Quizzes
Search
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Create a Quiz
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Search
Create A Quiz
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Products
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Quizzes
Quizzes
›
Business
›
Company
Db Ch7
48 Questions
|
By Carrot_Cake | Updated: Feb 15, 2013
| Attempts: 142
Share
Quiz
Flashcard
Start
Share on Facebook
Share on Twitter
Share on Whatsapp
Share on Pinterest
Share on Email
Copy to Clipboard
Embed on your website
Question
1
/ 48
0 %
0/100
Score
0/100
1.
Criminal intelligence gathering is one of the least understood aspects of criminal investigation and is one of the most valuable and underused resources
True
False
Submit
Start Quiz
About This Quiz
2.
What's your name?
We’ll put your name on your report, certificate, and leaderboard.
2.
During a three-officer surveillance, if a street is crowded then all three officers should remain on the same side of the street as the suspect
True
False
Submit
3.
The RISS projects are funded on a yearly basis by the United States Congress
True
False
Submit
4.
The dissemination stage sees more breakdown than does any other stage
True
False
Submit
5.
The preferred method of storing intelligence data is by index cards because of their simplicity and security
True
False
Submit
6.
Data collection is the hallmark of the intelligence function
True
False
Submit
7.
Each state in the United States is placed in one of ten RISS regions
True
False
Submit
8.
Event flow analysis is the most commonly used method of investigating drug kingpins
True
False
Submit
9.
The heart of the RISS projects is a centralized database
True
False
Submit
10.
Even the best of intelligence does not produce decisions
True
False
Submit
11.
The role of intelligence personnel is more of a line function than a staff function
True
False
Submit
12.
Generally, a stakeout team consists of an inside team and an outside team. The inside team is normally designated as the arrest team.
True
False
Submit
13.
Data integration is a method of conducting link analysis
True
False
Submit
14.
The use of an outside auditor is typically the best approach to purging intelligence files.
True
False
Submit
15.
If a suspect is shot he or she should be disarmed immediately and handcuffed unless he is dead or unconscious
True
False
Always
Explanation
Always
Submit
16.
Criminal investigators generally use inductive logic, whereas intelligence unit personnel use deductive logic
True
False
Submit
17.
In regards to a stakeout, _______ should be the maximum allowable response time for the outside team to get to the stakeout
15 seconds
30 seconds
1 minute
45 seconds
Submit
18.
Approximately ________ of all intercepted conversations have been classified as "incriminating"
One-half
One-third
One-fourth
Two-thirds
Submit
19.
Which best describes the collation process?
Comparing data by designing charts in sequence
Listing the names of criminals in various crimes
Providing information to different agencies
Deleting data that is not relevant to the objective
Submit
20.
_________ systems measure radiant heat energy and display their readings as thermographs
Forward-looking infrared
Thermal imaging
HGH infrared
Thermal-violet imaging
Submit
21.
Which is true regarding the nature of the criminal intelligence function?
Overt intelligence collection is more commonly done than is covert intelligence collection
The patrol division is especially useful in conducting covert intelligence activities
Covert methods include the use of surveillance equipment, undercover agents, and informants
Typically, the role of intelligence personnel is to receive information from line personnel
Submit
22.
____________ includes personal interaction with people, many of whom are witnesses to crimes, victims of crimes, or the suspects themselves
Overt information collection
Covert information collection
Intelligence gathering
Criminal intelligence
Submit
23.
_______ is the most common and includes a method known as intelligence gathering. This is a process of data collection on criminal acts that have not yet occured but for which the investigator must prepare.
Overt information collection
Covert information collection
Intelligence extraction
Criminal intelligence
Submit
24.
Which is the first step in the intelligence gathering process?
Collection
Dissemination
Target selection
Collation and analysis
Submit
25.
__________ plays a role in the investigation of crimes by providing the investigator with a tool for long-range planning
Strategic intelligence
Tactical intelligence
Intelligence gathering
Criminal intelligence
Submit
26.
The ___________ may be of value in locating hideouts or meeting places when the risk of trailing a suspect is too great
Progressive or leapfrog method
Two-officer surveillance
Three-officer surveillance
One-officer surveillance
Submit
27.
_________ is a technique designed to show relationships between individuals and organizations using a graphical visual design. It is used to show graphically transactions or relationships that are too large and confusing for one to assimilate through the reading of reports
Link analysis charting
Collation
Flowcharting
Event flow analysis
Submit
28.
The _____ requires that telecommunication carriers ensure law enforcements ability, pursuant to a lawful court order, to intercept communications notwithstanding advanced telecommunications technologies
CALEA - Communications Assistance for Law Enforcement Act
FCC - Federal Communications Commission
FCA - Federal Communications Act
TA - Telecommunications Act
Submit
29.
The Supreme Court underttok a significant change of direction in the area of electronic eavesdropping when it decided the case of _______________
Katz v. U.S.
Berger v. New York
U.S. v Karo
Olmstead v. U.S.
Submit
30.
In which way are crimianl and intelligence functions different?
Criminal investigations tend to be proactive in nature while intelligence ones are reactive
Intelligence personnel tend to use deductive logic while criminal personnel tend to use inductive logic
Criminal personnel are staff functions while intelligence personnel are line functions
Intelligence files are generally closed while criminal files generally are open
Submit
31.
The largest pecentage of terrorist attacks in the United States are bombings by:
Special interest groups against local establishments in urban areas
Lone individuals with anti-government ideals and beliefs
Foreign terrorist groups whose primary purpose is to srike fear into citizens to convince them of the weakness of government
Disgruntled citizens who feel wronged by their government and elected officials
Submit
32.
______________ by individual officers is at the heart of any intelligence operation
Information gathering
Documentation
Criminal intelligence
Informant information
Submit
33.
Which best describes the goal of the RISS projects?
To provide tactical intelligence information to guide decision making
To aid state and local law enforcement agencies in sharing criminal intelligence
To create a nation wide, strategic plan for intelligence collation
To ensure a systematic method for data collection and target selection
Submit
34.
The purpose of ________ is to make fragmented information flow in a logical sequence to make it purposeful to the user
Analysis
Collation
Link analysis
Flowcharts
Submit
35.
In the 1971 case of ________, the court held that law enforcement officer may intercept electronic information when one of the parties involved in the communication gives his or her consent, even without a warrant
U.S. v. White
Katz v. U.S.
Lee v. Florida
U.S. v. Scott
Submit
36.
_________ is defined as knowledge of past, present, or future criminal activity that results from the collection of information that, when evaluated, provides the user with a basis for rational decision making
Criminal intelligence
Overt information collection
Analysis
Intelligence information
Submit
37.
Which best explains the
utility
of an investigation target?
The value of the investigations findings
The heinousness of the criminals activities
The length of sentence the criminal will probably receive
The amount of money the state will save by prosecuting the criminal
Submit
38.
GPS devices can be accurate, down to the nanosecond and within ______
10 feet
20 feet
50 feet
100 feet
Submit
39.
Which is the best example of the analysis chase?
A flowchart
A criminal profile
Dissemination of information
Meaningful interpretation of data
Submit
40.
The _____ requires that investigating officers obtain wiretap-type court orders to eavesdrop on ongoing communications. The use of pen registers and recording devices, however, are specifically excluded by law from court order requirements
ECPA - Electronic Communications Privacy Act
FCC - Federal Communications Commission
FCA - Federal Communications Act
TA - Telecommunications Act
Submit
41.
________ requires that officers take every reasonable effort to monitor only those conversations, through the use of phone taps, body bugs, and the like, that are specifically related to criminal activity under investigation
Minimization
Relevancy
Objectivity
Specific-relative
Submit
42.
Title ____ of the Telecommunications Act of 1996 made it a federal offense for anyone engaged in interstate or international communications to call someone for the purpose of harassment
III
IV
V
VI
Submit
43.
__________ targets criminal activity considered to be of immediate importance to the investigator
Strategic intelligence
Tactical intelligence
Intelligence gathering
Criminal intelligence
Submit
44.
It appears the intelligence function in the United States was first carried out by large-city police departments when:
Immigrants first concentrated in urban areas of the country
Prohibition fueled the criminal activities associated with bootlegging
Organized crime began infiltrating police perosonnel
Information gathering began post World-War II on suspected Communist organizations
Submit
45.
A(n) _______ consists of assessing a potential stakeout location and developing an initial tactical plan
Advance
Target
Asset
Reconnaissance
Skim
Submit
46.
Which illegal activities are most likely to be targets of an intelligence operation?
Drug trafficking
Bank robbery
Pornography
Submit
47.
Which kind of organizations may be the subjects of an intelligence operation?
Those with dangerous religious beliefs
Those that attempt to control arms shipments
Those that advocate the violent overthrow of the government
Submit
48.
Two types of flowcharts have emerged as the most useful in criminal intelligence collection:
Event flow analysis
Commodity flow analysis
Stress flow analysis
Link analysis
Probability analysis
Submit
View My Results
Related Quizzes
Vodafone Company Quiz: Trivia Questions!
Vodafone Company Quiz: Trivia Questions!
Incorporation Of A Company Quizzes
Incorporation Of A Company Quizzes
Private Company Quiz: Test Your Corporate Knowledge
Private Company Quiz: Test Your Corporate Knowledge
Thank you for your feedback!
Would you like to edit this question to improve it?
No thanks
Name:
Email:
Oops! Give us more information:
Incorrect Question
Incorrect Answer
Typos
I have a feedback
Submit
Please provide name and email to proceed.
Please provide correct email to proceed.
Please provide feedback.
Please select the option.
All (48)
Unanswered (
)
Answered (
)
Criminal intelligence gathering is one of the least understood aspects...
During a three-officer surveillance, if a street is crowded...
The RISS projects are funded on a yearly basis by the United States...
The dissemination stage sees more breakdown than does any other stage
The preferred method of storing intelligence data is by index cards...
Data collection is the hallmark of the intelligence function
Each state in the United States is placed in one of ten RISS regions
Event flow analysis is the most commonly used method of investigating...
The heart of the RISS projects is a centralized database
Even the best of intelligence does not produce decisions
The role of intelligence personnel is more of a line function than a...
Generally, a stakeout team consists of an inside team and an outside...
Data integration is a method of conducting link analysis
The use of an outside auditor is typically the best approach to...
If a suspect is shot he or she should be disarmed immediately and...
Criminal investigators generally use inductive logic, whereas...
In regards to a stakeout, _______ should be the maximum allowable...
Approximately ________ of all intercepted conversations have been...
Which best describes the collation process?
_________ systems measure radiant heat energy and display their...
Which is true regarding the nature of the criminal intelligence...
____________ includes personal interaction with people, many of whom...
_______ is the most common and includes a method known as intelligence...
Which is the first step in the intelligence gathering process?
__________ plays a role in the investigation of crimes by providing...
The ___________ may be of value in locating hideouts or meeting places...
_________ is a technique designed to show relationships between...
The _____ requires that telecommunication carriers ensure law...
The Supreme Court underttok a significant change of direction in the...
In which way are crimianl and intelligence functions different?
The largest pecentage of terrorist attacks in the United States are...
______________ by individual officers is at the heart of any...
Which best describes the goal of the RISS projects?
The purpose of ________ is to make fragmented information flow in a...
In the 1971 case of ________, the court held that law enforcement...
_________ is defined as knowledge of past, present, or future criminal...
Which best explains the utility of an investigation target?
GPS devices can be accurate, down to the nanosecond and within ______
Which is the best example of the analysis chase?
The _____ requires that investigating officers obtain wiretap-type...
________ requires that officers take every reasonable effort to...
Title ____ of the Telecommunications Act of 1996 made it a federal...
__________ targets criminal activity considered to be of...
It appears the intelligence function in the United States was first...
A(n) _______ consists of assessing a potential stakeout location and...
Which illegal activities are most likely to be targets of an...
Which kind of organizations may be the subjects of an intelligence...
Two types of flowcharts have emerged as the most useful in criminal...
X
OK
X
OK
Cancel
X
OK
Cancel
Popular Topics
Management Quizzes
Brand Quizzes
Back to top
Back to top
Advertisement