A) Detain the suspect indefinitely because shouting makes him responsible for the riot. B) Arrest the suspect for incitement and violent disorder, document witness statements, and seek pobable cause based on both words and conduct C) Use force against the entire group without distinguishing roles to quickly stop the situation. D) Release the suspect because he did not physically throw rocks
A) Destroy the drugs to prevent contamination of the scene. B) Modify the warrant on the spot to include drugs without judicial approval. C) Ignore the drugs because they’re not relevant to the bribery case. D) Seize the drugs, document the plain-view discovery properly, and add them to the inventory and case file.
A) Randomly process prints to avoid bias. B) Process prints found on irrelevant background surfaces first. C) Wait until all prints can be processed simultaneously D) Prioritize prints most likely to identify the principal suspect(s) and those linked to violent contact areas, documenting why others remain unprocessed.
A) Stop questioning the one who requested counsel until counsel is present; proceed with the other only after ensuring rights were knowingly waived. B) Force counsel on both suspects C) Continue questioning both together to expedite confession. D) Ignore the counsel request because joint questioning is efficient.
A) Arrest the official immediately based on public outrage. B) Publicly announce the accusation to encourage whistleblowers. C) Question the relatives informally without documentation. D) Secure financial records, contract files, and correspondence through lawful subpoenas and preserve chain of custody for documents.
A) Force entry into the crates immediately. B) Arrest the driver for nervousness alone. C) Destroy the seals to inspect contents without legal process. D) Respect refusal, request a canine sniff (where lawful) or obtain a warrant if probable cause can be articulated.
A) Allow crowds to roam to collect more witness statements. B) Release witnesses immediately to ease crowd control. C) Secure and cordon the scene, establish single entry/exit points, and assign officers to preserve evidence and control access. D) Move the body to the morgue
A) Skip interviews and rely on social media posts. B) Ask witnesses to post their account on public forums. C) Use focused, structured interviews targeting key witnesses and roles (e.g., first responders, victims, organizers), documenting time, place, and observations. D) Conduct long, in-depth interviews with each bystander regardless of role.
A) Let suspects continue using their phones to avoid confrontation. B) Immediately reset phones to factory settings to prevent data leakage. C) Hand phones back to suspects after brief notes. D) Place phones in Faraday bags or otherwise isolate them, log them, and follow forensic imaging procedures.
A) Refuse to explain accounting methods to avoid oversimplification. B) Produce a clear timeline, visual exhibits (flowcharts), and explain transactions in plain language linking them to intent and recipients. C) Use technical jargon to demonstrate expertise D) Read raw spreadsheets aloud.
A) Each team uses its own form; discrepancies are normal. B) Destroy duplicate records to avoid confusion. C) Establish a unified chain-of-custody protocol beforehand, train personnel, and use single, continuous documentation for each item. D) Allow field officers to verbalize transfers without written notes.
A) Delete the footage to protect the colleague. B) Preserve and submit the footage through official channels for investigation, following department policy. C) Share the footage informally with friends. D. Release the footage on social media.
A) Keep no record to avoid scrutiny. B) Ignore the confession if it complicates the case. C) Rely on officer notes only. D) Record the interview (audio/video), document breaks, advise of rights, and provide access to counsel as required.
A) Wait for suspects to make contact to reduce workload. B) Immediate raid without planning to ensure surprise. C) Conduct surveillance to build probable cause and plan a coordinated arrest/search to maximize evidence recovery while minimizing risk. D) Publicly warn suspects to allow them to leave peacefully.
A) Publicize the clerk’s identity to attract witnesses. B) Arrest the procurement officers immediately without evidence. C) Assess threat credibility, provide protective measures for the clerk, document threats, and investigate possible links to the procurement irregularities. D) Ignore the threats because they’re anonymous.
A) Ignore the ordinance and detain anyway. B) Release the suspect citing ambiguity. C) Destroy the firearm to avoid legal debates. D) Secure the firearm, detain based on prior conviction restrictions if applicable, document the statutory basis, and consult legal advisors if ordinance is ambiguous.
A) Ignore forensic findings that contradict the first report. B) Reopen the investigation, preserve the scene, re-interview witnesses, and prioritize forensic reevaluation to collect missed evidence. C) Close the file because initial assessment said accidental. D) Arrest random individuals to satisfy public pressure.
A) Grant immunity immediately to secure testimony. B) Publicly announce the deal to show toughness. C) Assess reliability and corroboration of the information, weigh public interest, and coordinate with prosecutors on the terms and documentation. D) Refuse any cooperation to avoid making deals.
A) Destroy disputed evidence to avoid legal battles. B) Assume evidence will be admissible everywhere. C) Have one agency claim sole responsibility to insulate others. D) Establish cross-jurisdictional agreements, follow highest-standard procedures, and document chain-of-custody and legal bases for actions.
A) Ignore the video because of unknown origin. B) Publish the footage widely to test public reaction. C) Alter the recording to remove irrelevant portions. D) Forensically preserve the original recording, attempt to authenticate source (metadata, chain), and corroborate with other evidence before charging.
A) Prioritize samples most likely to link perpetrators to violent acts and use presumptive tests, while documenting backlog and rationale. B) Wait until all samples can be fully analyzed simultaneously. C) Allow suspects to choose which samples are analyzed D) Discard less clear samples to focus on a single target.
A) Avoid any documentation to protect covert methods. B) Instruct the officer to coerce suspects into committing crimes. C) Offer rewards to induce suspects to commit the crime D) Ensure the undercover operation targets individuals with demonstrated predisposition, avoid persuasion beyond opportunity provision, and document undercover conduct and supervisory approval.
A) Digitize records with secure backups, index for retrieval, and follow retention rules while preserving originals and chain-of-custody metadata. B) Leave files as-is to avoid tampering. C) Store files in non-climate-controlled areas to save cost. D) Dispose of older files to free storage.
A) Dismiss the witness and rely solely on circumstantial evidence. B) Force the witness to testify without protection. C) Offer appropriate protective measures (anonymity where allowed, relocation, witness protection options), corroborate witness statements with independent evidence, and document all steps. D) Promise the witness immunity without prosecutor approval.
A) An opinion piece summarizing public frustration. B) Oral briefings without written record. C) A short memo with allegations but no supporting exhibits. D) A structured investigative file linking actions to laws, with timelines, documentary evidence, witness statements, forensic accounting, and chain-of-custody documentation.
A) Ignore the mayor’s order and leave the area. B) Arrest all protesters to avoid confrontation. C) Execute the order immediately without question. D) Seek clarification and refuse to use force if it violates constitutional rights, documenting the order and advising superiors.
A) Ignore the threat to prevent panic. B) Share verified intelligence with relevant units, recommend preventive deployment, and monitor for threat escalation. C) Release the intelligence to media for awareness. D) Cancel the event without confirmation.
A) Post the discovery on social media for public reaction. B) Report the misconduct through official internal affairs channels with documented evidence. C) Ignore it to maintain camaraderie. D) Confront the colleague privately and drop the matter.
A) Wait for political approval before acting. B) Follow the established chain of command, coordinate through inter-agency mechanisms, and ensure decisions prioritize life and safety. C) Local authorities should ignore national directives. D) Compete for control to assert jurisdiction.
A) Retrieve the evidence personally without coordination. B) Rely on media leaks as primary evidence. C) Copy online files anonymously to save time. D) Secure mutual legal assistance through diplomatic channels, authenticating evidence under international protocols.
A) Leak the tip to journalists for verification. B) Evaluate the new information for corroboration before acting, documenting the informant’s credibility history. C) Immediately act on the tip to prove trust. D) Disregard all tips from the informant permanently.
A) Lecture-only sessions on legal definitions. B) Rote memorization of procedures. C) Reading assignments with no assessment. D) Scenario-based simulations that require applying principles, analyzing consequences, and making ethical decisions.
A) Evidence may be suppressed due to unlawful entry without exigent circumstances. B) Evidence can be used if the media publicizes it. C) Evidence is admissible since drugs were found. D) The suspect’s reputation justifies entry.
A) Blame media influence alone. B) Focus solely on crime rates. C) Use anecdotal accounts without research. D) Conduct a multifactor analysis considering socio-economic, family, and peer influences supported by field data.
A) Maintain objectivity, document all communications, and escalate unethical interference through proper oversight channels. B) Leak information to social media. C) Alter findings to satisfy superiors. D) Resign immediately without report.
A) Ignore it if the bags are sealed. B) Suspend analysis, notify superiors, re-label under observation, and document corrective action. C) Continue analysis to save time. D) Guess the labels based on memory.
A) Interview a few acquaintances for opinions. B) Use social media surveys only. C) Generalize from foreign data without context. D) Use mixed methods: statistical analysis of parole records plus qualitative interviews, ensuring ethical confidentiality.
A) Publicly accuse the superior without proof. B) Document the incident and report through ethics or internal affairs units. C) Accept the practice as normal. D) Request a share to maintain harmony.
A) Compare longitudinal crime data with periods of governance shifts and social unrest indicators. B) Use a single-year snapshot. C) Rely solely on anecdotal reports. D) Assume correlation without data.
A) Provide security favoring the incumbent. B) Apply equal protection, enforce laws without bias, and coordinate with all parties. C) Deny opposition permits to maintain order. D) Avoid visibility to prevent controversy.
A) Counting only the number of arrests. B) Assessing reduction in recidivism, public satisfaction, and resource efficiency over time. C) Reporting political popularity. D) Measuring officers’ overtime hours.
A) No consequence if evidence is strong. B) Statements may be excluded as violation of rights. C) Officer is commended for persistence. D) Confession is valid if obtained later.
A) Ignore the case to maintain morale. B) Transfer the officer secretly. C) Dismissal without review. D) Sanction consistent with degree of fault and precedent, allowing appeal per civil service rules.
A) Shorten sentences arbitrarily. B) Build more prisons without study. C) Implement alternatives to incarceration and rehabilitative programs evaluated through empirical data. D) Increase arrests to show control.
A) Ignore criticism as political. B) Issue media denials only. C) Replace all analysts without review. D) Establish quality assurance programs, independent audits, and blind proficiency testing.
A) Apply the law mechanically without exception. B) Punish the parent for negligence. C) Detain the minor to set example. D) Exercise discretion based on humanitarian and situational judgment, documenting reasons for non-arrest.
A) Deploy tactical units to show authority. B) Increase patrols without engagement. C) Implement community policing emphasizing dialogue, transparency, and participatory problem-solving. D) Avoid the community until tensions cool.
A) Present empirical data, case studies, and policy recommendations grounded in research. B) Attack political figures personally. C) Cite emotional anecdotes only. D) Refuse to answer questions.
A) Establish clear legal basis, accuracy verification, data protection, and human review before action. B) Publicize all scanned identities. C) Detain all matches automatically. D) Operate secretly to avoid oversight.
A) Retain falsified results for prestige. B) Delete all records to avoid embarrassment. C) Ignore falsification to protect funding. D) Report data manipulation, correct findings transparently, and ensure accountability.
A) Maintain the current enforcement-focused approach. B) Increase arrests to meet quotas. C) Integrate prevention, rehabilitation, and demand-reduction components supported by longitudinal assessment. D) Ignore outcome data as irrelevant.
A) Ignore citizen feedback. B) Judge success by number of likes. C) Develop measurable indicators of community perception and conduct periodic surveys. D) Assume success after one week.
A) Combine all figures without explanation. B) Compare definitions, time frames, and data collection methods before interpreting trends. C) Disregard one agency entirely. D) Choose the dataset that supports personal views.
A) Clean the area quietly. B) Hide the discovery to avoid administrative issues. C) Destroy all evidence. D) Immediately report, isolate affected evidence, document, and request independent verification.
A) Blanket arrests of demonstrators. B) Facilitate lawful protest while preventing violence and protecting property through proportionate measures. C) Prohibit all public assemblies. D) Ignore threats to public safety.
A) Increase solitary confinement. B) End all education programs to reduce costs. C) Focus solely on punishment. D) Expand inmate education and vocational programs as rehabilitation strategies.
A) Ignore to avoid false alarms. B) Release details to the media. C) Validate intelligence, coordinate with relevant agencies, and implement preemptive security measures. D) Wait for confirmation by the attackers.
A) Ignore the signs to obtain a confession. B) Suspend the interrogation, ensure medical or psychological assessment, and resume only under ethical safeguards. C) Record only partial statements. D) Continue questioning aggressively.
A) Number of arrests made. B) Levels of community trust, problem-solving engagement, and citizen satisfaction. C) Patrol distance covered. D) Budget spent on patrols.
A) Encourages investigative reporting. B) No consequence if information is accurate. C) Strengthens transparency. D) Breach of confidentiality—subject to administrative and criminal liability.
A) Communicate findings in actionable, evidence-based briefs and engage policymakers through dialogue. B) Submit long academic papers without summaries. C) Avoid sharing results to stay neutral. D) Publicly criticize noncompliance.
A) Focus on the majority group for convenience. B) Apply uniform investigative procedures, document decisions C) Allow public opinion to guide investigation. D) Avoid questioning politically powerful individuals.
A) Add more paperwork layers B) Rely solely on patrol intuition. C) Implement computer-aided dispatch systems with geographic crime mapping. D) Eliminate radio communication.
A) Television access rate. B) Number of police stations. C) Average vehicle ownership. D) Corruption perception index and public trust surveys.
A) Equal distribution. B) Chain of command. C) Unity of command. D) Delegation with control—supervision must accompany assignment of responsibility.
A) Follow the order to preserve political harmony. B) Refuse unlawful arrests, advise on freedom of the press, and document the directive for legal protection. C) Threaten the journalists to cooperate. D) Ignore the issue.
A) Silence for personal safety. B) Negotiation for higher compensation. C) . Integrity and rejection of corruption—report the bribe attempt through official channels. D) Loyalty to colleagues.
A) Punish the researcher. B) Deny findings publicly. C) Review recruitment, training, and operational policies to address identified disparities. D) Ignore the issue to protect image.
A) Devolution. B) Centralization of power. C) Decentralization. D) Autonomy.
A) Cross-examination rights. B) Evidentiary privilege. C) Neutrality. D) Scientific ethics—testify only within verified competence.
A) It punishes offenders harshly. B) It focuses on repairing harm, promoting accountability, and reintegrating offenders into society. C) It is less expensive. D) It avoids legal process.
A) Faster results. B) Operational efficiency. C) Reduced detection. D) Legal admissibility of evidence and exposure to liability.
A) Classify all reports as confidential. B) Publish annual performance audits and citizen scorecards. C) Suppress performance data. D) Limit access to internal evaluations.
A) Sampling error. B) Violation of research ethics regarding autonomy and voluntary participation. C) Time management error. D) Data reliability issue only.
A) Erosion of civil liberties and potential abuse of authority. B) Increased trust in government. C) Reduced misinformation. D) Balanced governance.
A) Due process — provide notice, access to evidence, and opportunity to respond. B) Immediate dismissal without hearing. C) Publicly shame the officer to deter others. D) Transfer the officer quietly.
A) Ignore it as part of punishment. B) Secretly treat inmates without approval. C) Report the violation to correctional authorities and human rights oversight bodies with documentation. D) Publicize it online without verification.
A) Delete affected evidence. B) Objectively record the contamination, explain its implications, and recommend procedural improvement. C) Accuse officers by name without proof. D) Omit it to avoid conflict.
A) Wait for political funding. B) Reduce lighting to save energy. C) Conduct crime mapping to identify hotspots and allocate resources based on spatial analysis. D) Conduct crime mapping to identify hotspots and allocate resources based on spatial analysis.
A) Rational choice theory. B) Administrative efficiency. C) Procedural justice violation and moral disengagement. D) Deterrence theory.
A) Biological determinism. B) Effective deterrence. C) Overcriminalization and incapacitation limits. D) Labeling as positive reinforcement.
A) Threaten the suspect for dishonesty. B) Force another confession. C) Disregard retraction as a tactic. D) Review interview recordings, medical reports, and corroborative evidence to assess voluntariness.
A) Ban all online platforms. B) Focus solely on arrests. C) Block internet nationwide. D) Implement counter-messaging, digital literacy, and intelligence collaboration with legal safeguards.
A) Secure payroll records, interview officials, and trace disbursement trails to establish fraudulent intent. B) Remove names quietly. C) Replace missing funds with estimates. D) Announce findings before verifying.
A) Classical deterrence model. B) Biopsychosocial model. C) Retributive model. D) Economic choice model.
A) Public education. B) Violation of confidentiality and potential prejudice to ongoing investigation. C) Deterrence through publicity. D) Enhanced community relations.
A) Increased punishment satisfaction. B) Reduced facility costs. C) Lower recidivism and improved reintegration indicators (employment, education, community support). D) Higher inmate population.
A) Privacy laws, community consent, and proportionality of surveillance scope. B) Number of cameras installed. C) Political popularity. D) Camera brand and cost.
A) Conduct risk assessment, enhance personal and office security, and coordinate with protective services. B) Withdraw charges. C) Ignore the threats. D) Delay the case indefinitely.
A) Interview only offenders. B) Combine survey data, hospital records, and NGO reports through triangulation C) Use only police reports D) Assume low incidence.
A) Cover up to avoid institutional damage. B) Publicly accuse all officials. C) Avoid evidence collection against government staff. D) Pursue investigation regardless of rank, maintaining confidentiality and due process.
A) Random deviance. D. Personality defect B) Individual anger management failure. C) Socio-economic inequality, state repression, and power imbalance. D) Personality defect of leaders.
A) Independent civilian oversight with disciplinary authority and transparency. B) Internal self-review only. C) Secrecy in all misconduct cases. D) Political control over police operations.
A) Confirmation bias. B) Single analyst authority. C) Inter-examiner reliability testing and blind verification. D) Immediate conclusion to save time.
A) Social disorganization theory. B) Labeling theory. C) Routine activity and Crime Prevention Through Environmental Design (CPTED). D) Biological theory.
A) Public spectacle. B) Media presence. C) Political timing. D) Safety of all parties, risk of flight, and minimal intrusion of privacy.
A) Thematic analysis. B) Simple observation. C) Confession-only approach. D) Financial forensics using transaction mapping and cross-account verification.
A) Routine activity theory. B) Classical rational choice theory. C) Strain and relative deprivation theories. D) Biological positivism.
A) Silo mentality. B) Independent press briefings. C) Rivalry to test competence. D) Information sharing through unified command and clear protocols.
A) Total immunity of officials. B) Removal of judicial independence. C) Judicial review and separation of powers to limit executive overreach. D) Stronger executive powers. |