolutely necessary.
Question
Background investigations should be conducted on a new employee as part of the employee's initial orientation to the organization.
Question
Property damage investigations are required only when personal injury is involved.
Question
Witnesses to an event should be interviewed separately to avoid cross-contamination of statements.
Question
During an investigation, interviewers should ask leading questions to assist a witness with recollection of the facts.
Question
Surveillance and undercover operations are a necessary first step in most criminal investigations.
Question
Criminal investigations in businesses and similar organizations focus on fraud and theft but not regulatory non-compliance.
Question
The uncommon characteristic of crimes involving fraud is the method used or the time frame wherein the perpetrator forms criminal intent.
Question
Prevention of employee theft involves security systems, procedural controls, and an appropriate workplace environment.
Question
Financial audits involve an examination of each financial transaction.
Question
Statutory provisions rarely restrict an employer's ability to use surreptitious investigative methods such as electronic monitoring.
Question
Business (competitive) intelligence involves the process of collecting, analyzing, and disseminating competitive information to meet business organization objectives.
Question
Industrial espionage involves gathering information about actual or possible criminal activity.
Question
Industrial espionage always involves the use of legal activities to gather information about a competitor.
Question
List and describe the common elements to the investigative process.
Question
What is business intelligence? How does it differ from industrial espionage and counterespionage?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/34
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Investigations, Intelligence Operations, and Reporting
1
An investigation is warranted when:

A) An accident occurs.
B) Unexplainable property losses are discovered.
C) Personal misconduct is reported.
D) Criminal activity is observed.
E) All of the above.
All of the above.
2
In a security and protective services environment, investigations are conducted to:

A) Ensure compliance.
B) Support litigation.
C) Prevent accidents.
D) Trace and locate criminals.
E) All of the above.
All of the above.
3
Human resource investigations include all but which of the following areas?

A) Employee backgrounds
B) Workplace violence
C) Employment discrimination
D) Legal drug use
E) All of the above are the subject of human resource investigations.
Legal drug use
4
As part of a due diligence inquiry, an organization should verify an applicant's ________ and any other information contained in an employment application.

A) Criminal history
B) Credit history
C) Employment history
D) Academic history
E) All of the above.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
5
________ injuries are attributed to a single act or event rather than development of the injury over an extended period of time.

A) AOE
B) BOE
C) COE
D) DOE
E) All of the above.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
6
Employees who abuse substances in the workplace may:

A) Suffer or cause injuries.
B) Damage property.
C) Have a propensity to steal.
D) Experience poor attendance.
E) All of the above.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
7
As a possible defense to a wrongful termination lawsuit, an employer should present proof of all but which of the following?

A) A proper investigation
B) Warnings given
C) Meticulous documentation
D) Insufficient cause of termination
E) Reasonable actions taken
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
8
The purpose(s) of a criminal investigation is (are) to:

A) Determine if a crime occurred.
B) Interrogate a suspect.
C) Prosecute an offender.
D) Establish guilt.
E) All of the above.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
9
Evidentiary items collected during a criminal investigation should be:

A) Forwarded to the human resources department.
B) Stored with the investigative report.
C) Destroyed after a criminal trial commences.
D) Preserved and secured.
E) All of the above.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
10
Physical evidence collected during an investigation should be:

A) Placed in appropriate containers, if necessary.
B) Marked with identifying information.
C) Logged into the investigative report.
D) Secured and transported properly.
E) All of the above.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
11
________ may be utilized to gather information when conventional investigative methods fail to produce desired results.

A) Stationary surveillance.
B) Fixed surveillance.
C) Moving surveillance.
D) Undercover operations.
E) All of the above.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
12
A common form of internal theft involves:

A) Accounts payable diversions.
B) Cash conversions.
C) Inventory conversions.
D) Receivable conversions.
E) All of the above.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
13
Sources of information in an investigation include all but which of the following?

A) Victims and witnesses
B) Records and informants
C) The investigator's intuition and beliefs
D) Physical evidence and the Internet
E) All of the above.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
14
The Employee Polygraph Protection Act of 1988 places restrictions on the use of a polygraph or similar instrument except when it is used for:

A) Pre-employment screening.
B) Internal theft investigation.
C) Random testing of discharged employees.
D) Government agency personnel screening.
E) All of the above.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
15
Potential industrial espionage threats to an organization include:

A) The organization's employees.
B) Competitors.
C) Persons external to the organization.
D) Other nations.
E) All of the above.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
16
________ reports are used to document additional information acquired subsequent to an original report.

A) Contact
B) Incident
C) Crime
D) Supplemental
E) All of the above.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
17
Substance abusers are ________ productive than individuals who do not abuse.

A) More
B) Far more
C) Similarly
D) Less
E) All of the above are correct.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
18
Pitfalls to conducting business intelligence include unethical and illegal conduct such as:

A) Trespassing.
B) Computer hacking.
C) Wiretapping.
D) Targeting employers of a competitor.
E) All of the above are correct.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
19
An investigation is strictly a scientific process through which adherence to specific rules is absolutely necessary.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
20
Background investigations should be conducted on a new employee as part of the employee's initial orientation to the organization.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
21
Property damage investigations are required only when personal injury is involved.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
22
Witnesses to an event should be interviewed separately to avoid cross-contamination of statements.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
23
During an investigation, interviewers should ask leading questions to assist a witness with recollection of the facts.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
24
Surveillance and undercover operations are a necessary first step in most criminal investigations.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
25
Criminal investigations in businesses and similar organizations focus on fraud and theft but not regulatory non-compliance.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
26
The uncommon characteristic of crimes involving fraud is the method used or the time frame wherein the perpetrator forms criminal intent.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
27
Prevention of employee theft involves security systems, procedural controls, and an appropriate workplace environment.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
28
Financial audits involve an examination of each financial transaction.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
29
Statutory provisions rarely restrict an employer's ability to use surreptitious investigative methods such as electronic monitoring.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
30
Business (competitive) intelligence involves the process of collecting, analyzing, and disseminating competitive information to meet business organization objectives.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
31
Industrial espionage involves gathering information about actual or possible criminal activity.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
32
Industrial espionage always involves the use of legal activities to gather information about a competitor.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
33
List and describe the common elements to the investigative process.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
34
What is business intelligence? How does it differ from industrial espionage and counterespionage?
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 34 flashcards in this deck.