A) Release the suspect because he did not physically throw rocks B) Detain the suspect indefinitely because shouting makes him responsible for the riot. C) Use force against the entire group without distinguishing roles to quickly stop the situation. D) Arrest the suspect for incitement and violent disorder, document witness statements, and seek pobable cause based on both words and conduct
A) Modify the warrant on the spot to include drugs without judicial approval. B) Seize the drugs, document the plain-view discovery properly, and add them to the inventory and case file. C) Destroy the drugs to prevent contamination of the scene. D) Ignore the drugs because they’re not relevant to the bribery case.
A) Randomly process prints to avoid bias. B) Process prints found on irrelevant background surfaces first. C) Prioritize prints most likely to identify the principal suspect(s) and those linked to violent contact areas, documenting why others remain unprocessed. D) Wait until all prints can be processed simultaneously
A) Ignore the counsel request because joint questioning is efficient. B) Continue questioning both together to expedite confession. C) Force counsel on both suspects D) Stop questioning the one who requested counsel until counsel is present; proceed with the other only after ensuring rights were knowingly waived.
A) Arrest the official immediately based on public outrage. B) Publicly announce the accusation to encourage whistleblowers. C) Question the relatives informally without documentation. D) Secure financial records, contract files, and correspondence through lawful subpoenas and preserve chain of custody for documents.
A) Arrest the driver for nervousness alone. B) Destroy the seals to inspect contents without legal process. C) Respect refusal, request a canine sniff (where lawful) or obtain a warrant if probable cause can be articulated. D) Force entry into the crates immediately.
A) Secure and cordon the scene, establish single entry/exit points, and assign officers to preserve evidence and control access. B) Allow crowds to roam to collect more witness statements. C) Move the body to the morgue D) Release witnesses immediately to ease crowd control.
A) Use focused, structured interviews targeting key witnesses and roles (e.g., first responders, victims, organizers), documenting time, place, and observations. B) Skip interviews and rely on social media posts. C) Ask witnesses to post their account on public forums. D) Conduct long, in-depth interviews with each bystander regardless of role.
A) Place phones in Faraday bags or otherwise isolate them, log them, and follow forensic imaging procedures. B) Immediately reset phones to factory settings to prevent data leakage. C) Let suspects continue using their phones to avoid confrontation. D) Hand phones back to suspects after brief notes.
A) Read raw spreadsheets aloud. B) Produce a clear timeline, visual exhibits (flowcharts), and explain transactions in plain language linking them to intent and recipients. C) Use technical jargon to demonstrate expertise D) Refuse to explain accounting methods to avoid oversimplification.
A) Establish a unified chain-of-custody protocol beforehand, train personnel, and use single, continuous documentation for each item. B) Destroy duplicate records to avoid confusion. C) Allow field officers to verbalize transfers without written notes. D) Each team uses its own form; discrepancies are normal.
A) Share the footage informally with friends. D. Release the footage on social media. B) Preserve and submit the footage through official channels for investigation, following department policy. C) Delete the footage to protect the colleague.
A) Record the interview (audio/video), document breaks, advise of rights, and provide access to counsel as required. B) Ignore the confession if it complicates the case. C) Keep no record to avoid scrutiny. D) Rely on officer notes only.
A) Conduct surveillance to build probable cause and plan a coordinated arrest/search to maximize evidence recovery while minimizing risk. B) Wait for suspects to make contact to reduce workload. C) Immediate raid without planning to ensure surprise. D) Publicly warn suspects to allow them to leave peacefully.
A) Arrest the procurement officers immediately without evidence. B) Assess threat credibility, provide protective measures for the clerk, document threats, and investigate possible links to the procurement irregularities. C) Ignore the threats because they’re anonymous. D) Publicize the clerk’s identity to attract witnesses.
A) Ignore the ordinance and detain anyway. B) Destroy the firearm to avoid legal debates. C) Secure the firearm, detain based on prior conviction restrictions if applicable, document the statutory basis, and consult legal advisors if ordinance is ambiguous. D) Release the suspect citing ambiguity.
A) Reopen the investigation, preserve the scene, re-interview witnesses, and prioritize forensic reevaluation to collect missed evidence. B) Arrest random individuals to satisfy public pressure. C) Close the file because initial assessment said accidental. D) Ignore forensic findings that contradict the first report.
A) Assess reliability and corroboration of the information, weigh public interest, and coordinate with prosecutors on the terms and documentation. B) Refuse any cooperation to avoid making deals. C) Grant immunity immediately to secure testimony. D) Publicly announce the deal to show toughness.
A) Establish cross-jurisdictional agreements, follow highest-standard procedures, and document chain-of-custody and legal bases for actions. B) Have one agency claim sole responsibility to insulate others. C) Assume evidence will be admissible everywhere. D) Destroy disputed evidence to avoid legal battles.
A) Forensically preserve the original recording, attempt to authenticate source (metadata, chain), and corroborate with other evidence before charging. B) Ignore the video because of unknown origin. C) Alter the recording to remove irrelevant portions. D) Publish the footage widely to test public reaction.
A) Discard less clear samples to focus on a single target. B) Allow suspects to choose which samples are analyzed C) Prioritize samples most likely to link perpetrators to violent acts and use presumptive tests, while documenting backlog and rationale. D) Wait until all samples can be fully analyzed simultaneously.
A) Ensure the undercover operation targets individuals with demonstrated predisposition, avoid persuasion beyond opportunity provision, and document undercover conduct and supervisory approval. B) Offer rewards to induce suspects to commit the crime C) Instruct the officer to coerce suspects into committing crimes. D) Avoid any documentation to protect covert methods.
A) Digitize records with secure backups, index for retrieval, and follow retention rules while preserving originals and chain-of-custody metadata. B) Dispose of older files to free storage. C) Leave files as-is to avoid tampering. D) Store files in non-climate-controlled areas to save cost.
A) Force the witness to testify without protection. B) Promise the witness immunity without prosecutor approval. C) Dismiss the witness and rely solely on circumstantial evidence. D) Offer appropriate protective measures (anonymity where allowed, relocation, witness protection options), corroborate witness statements with independent evidence, and document all steps.
A) An opinion piece summarizing public frustration. B) A structured investigative file linking actions to laws, with timelines, documentary evidence, witness statements, forensic accounting, and chain-of-custody documentation. C) A short memo with allegations but no supporting exhibits. D) Oral briefings without written record.
A) Execute the order immediately without question. B) Arrest all protesters to avoid confrontation. C) Seek clarification and refuse to use force if it violates constitutional rights, documenting the order and advising superiors. D) Ignore the mayor’s order and leave the area.
A) Ignore the threat to prevent panic. B) Release the intelligence to media for awareness. C) Cancel the event without confirmation. D) Share verified intelligence with relevant units, recommend preventive deployment, and monitor for threat escalation.
A) Ignore it to maintain camaraderie. B) Report the misconduct through official internal affairs channels with documented evidence. C) Confront the colleague privately and drop the matter. D) Post the discovery on social media for public reaction.
A) Local authorities should ignore national directives. B) Wait for political approval before acting. C) Compete for control to assert jurisdiction. D) Follow the established chain of command, coordinate through inter-agency mechanisms, and ensure decisions prioritize life and safety.
A) Retrieve the evidence personally without coordination. B) Copy online files anonymously to save time. C) Secure mutual legal assistance through diplomatic channels, authenticating evidence under international protocols. D) Rely on media leaks as primary evidence.
A) Immediately act on the tip to prove trust. B) Evaluate the new information for corroboration before acting, documenting the informant’s credibility history. C) Disregard all tips from the informant permanently. D) Leak the tip to journalists for verification.
A) Rote memorization of procedures. B) Scenario-based simulations that require applying principles, analyzing consequences, and making ethical decisions. C) Reading assignments with no assessment. D) Lecture-only sessions on legal definitions.
A) Evidence is admissible since drugs were found. B) Evidence may be suppressed due to unlawful entry without exigent circumstances. C) The suspect’s reputation justifies entry. D) Evidence can be used if the media publicizes it.
A) Use anecdotal accounts without research. B) Conduct a multifactor analysis considering socio-economic, family, and peer influences supported by field data. C) Focus solely on crime rates. D) Blame media influence alone.
A) Leak information to social media. B) Alter findings to satisfy superiors. C) Maintain objectivity, document all communications, and escalate unethical interference through proper oversight channels. D) Resign immediately without report.
A) Suspend analysis, notify superiors, re-label under observation, and document corrective action. B) Guess the labels based on memory. C) Ignore it if the bags are sealed. D) Continue analysis to save time.
A) Generalize from foreign data without context. B) Interview a few acquaintances for opinions. C) Use social media surveys only. D) Use mixed methods: statistical analysis of parole records plus qualitative interviews, ensuring ethical confidentiality.
A) Publicly accuse the superior without proof. B) Accept the practice as normal. C) Request a share to maintain harmony. D) Document the incident and report through ethics or internal affairs units.
A) Rely solely on anecdotal reports. B) Use a single-year snapshot. C) Assume correlation without data. D) Compare longitudinal crime data with periods of governance shifts and social unrest indicators.
A) Deny opposition permits to maintain order. B) Apply equal protection, enforce laws without bias, and coordinate with all parties. C) Provide security favoring the incumbent. D) Avoid visibility to prevent controversy.
A) Measuring officers’ overtime hours. B) Counting only the number of arrests. C) Assessing reduction in recidivism, public satisfaction, and resource efficiency over time. D) Reporting political popularity.
A) Statements may be excluded as violation of rights. B) Officer is commended for persistence. C) Confession is valid if obtained later. D) No consequence if evidence is strong.
A) Ignore the case to maintain morale. B) Transfer the officer secretly. C) Dismissal without review. D) Sanction consistent with degree of fault and precedent, allowing appeal per civil service rules.
A) Shorten sentences arbitrarily. B) Increase arrests to show control. C) Build more prisons without study. D) Implement alternatives to incarceration and rehabilitative programs evaluated through empirical data.
A) Issue media denials only. B) Replace all analysts without review. C) Establish quality assurance programs, independent audits, and blind proficiency testing. D) Ignore criticism as political.
A) Apply the law mechanically without exception. B) Punish the parent for negligence. C) Detain the minor to set example. D) Exercise discretion based on humanitarian and situational judgment, documenting reasons for non-arrest.
A) Deploy tactical units to show authority. B) Avoid the community until tensions cool. C) Increase patrols without engagement. D) Implement community policing emphasizing dialogue, transparency, and participatory problem-solving.
A) Attack political figures personally. B) Present empirical data, case studies, and policy recommendations grounded in research. C) Cite emotional anecdotes only. D) Refuse to answer questions.
A) Publicize all scanned identities. B) Detain all matches automatically. C) Establish clear legal basis, accuracy verification, data protection, and human review before action. D) Operate secretly to avoid oversight.
A) Retain falsified results for prestige. B) Report data manipulation, correct findings transparently, and ensure accountability. C) Delete all records to avoid embarrassment. D) Ignore falsification to protect funding.
A) Increase arrests to meet quotas. B) Ignore outcome data as irrelevant. C) Maintain the current enforcement-focused approach. D) Integrate prevention, rehabilitation, and demand-reduction components supported by longitudinal assessment.
A) Assume success after one week. B) Ignore citizen feedback. C) Judge success by number of likes. D) Develop measurable indicators of community perception and conduct periodic surveys.
A) Compare definitions, time frames, and data collection methods before interpreting trends. B) Disregard one agency entirely. C) Combine all figures without explanation. D) Choose the dataset that supports personal views.
A) Immediately report, isolate affected evidence, document, and request independent verification. B) Hide the discovery to avoid administrative issues. C) Destroy all evidence. D) Clean the area quietly.
A) Blanket arrests of demonstrators. B) Facilitate lawful protest while preventing violence and protecting property through proportionate measures. C) Ignore threats to public safety. D) Prohibit all public assemblies.
A) Increase solitary confinement. B) Focus solely on punishment. C) End all education programs to reduce costs. D) Expand inmate education and vocational programs as rehabilitation strategies.
A) Validate intelligence, coordinate with relevant agencies, and implement preemptive security measures. B) Release details to the media. C) Wait for confirmation by the attackers. D) Ignore to avoid false alarms.
A) Ignore the signs to obtain a confession. B) Suspend the interrogation, ensure medical or psychological assessment, and resume only under ethical safeguards. C) Continue questioning aggressively. D) Record only partial statements.
A) Patrol distance covered. B) Levels of community trust, problem-solving engagement, and citizen satisfaction. C) Number of arrests made. D) Budget spent on patrols.
A) Breach of confidentiality—subject to administrative and criminal liability. B) No consequence if information is accurate. C) Strengthens transparency. D) Encourages investigative reporting.
A) Submit long academic papers without summaries. B) Publicly criticize noncompliance. C) Avoid sharing results to stay neutral. D) Communicate findings in actionable, evidence-based briefs and engage policymakers through dialogue.
A) Apply uniform investigative procedures, document decisions B) Focus on the majority group for convenience. C) Avoid questioning politically powerful individuals. D) Allow public opinion to guide investigation.
A) Rely solely on patrol intuition. B) Eliminate radio communication. C) Implement computer-aided dispatch systems with geographic crime mapping. D) Add more paperwork layers
A) Number of police stations. B) Television access rate. C) Average vehicle ownership. D) Corruption perception index and public trust surveys.
A) Equal distribution. B) Delegation with control—supervision must accompany assignment of responsibility. C) Unity of command. D) Chain of command.
A) Refuse unlawful arrests, advise on freedom of the press, and document the directive for legal protection. B) Threaten the journalists to cooperate. C) Ignore the issue. D) Follow the order to preserve political harmony.
A) Negotiation for higher compensation. B) Loyalty to colleagues. C) . Integrity and rejection of corruption—report the bribe attempt through official channels. D) Silence for personal safety.
A) Review recruitment, training, and operational policies to address identified disparities. B) Punish the researcher. C) Ignore the issue to protect image. D) Deny findings publicly.
A) Autonomy. B) Devolution. C) Decentralization. D) Centralization of power.
A) Cross-examination rights. B) Scientific ethics—testify only within verified competence. C) Neutrality. D) Evidentiary privilege.
A) It avoids legal process. B) It punishes offenders harshly. C) It is less expensive. D) It focuses on repairing harm, promoting accountability, and reintegrating offenders into society.
A) Operational efficiency. B) Faster results. C) Reduced detection. D) Legal admissibility of evidence and exposure to liability.
A) Limit access to internal evaluations. B) Classify all reports as confidential. C) Suppress performance data. D) Publish annual performance audits and citizen scorecards.
A) Sampling error. B) Violation of research ethics regarding autonomy and voluntary participation. C) Data reliability issue only. D) Time management error.
A) Erosion of civil liberties and potential abuse of authority. B) Increased trust in government. C) Reduced misinformation. D) Balanced governance.
A) Immediate dismissal without hearing. B) Due process — provide notice, access to evidence, and opportunity to respond. C) Transfer the officer quietly. D) Publicly shame the officer to deter others.
A) Secretly treat inmates without approval. B) Report the violation to correctional authorities and human rights oversight bodies with documentation. C) Ignore it as part of punishment. D) Publicize it online without verification.
A) Delete affected evidence. B) Accuse officers by name without proof. C) Objectively record the contamination, explain its implications, and recommend procedural improvement. D) Omit it to avoid conflict.
A) Wait for political funding. B) Conduct crime mapping to identify hotspots and allocate resources based on spatial analysis. C) Conduct crime mapping to identify hotspots and allocate resources based on spatial analysis. D) Reduce lighting to save energy.
A) Rational choice theory. B) Procedural justice violation and moral disengagement. C) Deterrence theory. D) Administrative efficiency.
A) Effective deterrence. B) Labeling as positive reinforcement. C) Biological determinism. D) Overcriminalization and incapacitation limits.
A) Threaten the suspect for dishonesty. B) Review interview recordings, medical reports, and corroborative evidence to assess voluntariness. C) Disregard retraction as a tactic. D) Force another confession.
A) Focus solely on arrests. B) Ban all online platforms. C) Implement counter-messaging, digital literacy, and intelligence collaboration with legal safeguards. D) Block internet nationwide.
A) Secure payroll records, interview officials, and trace disbursement trails to establish fraudulent intent. B) Remove names quietly. C) Replace missing funds with estimates. D) Announce findings before verifying.
A) Retributive model. B) Economic choice model. C) Classical deterrence model. D) Biopsychosocial model.
A) Deterrence through publicity. B) Public education. C) Violation of confidentiality and potential prejudice to ongoing investigation. D) Enhanced community relations.
A) Higher inmate population. B) Reduced facility costs. C) Increased punishment satisfaction. D) Lower recidivism and improved reintegration indicators (employment, education, community support).
A) Number of cameras installed. B) Camera brand and cost. C) Political popularity. D) Privacy laws, community consent, and proportionality of surveillance scope.
A) Delay the case indefinitely. B) Conduct risk assessment, enhance personal and office security, and coordinate with protective services. C) Withdraw charges. D) Ignore the threats.
A) Use only police reports B) Interview only offenders. C) Combine survey data, hospital records, and NGO reports through triangulation D) Assume low incidence.
A) Avoid evidence collection against government staff. B) Publicly accuse all officials. C) Cover up to avoid institutional damage. D) Pursue investigation regardless of rank, maintaining confidentiality and due process.
A) Socio-economic inequality, state repression, and power imbalance. B) Individual anger management failure. C) Personality defect of leaders. D) Random deviance. D. Personality defect
A) Internal self-review only. B) Political control over police operations. C) Independent civilian oversight with disciplinary authority and transparency. D) Secrecy in all misconduct cases.
A) Single analyst authority. B) Confirmation bias. C) Immediate conclusion to save time. D) Inter-examiner reliability testing and blind verification.
A) Social disorganization theory. B) Biological theory. C) Routine activity and Crime Prevention Through Environmental Design (CPTED). D) Labeling theory.
A) Public spectacle. B) Safety of all parties, risk of flight, and minimal intrusion of privacy. C) Media presence. D) Political timing.
A) Simple observation. B) Financial forensics using transaction mapping and cross-account verification. C) Confession-only approach. D) Thematic analysis.
A) Routine activity theory. B) Biological positivism. C) Strain and relative deprivation theories. D) Classical rational choice theory.
A) Silo mentality. B) Information sharing through unified command and clear protocols. C) Independent press briefings. D) Rivalry to test competence.
A) Stronger executive powers. B) Removal of judicial independence. C) Judicial review and separation of powers to limit executive overreach. D) Total immunity of officials. |