A) Release the suspect because he did not physically throw rocks B) Use force against the entire group without distinguishing roles to quickly stop the situation. C) Detain the suspect indefinitely because shouting makes him responsible for the riot. D) Arrest the suspect for incitement and violent disorder, document witness statements, and seek pobable cause based on both words and conduct
A) Seize the drugs, document the plain-view discovery properly, and add them to the inventory and case file. B) Destroy the drugs to prevent contamination of the scene. C) Ignore the drugs because they’re not relevant to the bribery case. D) Modify the warrant on the spot to include drugs without judicial approval.
A) Wait until all prints can be processed simultaneously B) Randomly process prints to avoid bias. C) Prioritize prints most likely to identify the principal suspect(s) and those linked to violent contact areas, documenting why others remain unprocessed. D) Process prints found on irrelevant background surfaces first.
A) Force counsel on both suspects B) Ignore the counsel request because joint questioning is efficient. C) Continue questioning both together to expedite confession. D) Stop questioning the one who requested counsel until counsel is present; proceed with the other only after ensuring rights were knowingly waived.
A) Secure financial records, contract files, and correspondence through lawful subpoenas and preserve chain of custody for documents. B) Question the relatives informally without documentation. C) Publicly announce the accusation to encourage whistleblowers. D) Arrest the official immediately based on public outrage.
A) Destroy the seals to inspect contents without legal process. B) Respect refusal, request a canine sniff (where lawful) or obtain a warrant if probable cause can be articulated. C) Force entry into the crates immediately. D) Arrest the driver for nervousness alone.
A) Secure and cordon the scene, establish single entry/exit points, and assign officers to preserve evidence and control access. B) Allow crowds to roam to collect more witness statements. C) Release witnesses immediately to ease crowd control. D) Move the body to the morgue
A) Use focused, structured interviews targeting key witnesses and roles (e.g., first responders, victims, organizers), documenting time, place, and observations. B) Conduct long, in-depth interviews with each bystander regardless of role. C) Ask witnesses to post their account on public forums. D) Skip interviews and rely on social media posts.
A) Place phones in Faraday bags or otherwise isolate them, log them, and follow forensic imaging procedures. B) Let suspects continue using their phones to avoid confrontation. C) Immediately reset phones to factory settings to prevent data leakage. D) Hand phones back to suspects after brief notes.
A) Produce a clear timeline, visual exhibits (flowcharts), and explain transactions in plain language linking them to intent and recipients. B) Use technical jargon to demonstrate expertise C) Refuse to explain accounting methods to avoid oversimplification. D) Read raw spreadsheets aloud.
A) Destroy duplicate records to avoid confusion. B) Establish a unified chain-of-custody protocol beforehand, train personnel, and use single, continuous documentation for each item. C) Each team uses its own form; discrepancies are normal. D) Allow field officers to verbalize transfers without written notes.
A) Share the footage informally with friends. D. Release the footage on social media. B) Preserve and submit the footage through official channels for investigation, following department policy. C) Delete the footage to protect the colleague.
A) Ignore the confession if it complicates the case. B) Keep no record to avoid scrutiny. C) Rely on officer notes only. D) Record the interview (audio/video), document breaks, advise of rights, and provide access to counsel as required.
A) Wait for suspects to make contact to reduce workload. B) Conduct surveillance to build probable cause and plan a coordinated arrest/search to maximize evidence recovery while minimizing risk. C) Immediate raid without planning to ensure surprise. D) Publicly warn suspects to allow them to leave peacefully.
A) Assess threat credibility, provide protective measures for the clerk, document threats, and investigate possible links to the procurement irregularities. B) Publicize the clerk’s identity to attract witnesses. C) Arrest the procurement officers immediately without evidence. D) Ignore the threats because they’re anonymous.
A) Secure the firearm, detain based on prior conviction restrictions if applicable, document the statutory basis, and consult legal advisors if ordinance is ambiguous. B) Ignore the ordinance and detain anyway. C) Destroy the firearm to avoid legal debates. D) Release the suspect citing ambiguity.
A) Arrest random individuals to satisfy public pressure. B) Reopen the investigation, preserve the scene, re-interview witnesses, and prioritize forensic reevaluation to collect missed evidence. C) Close the file because initial assessment said accidental. D) Ignore forensic findings that contradict the first report.
A) Assess reliability and corroboration of the information, weigh public interest, and coordinate with prosecutors on the terms and documentation. B) Refuse any cooperation to avoid making deals. C) Publicly announce the deal to show toughness. D) Grant immunity immediately to secure testimony.
A) Assume evidence will be admissible everywhere. B) Establish cross-jurisdictional agreements, follow highest-standard procedures, and document chain-of-custody and legal bases for actions. C) Destroy disputed evidence to avoid legal battles. D) Have one agency claim sole responsibility to insulate others.
A) Publish the footage widely to test public reaction. B) Ignore the video because of unknown origin. C) Alter the recording to remove irrelevant portions. D) Forensically preserve the original recording, attempt to authenticate source (metadata, chain), and corroborate with other evidence before charging.
A) Allow suspects to choose which samples are analyzed B) Wait until all samples can be fully analyzed simultaneously. C) Prioritize samples most likely to link perpetrators to violent acts and use presumptive tests, while documenting backlog and rationale. D) Discard less clear samples to focus on a single target.
A) Ensure the undercover operation targets individuals with demonstrated predisposition, avoid persuasion beyond opportunity provision, and document undercover conduct and supervisory approval. B) Offer rewards to induce suspects to commit the crime C) Avoid any documentation to protect covert methods. D) Instruct the officer to coerce suspects into committing crimes.
A) Store files in non-climate-controlled areas to save cost. B) Digitize records with secure backups, index for retrieval, and follow retention rules while preserving originals and chain-of-custody metadata. C) Leave files as-is to avoid tampering. D) Dispose of older files to free storage.
A) Offer appropriate protective measures (anonymity where allowed, relocation, witness protection options), corroborate witness statements with independent evidence, and document all steps. B) Force the witness to testify without protection. C) Dismiss the witness and rely solely on circumstantial evidence. D) Promise the witness immunity without prosecutor approval.
A) An opinion piece summarizing public frustration. B) A short memo with allegations but no supporting exhibits. C) Oral briefings without written record. D) A structured investigative file linking actions to laws, with timelines, documentary evidence, witness statements, forensic accounting, and chain-of-custody documentation.
A) Execute the order immediately without question. B) Arrest all protesters to avoid confrontation. C) Seek clarification and refuse to use force if it violates constitutional rights, documenting the order and advising superiors. D) Ignore the mayor’s order and leave the area.
A) Release the intelligence to media for awareness. B) Share verified intelligence with relevant units, recommend preventive deployment, and monitor for threat escalation. C) Cancel the event without confirmation. D) Ignore the threat to prevent panic.
A) Ignore it to maintain camaraderie. B) Confront the colleague privately and drop the matter. C) Post the discovery on social media for public reaction. D) Report the misconduct through official internal affairs channels with documented evidence.
A) Wait for political approval before acting. B) Follow the established chain of command, coordinate through inter-agency mechanisms, and ensure decisions prioritize life and safety. C) Compete for control to assert jurisdiction. D) Local authorities should ignore national directives.
A) Secure mutual legal assistance through diplomatic channels, authenticating evidence under international protocols. B) Rely on media leaks as primary evidence. C) Retrieve the evidence personally without coordination. D) Copy online files anonymously to save time.
A) Immediately act on the tip to prove trust. B) Disregard all tips from the informant permanently. C) Leak the tip to journalists for verification. D) Evaluate the new information for corroboration before acting, documenting the informant’s credibility history.
A) Scenario-based simulations that require applying principles, analyzing consequences, and making ethical decisions. B) Reading assignments with no assessment. C) Rote memorization of procedures. D) Lecture-only sessions on legal definitions.
A) Evidence may be suppressed due to unlawful entry without exigent circumstances. B) Evidence is admissible since drugs were found. C) The suspect’s reputation justifies entry. D) Evidence can be used if the media publicizes it.
A) Conduct a multifactor analysis considering socio-economic, family, and peer influences supported by field data. B) Use anecdotal accounts without research. C) Blame media influence alone. D) Focus solely on crime rates.
A) Leak information to social media. B) Alter findings to satisfy superiors. C) Resign immediately without report. D) Maintain objectivity, document all communications, and escalate unethical interference through proper oversight channels.
A) Suspend analysis, notify superiors, re-label under observation, and document corrective action. B) Continue analysis to save time. C) Ignore it if the bags are sealed. D) Guess the labels based on memory.
A) Interview a few acquaintances for opinions. B) Use mixed methods: statistical analysis of parole records plus qualitative interviews, ensuring ethical confidentiality. C) Use social media surveys only. D) Generalize from foreign data without context.
A) Publicly accuse the superior without proof. B) Accept the practice as normal. C) Document the incident and report through ethics or internal affairs units. D) Request a share to maintain harmony.
A) Assume correlation without data. B) Use a single-year snapshot. C) Rely solely on anecdotal reports. D) Compare longitudinal crime data with periods of governance shifts and social unrest indicators.
A) Apply equal protection, enforce laws without bias, and coordinate with all parties. B) Avoid visibility to prevent controversy. C) Deny opposition permits to maintain order. D) Provide security favoring the incumbent.
A) Assessing reduction in recidivism, public satisfaction, and resource efficiency over time. B) Measuring officers’ overtime hours. C) Counting only the number of arrests. D) Reporting political popularity.
A) No consequence if evidence is strong. B) Confession is valid if obtained later. C) Officer is commended for persistence. D) Statements may be excluded as violation of rights.
A) Dismissal without review. B) Transfer the officer secretly. C) Ignore the case to maintain morale. D) Sanction consistent with degree of fault and precedent, allowing appeal per civil service rules.
A) Build more prisons without study. B) Implement alternatives to incarceration and rehabilitative programs evaluated through empirical data. C) Increase arrests to show control. D) Shorten sentences arbitrarily.
A) Issue media denials only. B) Replace all analysts without review. C) Ignore criticism as political. D) Establish quality assurance programs, independent audits, and blind proficiency testing.
A) Apply the law mechanically without exception. B) Detain the minor to set example. C) Exercise discretion based on humanitarian and situational judgment, documenting reasons for non-arrest. D) Punish the parent for negligence.
A) Increase patrols without engagement. B) Deploy tactical units to show authority. C) Avoid the community until tensions cool. D) Implement community policing emphasizing dialogue, transparency, and participatory problem-solving.
A) Present empirical data, case studies, and policy recommendations grounded in research. B) Attack political figures personally. C) Refuse to answer questions. D) Cite emotional anecdotes only.
A) Detain all matches automatically. B) Operate secretly to avoid oversight. C) Establish clear legal basis, accuracy verification, data protection, and human review before action. D) Publicize all scanned identities.
A) Delete all records to avoid embarrassment. B) Ignore falsification to protect funding. C) Report data manipulation, correct findings transparently, and ensure accountability. D) Retain falsified results for prestige.
A) Maintain the current enforcement-focused approach. B) Ignore outcome data as irrelevant. C) Increase arrests to meet quotas. D) Integrate prevention, rehabilitation, and demand-reduction components supported by longitudinal assessment.
A) Develop measurable indicators of community perception and conduct periodic surveys. B) Assume success after one week. C) Judge success by number of likes. D) Ignore citizen feedback.
A) Combine all figures without explanation. B) Disregard one agency entirely. C) Choose the dataset that supports personal views. D) Compare definitions, time frames, and data collection methods before interpreting trends.
A) Destroy all evidence. B) Immediately report, isolate affected evidence, document, and request independent verification. C) Clean the area quietly. D) Hide the discovery to avoid administrative issues.
A) Blanket arrests of demonstrators. B) Facilitate lawful protest while preventing violence and protecting property through proportionate measures. C) Ignore threats to public safety. D) Prohibit all public assemblies.
A) Increase solitary confinement. B) Expand inmate education and vocational programs as rehabilitation strategies. C) End all education programs to reduce costs. D) Focus solely on punishment.
A) Validate intelligence, coordinate with relevant agencies, and implement preemptive security measures. B) Ignore to avoid false alarms. C) Release details to the media. D) Wait for confirmation by the attackers.
A) Suspend the interrogation, ensure medical or psychological assessment, and resume only under ethical safeguards. B) Record only partial statements. C) Continue questioning aggressively. D) Ignore the signs to obtain a confession.
A) Number of arrests made. B) Levels of community trust, problem-solving engagement, and citizen satisfaction. C) Budget spent on patrols. D) Patrol distance covered.
A) No consequence if information is accurate. B) Strengthens transparency. C) Breach of confidentiality—subject to administrative and criminal liability. D) Encourages investigative reporting.
A) Avoid sharing results to stay neutral. B) Communicate findings in actionable, evidence-based briefs and engage policymakers through dialogue. C) Submit long academic papers without summaries. D) Publicly criticize noncompliance.
A) Apply uniform investigative procedures, document decisions B) Focus on the majority group for convenience. C) Avoid questioning politically powerful individuals. D) Allow public opinion to guide investigation.
A) Rely solely on patrol intuition. B) Add more paperwork layers C) Implement computer-aided dispatch systems with geographic crime mapping. D) Eliminate radio communication.
A) Average vehicle ownership. B) Number of police stations. C) Television access rate. D) Corruption perception index and public trust surveys.
A) Delegation with control—supervision must accompany assignment of responsibility. B) Chain of command. C) Equal distribution. D) Unity of command.
A) Follow the order to preserve political harmony. B) Ignore the issue. C) Threaten the journalists to cooperate. D) Refuse unlawful arrests, advise on freedom of the press, and document the directive for legal protection.
A) Negotiation for higher compensation. B) . Integrity and rejection of corruption—report the bribe attempt through official channels. C) Loyalty to colleagues. D) Silence for personal safety.
A) Review recruitment, training, and operational policies to address identified disparities. B) Deny findings publicly. C) Ignore the issue to protect image. D) Punish the researcher.
A) Decentralization. B) Autonomy. C) Centralization of power. D) Devolution.
A) Cross-examination rights. B) Evidentiary privilege. C) Scientific ethics—testify only within verified competence. D) Neutrality.
A) It focuses on repairing harm, promoting accountability, and reintegrating offenders into society. B) It is less expensive. C) It punishes offenders harshly. D) It avoids legal process.
A) Reduced detection. B) Operational efficiency. C) Faster results. D) Legal admissibility of evidence and exposure to liability.
A) Publish annual performance audits and citizen scorecards. B) Classify all reports as confidential. C) Limit access to internal evaluations. D) Suppress performance data.
A) Violation of research ethics regarding autonomy and voluntary participation. B) Data reliability issue only. C) Time management error. D) Sampling error.
A) Balanced governance. B) Reduced misinformation. C) Increased trust in government. D) Erosion of civil liberties and potential abuse of authority.
A) Publicly shame the officer to deter others. B) Immediate dismissal without hearing. C) Due process — provide notice, access to evidence, and opportunity to respond. D) Transfer the officer quietly.
A) Publicize it online without verification. B) Secretly treat inmates without approval. C) Ignore it as part of punishment. D) Report the violation to correctional authorities and human rights oversight bodies with documentation.
A) Accuse officers by name without proof. B) Objectively record the contamination, explain its implications, and recommend procedural improvement. C) Delete affected evidence. D) Omit it to avoid conflict.
A) Wait for political funding. B) Conduct crime mapping to identify hotspots and allocate resources based on spatial analysis. C) Conduct crime mapping to identify hotspots and allocate resources based on spatial analysis. D) Reduce lighting to save energy.
A) Procedural justice violation and moral disengagement. B) Deterrence theory. C) Rational choice theory. D) Administrative efficiency.
A) Biological determinism. B) Labeling as positive reinforcement. C) Overcriminalization and incapacitation limits. D) Effective deterrence.
A) Review interview recordings, medical reports, and corroborative evidence to assess voluntariness. B) Threaten the suspect for dishonesty. C) Disregard retraction as a tactic. D) Force another confession.
A) Implement counter-messaging, digital literacy, and intelligence collaboration with legal safeguards. B) Block internet nationwide. C) Focus solely on arrests. D) Ban all online platforms.
A) Announce findings before verifying. B) Secure payroll records, interview officials, and trace disbursement trails to establish fraudulent intent. C) Replace missing funds with estimates. D) Remove names quietly.
A) Economic choice model. B) Classical deterrence model. C) Biopsychosocial model. D) Retributive model.
A) Enhanced community relations. B) Violation of confidentiality and potential prejudice to ongoing investigation. C) Deterrence through publicity. D) Public education.
A) Lower recidivism and improved reintegration indicators (employment, education, community support). B) Higher inmate population. C) Reduced facility costs. D) Increased punishment satisfaction.
A) Camera brand and cost. B) Political popularity. C) Number of cameras installed. D) Privacy laws, community consent, and proportionality of surveillance scope.
A) Conduct risk assessment, enhance personal and office security, and coordinate with protective services. B) Ignore the threats. C) Withdraw charges. D) Delay the case indefinitely.
A) Assume low incidence. B) Use only police reports C) Interview only offenders. D) Combine survey data, hospital records, and NGO reports through triangulation
A) Avoid evidence collection against government staff. B) Pursue investigation regardless of rank, maintaining confidentiality and due process. C) Cover up to avoid institutional damage. D) Publicly accuse all officials.
A) Socio-economic inequality, state repression, and power imbalance. B) Individual anger management failure. C) Random deviance. D. Personality defect D) Personality defect of leaders.
A) Internal self-review only. B) Secrecy in all misconduct cases. C) Political control over police operations. D) Independent civilian oversight with disciplinary authority and transparency.
A) Confirmation bias. B) Immediate conclusion to save time. C) Single analyst authority. D) Inter-examiner reliability testing and blind verification.
A) Biological theory. B) Social disorganization theory. C) Routine activity and Crime Prevention Through Environmental Design (CPTED). D) Labeling theory.
A) Safety of all parties, risk of flight, and minimal intrusion of privacy. B) Public spectacle. C) Media presence. D) Political timing.
A) Simple observation. B) Thematic analysis. C) Confession-only approach. D) Financial forensics using transaction mapping and cross-account verification.
A) Biological positivism. B) Classical rational choice theory. C) Routine activity theory. D) Strain and relative deprivation theories.
A) Silo mentality. B) Rivalry to test competence. C) Independent press briefings. D) Information sharing through unified command and clear protocols.
A) Stronger executive powers. B) Judicial review and separation of powers to limit executive overreach. C) Total immunity of officials. D) Removal of judicial independence. |