A) Use force against the entire group without distinguishing roles to quickly stop the situation. B) Detain the suspect indefinitely because shouting makes him responsible for the riot. C) Arrest the suspect for incitement and violent disorder, document witness statements, and seek pobable cause based on both words and conduct D) Release the suspect because he did not physically throw rocks
A) Seize the drugs, document the plain-view discovery properly, and add them to the inventory and case file. B) Modify the warrant on the spot to include drugs without judicial approval. C) Ignore the drugs because they’re not relevant to the bribery case. D) Destroy the drugs to prevent contamination of the scene.
A) Prioritize prints most likely to identify the principal suspect(s) and those linked to violent contact areas, documenting why others remain unprocessed. B) Randomly process prints to avoid bias. C) Process prints found on irrelevant background surfaces first. D) Wait until all prints can be processed simultaneously
A) Continue questioning both together to expedite confession. B) Stop questioning the one who requested counsel until counsel is present; proceed with the other only after ensuring rights were knowingly waived. C) Ignore the counsel request because joint questioning is efficient. D) Force counsel on both suspects
A) Question the relatives informally without documentation. B) Publicly announce the accusation to encourage whistleblowers. C) Secure financial records, contract files, and correspondence through lawful subpoenas and preserve chain of custody for documents. D) Arrest the official immediately based on public outrage.
A) Respect refusal, request a canine sniff (where lawful) or obtain a warrant if probable cause can be articulated. B) Arrest the driver for nervousness alone. C) Destroy the seals to inspect contents without legal process. D) Force entry into the crates immediately.
A) Secure and cordon the scene, establish single entry/exit points, and assign officers to preserve evidence and control access. B) Allow crowds to roam to collect more witness statements. C) Release witnesses immediately to ease crowd control. D) Move the body to the morgue
A) Skip interviews and rely on social media posts. B) Conduct long, in-depth interviews with each bystander regardless of role. C) Ask witnesses to post their account on public forums. D) Use focused, structured interviews targeting key witnesses and roles (e.g., first responders, victims, organizers), documenting time, place, and observations.
A) Immediately reset phones to factory settings to prevent data leakage. B) Let suspects continue using their phones to avoid confrontation. C) Place phones in Faraday bags or otherwise isolate them, log them, and follow forensic imaging procedures. D) Hand phones back to suspects after brief notes.
A) Refuse to explain accounting methods to avoid oversimplification. B) Use technical jargon to demonstrate expertise C) Produce a clear timeline, visual exhibits (flowcharts), and explain transactions in plain language linking them to intent and recipients. D) Read raw spreadsheets aloud.
A) Allow field officers to verbalize transfers without written notes. B) Establish a unified chain-of-custody protocol beforehand, train personnel, and use single, continuous documentation for each item. C) Destroy duplicate records to avoid confusion. D) Each team uses its own form; discrepancies are normal.
A) Delete the footage to protect the colleague. B) Share the footage informally with friends. D. Release the footage on social media. C) Preserve and submit the footage through official channels for investigation, following department policy.
A) Record the interview (audio/video), document breaks, advise of rights, and provide access to counsel as required. B) Rely on officer notes only. C) Ignore the confession if it complicates the case. D) Keep no record to avoid scrutiny.
A) Conduct surveillance to build probable cause and plan a coordinated arrest/search to maximize evidence recovery while minimizing risk. B) Immediate raid without planning to ensure surprise. C) Wait for suspects to make contact to reduce workload. D) Publicly warn suspects to allow them to leave peacefully.
A) Ignore the threats because they’re anonymous. B) Arrest the procurement officers immediately without evidence. C) Publicize the clerk’s identity to attract witnesses. D) Assess threat credibility, provide protective measures for the clerk, document threats, and investigate possible links to the procurement irregularities.
A) Destroy the firearm to avoid legal debates. B) Release the suspect citing ambiguity. C) Ignore the ordinance and detain anyway. D) Secure the firearm, detain based on prior conviction restrictions if applicable, document the statutory basis, and consult legal advisors if ordinance is ambiguous.
A) Close the file because initial assessment said accidental. B) Arrest random individuals to satisfy public pressure. C) Reopen the investigation, preserve the scene, re-interview witnesses, and prioritize forensic reevaluation to collect missed evidence. D) Ignore forensic findings that contradict the first report.
A) Refuse any cooperation to avoid making deals. B) Publicly announce the deal to show toughness. C) Assess reliability and corroboration of the information, weigh public interest, and coordinate with prosecutors on the terms and documentation. D) Grant immunity immediately to secure testimony.
A) Have one agency claim sole responsibility to insulate others. B) Destroy disputed evidence to avoid legal battles. C) Establish cross-jurisdictional agreements, follow highest-standard procedures, and document chain-of-custody and legal bases for actions. D) Assume evidence will be admissible everywhere.
A) Ignore the video because of unknown origin. B) Alter the recording to remove irrelevant portions. C) Forensically preserve the original recording, attempt to authenticate source (metadata, chain), and corroborate with other evidence before charging. D) Publish the footage widely to test public reaction.
A) Wait until all samples can be fully analyzed simultaneously. B) Discard less clear samples to focus on a single target. C) Allow suspects to choose which samples are analyzed D) Prioritize samples most likely to link perpetrators to violent acts and use presumptive tests, while documenting backlog and rationale.
A) Instruct the officer to coerce suspects into committing crimes. B) Ensure the undercover operation targets individuals with demonstrated predisposition, avoid persuasion beyond opportunity provision, and document undercover conduct and supervisory approval. C) Offer rewards to induce suspects to commit the crime D) Avoid any documentation to protect covert methods.
A) Leave files as-is to avoid tampering. B) Dispose of older files to free storage. C) Digitize records with secure backups, index for retrieval, and follow retention rules while preserving originals and chain-of-custody metadata. D) Store files in non-climate-controlled areas to save cost.
A) Offer appropriate protective measures (anonymity where allowed, relocation, witness protection options), corroborate witness statements with independent evidence, and document all steps. B) Promise the witness immunity without prosecutor approval. C) Force the witness to testify without protection. D) Dismiss the witness and rely solely on circumstantial evidence.
A) A short memo with allegations but no supporting exhibits. B) A structured investigative file linking actions to laws, with timelines, documentary evidence, witness statements, forensic accounting, and chain-of-custody documentation. C) An opinion piece summarizing public frustration. D) Oral briefings without written record.
A) Ignore the mayor’s order and leave the area. B) Arrest all protesters to avoid confrontation. C) Execute the order immediately without question. D) Seek clarification and refuse to use force if it violates constitutional rights, documenting the order and advising superiors.
A) Release the intelligence to media for awareness. B) Ignore the threat to prevent panic. C) Cancel the event without confirmation. D) Share verified intelligence with relevant units, recommend preventive deployment, and monitor for threat escalation.
A) Report the misconduct through official internal affairs channels with documented evidence. B) Post the discovery on social media for public reaction. C) Confront the colleague privately and drop the matter. D) Ignore it to maintain camaraderie.
A) Wait for political approval before acting. B) Local authorities should ignore national directives. C) Follow the established chain of command, coordinate through inter-agency mechanisms, and ensure decisions prioritize life and safety. D) Compete for control to assert jurisdiction.
A) Secure mutual legal assistance through diplomatic channels, authenticating evidence under international protocols. B) Copy online files anonymously to save time. C) Retrieve the evidence personally without coordination. D) Rely on media leaks as primary evidence.
A) Disregard all tips from the informant permanently. B) Leak the tip to journalists for verification. C) Evaluate the new information for corroboration before acting, documenting the informant’s credibility history. D) Immediately act on the tip to prove trust.
A) Rote memorization of procedures. B) Scenario-based simulations that require applying principles, analyzing consequences, and making ethical decisions. C) Reading assignments with no assessment. D) Lecture-only sessions on legal definitions.
A) Evidence can be used if the media publicizes it. B) The suspect’s reputation justifies entry. C) Evidence is admissible since drugs were found. D) Evidence may be suppressed due to unlawful entry without exigent circumstances.
A) Focus solely on crime rates. B) Conduct a multifactor analysis considering socio-economic, family, and peer influences supported by field data. C) Use anecdotal accounts without research. D) Blame media influence alone.
A) Leak information to social media. B) Maintain objectivity, document all communications, and escalate unethical interference through proper oversight channels. C) Alter findings to satisfy superiors. D) Resign immediately without report.
A) Continue analysis to save time. B) Guess the labels based on memory. C) Suspend analysis, notify superiors, re-label under observation, and document corrective action. D) Ignore it if the bags are sealed.
A) Use mixed methods: statistical analysis of parole records plus qualitative interviews, ensuring ethical confidentiality. B) Interview a few acquaintances for opinions. C) Use social media surveys only. D) Generalize from foreign data without context.
A) Document the incident and report through ethics or internal affairs units. B) Accept the practice as normal. C) Request a share to maintain harmony. D) Publicly accuse the superior without proof.
A) Use a single-year snapshot. B) Assume correlation without data. C) Rely solely on anecdotal reports. D) Compare longitudinal crime data with periods of governance shifts and social unrest indicators.
A) Avoid visibility to prevent controversy. B) Deny opposition permits to maintain order. C) Apply equal protection, enforce laws without bias, and coordinate with all parties. D) Provide security favoring the incumbent.
A) Counting only the number of arrests. B) Reporting political popularity. C) Measuring officers’ overtime hours. D) Assessing reduction in recidivism, public satisfaction, and resource efficiency over time.
A) Statements may be excluded as violation of rights. B) No consequence if evidence is strong. C) Confession is valid if obtained later. D) Officer is commended for persistence.
A) Sanction consistent with degree of fault and precedent, allowing appeal per civil service rules. B) Dismissal without review. C) Ignore the case to maintain morale. D) Transfer the officer secretly.
A) Build more prisons without study. B) Shorten sentences arbitrarily. C) Implement alternatives to incarceration and rehabilitative programs evaluated through empirical data. D) Increase arrests to show control.
A) Issue media denials only. B) Establish quality assurance programs, independent audits, and blind proficiency testing. C) Replace all analysts without review. D) Ignore criticism as political.
A) Punish the parent for negligence. B) Apply the law mechanically without exception. C) Detain the minor to set example. D) Exercise discretion based on humanitarian and situational judgment, documenting reasons for non-arrest.
A) Deploy tactical units to show authority. B) Avoid the community until tensions cool. C) Increase patrols without engagement. D) Implement community policing emphasizing dialogue, transparency, and participatory problem-solving.
A) Cite emotional anecdotes only. B) Refuse to answer questions. C) Present empirical data, case studies, and policy recommendations grounded in research. D) Attack political figures personally.
A) Operate secretly to avoid oversight. B) Detain all matches automatically. C) Establish clear legal basis, accuracy verification, data protection, and human review before action. D) Publicize all scanned identities.
A) Retain falsified results for prestige. B) Ignore falsification to protect funding. C) Delete all records to avoid embarrassment. D) Report data manipulation, correct findings transparently, and ensure accountability.
A) Maintain the current enforcement-focused approach. B) Integrate prevention, rehabilitation, and demand-reduction components supported by longitudinal assessment. C) Ignore outcome data as irrelevant. D) Increase arrests to meet quotas.
A) Judge success by number of likes. B) Develop measurable indicators of community perception and conduct periodic surveys. C) Ignore citizen feedback. D) Assume success after one week.
A) Compare definitions, time frames, and data collection methods before interpreting trends. B) Disregard one agency entirely. C) Choose the dataset that supports personal views. D) Combine all figures without explanation.
A) Hide the discovery to avoid administrative issues. B) Clean the area quietly. C) Immediately report, isolate affected evidence, document, and request independent verification. D) Destroy all evidence.
A) Blanket arrests of demonstrators. B) Facilitate lawful protest while preventing violence and protecting property through proportionate measures. C) Ignore threats to public safety. D) Prohibit all public assemblies.
A) Expand inmate education and vocational programs as rehabilitation strategies. B) End all education programs to reduce costs. C) Focus solely on punishment. D) Increase solitary confinement.
A) Release details to the media. B) Wait for confirmation by the attackers. C) Ignore to avoid false alarms. D) Validate intelligence, coordinate with relevant agencies, and implement preemptive security measures.
A) Record only partial statements. B) Suspend the interrogation, ensure medical or psychological assessment, and resume only under ethical safeguards. C) Ignore the signs to obtain a confession. D) Continue questioning aggressively.
A) Number of arrests made. B) Budget spent on patrols. C) Patrol distance covered. D) Levels of community trust, problem-solving engagement, and citizen satisfaction.
A) Encourages investigative reporting. B) Strengthens transparency. C) No consequence if information is accurate. D) Breach of confidentiality—subject to administrative and criminal liability.
A) Publicly criticize noncompliance. B) Communicate findings in actionable, evidence-based briefs and engage policymakers through dialogue. C) Avoid sharing results to stay neutral. D) Submit long academic papers without summaries.
A) Focus on the majority group for convenience. B) Avoid questioning politically powerful individuals. C) Allow public opinion to guide investigation. D) Apply uniform investigative procedures, document decisions
A) Rely solely on patrol intuition. B) Eliminate radio communication. C) Add more paperwork layers D) Implement computer-aided dispatch systems with geographic crime mapping.
A) Average vehicle ownership. B) Corruption perception index and public trust surveys. C) Television access rate. D) Number of police stations.
A) Delegation with control—supervision must accompany assignment of responsibility. B) Unity of command. C) Chain of command. D) Equal distribution.
A) Ignore the issue. B) Refuse unlawful arrests, advise on freedom of the press, and document the directive for legal protection. C) Follow the order to preserve political harmony. D) Threaten the journalists to cooperate.
A) . Integrity and rejection of corruption—report the bribe attempt through official channels. B) Negotiation for higher compensation. C) Loyalty to colleagues. D) Silence for personal safety.
A) Review recruitment, training, and operational policies to address identified disparities. B) Punish the researcher. C) Deny findings publicly. D) Ignore the issue to protect image.
A) Decentralization. B) Devolution. C) Centralization of power. D) Autonomy.
A) Evidentiary privilege. B) Neutrality. C) Cross-examination rights. D) Scientific ethics—testify only within verified competence.
A) It punishes offenders harshly. B) It is less expensive. C) It focuses on repairing harm, promoting accountability, and reintegrating offenders into society. D) It avoids legal process.
A) Legal admissibility of evidence and exposure to liability. B) Faster results. C) Reduced detection. D) Operational efficiency.
A) Suppress performance data. B) Publish annual performance audits and citizen scorecards. C) Classify all reports as confidential. D) Limit access to internal evaluations.
A) Violation of research ethics regarding autonomy and voluntary participation. B) Time management error. C) Data reliability issue only. D) Sampling error.
A) Increased trust in government. B) Balanced governance. C) Reduced misinformation. D) Erosion of civil liberties and potential abuse of authority.
A) Due process — provide notice, access to evidence, and opportunity to respond. B) Transfer the officer quietly. C) Publicly shame the officer to deter others. D) Immediate dismissal without hearing.
A) Report the violation to correctional authorities and human rights oversight bodies with documentation. B) Ignore it as part of punishment. C) Publicize it online without verification. D) Secretly treat inmates without approval.
A) Omit it to avoid conflict. B) Accuse officers by name without proof. C) Objectively record the contamination, explain its implications, and recommend procedural improvement. D) Delete affected evidence.
A) Conduct crime mapping to identify hotspots and allocate resources based on spatial analysis. B) Reduce lighting to save energy. C) Conduct crime mapping to identify hotspots and allocate resources based on spatial analysis. D) Wait for political funding.
A) Deterrence theory. B) Procedural justice violation and moral disengagement. C) Administrative efficiency. D) Rational choice theory.
A) Effective deterrence. B) Biological determinism. C) Labeling as positive reinforcement. D) Overcriminalization and incapacitation limits.
A) Review interview recordings, medical reports, and corroborative evidence to assess voluntariness. B) Threaten the suspect for dishonesty. C) Force another confession. D) Disregard retraction as a tactic.
A) Implement counter-messaging, digital literacy, and intelligence collaboration with legal safeguards. B) Ban all online platforms. C) Focus solely on arrests. D) Block internet nationwide.
A) Replace missing funds with estimates. B) Secure payroll records, interview officials, and trace disbursement trails to establish fraudulent intent. C) Announce findings before verifying. D) Remove names quietly.
A) Economic choice model. B) Retributive model. C) Classical deterrence model. D) Biopsychosocial model.
A) Deterrence through publicity. B) Violation of confidentiality and potential prejudice to ongoing investigation. C) Enhanced community relations. D) Public education.
A) Higher inmate population. B) Lower recidivism and improved reintegration indicators (employment, education, community support). C) Reduced facility costs. D) Increased punishment satisfaction.
A) Number of cameras installed. B) Camera brand and cost. C) Political popularity. D) Privacy laws, community consent, and proportionality of surveillance scope.
A) Ignore the threats. B) Delay the case indefinitely. C) Withdraw charges. D) Conduct risk assessment, enhance personal and office security, and coordinate with protective services.
A) Combine survey data, hospital records, and NGO reports through triangulation B) Interview only offenders. C) Use only police reports D) Assume low incidence.
A) Pursue investigation regardless of rank, maintaining confidentiality and due process. B) Cover up to avoid institutional damage. C) Avoid evidence collection against government staff. D) Publicly accuse all officials.
A) Random deviance. D. Personality defect B) Socio-economic inequality, state repression, and power imbalance. C) Individual anger management failure. D) Personality defect of leaders.
A) Secrecy in all misconduct cases. B) Internal self-review only. C) Independent civilian oversight with disciplinary authority and transparency. D) Political control over police operations.
A) Inter-examiner reliability testing and blind verification. B) Confirmation bias. C) Single analyst authority. D) Immediate conclusion to save time.
A) Labeling theory. B) Social disorganization theory. C) Routine activity and Crime Prevention Through Environmental Design (CPTED). D) Biological theory.
A) Safety of all parties, risk of flight, and minimal intrusion of privacy. B) Political timing. C) Public spectacle. D) Media presence.
A) Financial forensics using transaction mapping and cross-account verification. B) Confession-only approach. C) Simple observation. D) Thematic analysis.
A) Routine activity theory. B) Biological positivism. C) Strain and relative deprivation theories. D) Classical rational choice theory.
A) Information sharing through unified command and clear protocols. B) Independent press briefings. C) Rivalry to test competence. D) Silo mentality.
A) Total immunity of officials. B) Stronger executive powers. C) Judicial review and separation of powers to limit executive overreach. D) Removal of judicial independence. |