




















Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Before beginning an investigation of locating a suspect, what should you do? A. Begin surveillance immediately B. Gather the suspect's last known address C. Identify the client’s reasoning behind the investigation and if it is considered frivolous D. Conduct a background check on the suspect Correct Answer: C Rationale: It is essential to determine whether the client’s request is legitimate or frivolous before proceeding. Frivolous A. Legal and binding B. Of great importance C. Of little importance, not worthy of serious attention; not meant seriously D. Dangerous and criminal Correct Answer: C Rationale: A frivolous matter is not taken seriously due to its lack of importance.
Typology: Exams
1 / 28
This page cannot be seen from the preview
Don't miss anything!
ss Before beginning an investigation of locating a suspect, what should you do? A. Begin surveillance immediately B. Gather the suspect's last known address C. Identify the client’s reasoning behind the investigation and if it is considered frivolous D. Conduct a background check on the suspect Correct Answer: C Rationale: It is essential to determine whether the client’s request is legitimate or frivolous before proceeding. Frivolous A. Legal and binding B. Of great importance C. Of little importance, not worthy of serious attention; not meant seriously D. Dangerous and criminal Correct Answer: C Rationale: A frivolous matter is not taken seriously due to its lack of importance. After finding the reason for an investigation of locating a suspect, what should you do? A. Conduct surveillance immediately B. Investigate into the claims and the background of the client C. Arrest the suspect D. Create a fake address to track the suspect Correct Answer: B Rationale: Verifying the legitimacy of the claims and the client’s background ensures ethical and lawful investigation. If you cannot locate the subject’s address on maps, what should you do? A. Guess based on nearby landmarks B. Use a postal code search
C. Use GPS to track the phone D. Ask neighbors directly Correct Answer: B Rationale: A postal code search can provide accurate address or vicinity details. When all previous address and contact info is no longer valid, how should you proceed? A. Stop the investigation B. Search the dark web C. Use public databases, libraries, and newspaper ads D. Hire a hacker Correct Answer: C Rationale: These are legitimate tools and sources to locate updated information. What documents require lawful authority or a signed release to obtain? A. Phone bills B. Social media history C. Credit records, income tax, or bank records D. School grades Correct Answer: C Rationale: These are protected personal financial documents and require consent or legal authority. What is a Personal Property Security Registration (PPSR) search useful for? A. Checking marriage status B. Finding criminal records C. Discovering any lien associated with the subject D. Verifying employment history Correct Answer: C Rationale: PPSR helps determine if personal property is used as collateral. What other sources can you research during background checks? A. Horoscope websites B. Social media only C. Bankruptcy records, divorce records, land registry, corporate searches D. Only court transcripts Correct Answer: C Rationale: These sources provide comprehensive legal and financial background.
When is it lawful to record a conversation? A. Without anyone's consent B. Only with police present C. With the knowledge and consent of one party D. Only when written consent is signed Correct Answer: C Rationale: Canadian law requires at least one party’s knowledge and consent. Why can’t you record without consent? A. It’s rude B. It's unreliable C. It’s a criminal offence D. It’s too expensive Correct Answer: C Rationale: Recording without consent violates privacy laws. Purpose of a closing statement after an interview? A. To restate questions B. The client’s agreement to the documented statement C. To thank the witness D. To end the interview formally Correct Answer: B Rationale: It confirms the client’s approval of the statement contents. After the interview, what should the witness be told? A. To forget the interview B. To sign immediately C. To review and request any changes before signing D. To keep it confidential Correct Answer: C Rationale: The witness has a right to review and edit the statement before agreeing. If the witness requests a change in the statement, the PI should: A. Rewrite the statement entirely B. Ignore the request C. Draw a line through the item and initial both ends D. Let the witness change it Correct Answer: C
Rationale: This keeps the integrity of the original document while making corrections transparent. After statement review, what should be done? A. Save a digital copy only B. Leave the document unsigned C. Initial or sign each page and draw an "X" after the last signature D. Re-interview the witness Correct Answer: C Rationale: This prevents unauthorized additions after the fact. What should be prepared before interviewing a witness and why? A. Food and water for the witness B. A questionnaire to keep them on track C. Surveillance gear D. A polygraph test Correct Answer: B Rationale: Structured questions help maintain focus and consistency. What should also be included in the witness statement? A. Date of birth B. That the witness gave info of their own free will C. Investigator’s opinion D. Personal preferences Correct Answer: B Rationale: Voluntary participation ensures legal validity. When taking a statement from a youth under 18, the investigator should: A. Interview them alone B. Contact school first C. Get parental permission and allow their presence D. Avoid interviewing them Correct Answer: C Rationale: Legal guardians must approve and be present for minor interviews. Why should you not use a digital recorder for notes? A. It’s too expensive B. It’s not allowed C. Batteries may die or malfunction
C. After exhausting all other techniques D. Without planning Correct Answer: C Rationale: Undercover work is intrusive and should be a last resort. What should a PI feel after reviewing company background material? A. Nervous B. They will fit in with the environment C. Uncomfortable D. Unprepared Correct Answer: B Rationale: Familiarity improves the chance of successful undercover integration. According to CRA, what should not appear on a resume? A. Real education B. Job experience C. Fake name D. Skills Correct Answer: C Rationale: A false identity is unlawful and unethical. Camera installation in undercover ops may be needed in: A. Safe zones B. Homes C. High-risk areas D. Outdoors only Correct Answer: C Rationale: Surveillance in dangerous or high-threat environments may require equipment. Undercover operators should avoid being seen with targets in public by people who know their real identity. (True/False) Correct Answer: True Rationale: This could compromise the entire investigation. Can PIs offer employees money to steal something? A. Yes B. No C. Only with consent D. In emergencies
Correct Answer: B Rationale: This is unethical and illegal. Undercover operators must not: A. Hide their identity B. Encourage or assist in breaking laws or policies C. Report findings D. Use company resources Correct Answer: B Rationale: Investigators must observe without facilitating illegal behavior. Can the PI take part in a theft if the client authorizes it? A. Yes B. No Correct Answer: A Rationale: In rare cases and under legal oversight, participation may be authorized to preserve evidence. Employee email monitoring without notice is acceptable if: A. It’s for personal interest B. Done outside work hours C. Done on company-owned servers D. Only if illegal activity is suspected Correct Answer: C Rationale: Employers may monitor their own systems. Employee acknowledgment of computer monitoring is valid when: A. They verbally agree B. Signed a release and software is on the server or their device C. It’s included in the manual only D. Monitoring is random Correct Answer: B Rationale: Formal notice and consent establish legal compliance. If an employee is misusing a company computer, the investigator should: A. Confront them B. Erase the data C. Isolate the unit and prevent further access D. Delete the evidence
D. Use facial recognition Correct Answer: B Rationale: Speaking to people who know the subject helps confirm identity. If an error is found before swearing an affidavit, the PI must: A. Hide it B. Ignore it C. Notify the commissioner, correct and initial D. Erase it Correct Answer: C Rationale: Transparency and accuracy are required in sworn documents. When serving a document in an apartment building, the PI must follow: A. Municipal codes B. Tenant bylaws C. The Trespass to Property Act D. Criminal Code Correct Answer: C Rationale: Entry and presence must be lawful. OHRC stands for: A. Ontario Homeowners Resource Council B. Ontario Human Rights Code C. Ontario Housing Review Commission D. Official Hiring Rights Code Correct Answer: B Rationale: It governs human rights protections in Ontario. Tactical communication allows PIs to be: A. Passive and quiet B. Assertive without being confrontational C. Aggressive D. Emotional Correct Answer: B Rationale: It promotes effective and professional interaction. Stress management skills for PIs include: A. Taking naps on duty B. Reporting to HR
C. Controlling situations, reacting to exposure, and managing fatigue D. Avoiding work during bad weather Correct Answer: C Rationale: Investigators must maintain composure and safety during high-stress situations When conducting interviews, what is a key characteristic of a good interviewer? A. Dominating the conversation B. Asking only yes/no questions C. Being a good listener D. Using complex legal language Correct Answer: C. Being a good listener Rationale: A good interviewer listens carefully to gather accurate and complete information without leading or influencing the witness. When reviewing surveillance footage, what should an investigator focus on? A. Only the beginning of the footage B. Only the time the subject is visible C. All activities, even those not involving the subject D. Anything unusual or suspicious in the entire footage Correct Answer: D. Anything unusual or suspicious in the entire footage Rationale: Reviewing the entire footage ensures that all relevant or potentially important information is identified and documented. Which of the following is considered unethical conduct for a private investigator? A. Maintaining confidentiality B. Testifying truthfully in court C. Impersonating a police officer D. Conducting surveillance from public property Correct Answer: C. Impersonating a police officer Rationale: Impersonating law enforcement is illegal and unethical for any private investigator. Which type of questions should be avoided during an interview? A. Open-ended questions B. Leading questions C. Clarifying questions D. Fact-based questions Correct Answer: B. Leading questions Rationale: Leading questions can bias a witness’s answer and undermine the credibility of the statement.
C. Trespass to Property Act D. Personal Information Protection Act Correct Answer: C. Trespass to Property Act Rationale: The Trespass to Property Act governs legal access to private property, which is essential when serving documents. How can an investigator confirm the identity of someone who avoids service? A. Ask any passerby B. Search their trash C. Consult coworkers, neighbors, or reliable sources D. Send anonymous mail Correct Answer: C. Consult coworkers, neighbors, or reliable sources Rationale: These sources can reliably confirm identity without violating privacy laws. What should the investigator do if an error is discovered in an affidavit before it is sworn? A. Discard the affidavit B. Hide the error C. Notify the commissioner, correct and initial it D. Ignore the error Correct Answer: C. Notify the commissioner, correct and initial it Rationale: Any changes must be transparent and acknowledged to maintain legal validity. What does OHRC stand for? A. Ontario Housing and Rental Commission B. Office of Human Rights Canada C. Ontario Human Rights Code D. Organization of Human Rights in Canada Correct Answer: C. Ontario Human Rights Code Rationale: OHRC is the provincial code that governs and protects human rights in Ontario. Why is it important to communicate tactically as a private investigator? A. To confuse the subject B. To appear superior C. To be assertive without confrontation D. To manipulate witnesses Correct Answer: C. To be assertive without confrontation Rationale: Tactical communication helps maintain professionalism and avoids escalation during sensitive interactions.
What stress management skills are important for private investigators? A. Multitasking and ignoring fatigue B. Reacting impulsively when exposed C. Controlling situations and managing fatigue D. Avoiding surveillance to reduce stress Correct Answer: C. Controlling situations and managing fatigue Rationale: Proper stress management includes staying calm, knowing when to reveal your identity, and dealing with isolation and long hours. What is the most reliable way to protect digital evidence on a company computer being misused by an employee? A. Delete all files and start fresh B. Isolate the unit and prevent further access C. Email the contents to the client D. Allow the employee to explain their use Correct Answer: B. Isolate the unit and prevent further access Rationale: Isolating the computer preserves the integrity of digital evidence and prevents tampering or data loss. If illegal activity is suspected on an employee’s home/personal computer, what should the PI advise the client to do? A. Attempt to access the device B. Contact the employee directly C. Notify their legal counsel D. Destroy related company files Correct Answer: C. Notify their legal counsel Rationale: Since the device is personal property, legal channels must be followed to investigate further. If a Summons to Witness and Conduct Money must be served and the witness is absent or evasive, what should the investigator do? A. Leave the documents at their door B. Make multiple attempts throughout the day C. Mail the documents D. Leave them with a neighbor Correct Answer: B. Make multiple attempts throughout the day Rationale: Personal service is required, so repeated attempts improve the chances of successful delivery.
B. Ontario Building Code C. Trespass to Property Act D. Surveillance Privacy Act Correct Answer: C. Trespass to Property Act Rationale: Entry onto private property must be legally justified and compliant with the Trespass to Property Act. Why is it important for investigators to use tactical communication? A. To coerce subjects into talking B. To manipulate witnesses C. To be assertive without being confrontational D. To hide their identity Correct Answer: C. To be assertive without being confrontational Rationale: Tactical communication helps maintain professionalism and de-escalate potential conflict. Why is stress management important for private investigators? A. To become more aggressive B. To remain objective and professional C. To ignore legal requirements D. To avoid writing reports Correct Answer: B. To remain objective and professional Rationale: Managing stress helps investigators handle challenging scenarios calmly, especially in surveillance, driving, or isolation Before beginning an investigation to locate a suspect, what is the first step? A. Start tracking their phone B. Follow them without informing the client C. Identify the client’s reasoning and assess if it’s frivolous D. Obtain a court order Correct Answer: C. Identify the client’s reasoning and assess if it’s frivolous Rationale: It’s important to determine whether the investigation is valid or based on a frivolous claim before proceeding. What does the term “frivolous” mean in an investigative context? A. Urgent and critical B. Of little importance and not serious C. Legally binding D. Confidential
Correct Answer: B. Of little importance and not serious Rationale: A frivolous matter is not considered valid or worth serious investigation effort. After determining the reason for the investigation, what is the next step? A. Begin surveillance B. Call the subject directly C. Investigate the client’s background and claims D. Create a fake profile Correct Answer: C. Investigate the client’s background and claims Rationale: It’s necessary to ensure the client is being truthful and the request is legitimate. If a subject’s address can’t be found on maps, what is the best next step? A. Drop the case B. Search their social media C. Use a postal code search D. Contact a neighbor Correct Answer: C. Use a postal code search Rationale: A postal code search can provide accurate location details or narrow down the residence area. What should an investigator do when all previous address and contact details are invalid? A. End the investigation B. Contact the police C. Conduct an extensive background search using public databases and libraries D. Post the subject’s picture online Correct Answer: C. Conduct an extensive background search using public databases and libraries Rationale: These methods can help confirm or uncover new leads through older or overlooked information. What documents require lawful authority or signed release to access? A. Social media posts B. Bank, tax, and credit records C. Land ownership records D. Marriage certificates Correct Answer: B. Bank, tax, and credit records Rationale: These documents are private and protected by law. Access requires proper authorization.
Correct Answer: C. Avoid verbal contact with the subject Rationale: Contacting a represented individual directly may violate legal and ethical boundaries. Why might multiple investigators be assigned to a surveillance case? A. To intimidate the subject B. To alternate breaks C. Due to aggressive driving or multiple exit points D. To reduce workload Correct Answer: C. Due to aggressive driving or multiple exit points Rationale: Team surveillance is needed in complex cases where the subject is evasive or uses counter-surveillance. Which methods are part of team surveillance techniques? A. Decoy and deception B. Drone tracking C. Caravan, leapfrogging, and parallel coverage D. Sitting in one place all day Correct Answer: C. Caravan, leapfrogging, and parallel coverage Rationale: These strategies help maintain discreet surveillance with multiple investigators. When is it legal to record a conversation in Canada? A. When no one consents B. When one party consents C. When the PI thinks it’s necessary D. Only in public Correct Answer: B. When one party consents Rationale: In Canada, it is a criminal offense to record a conversation without the knowledge and consent of at least one party involved How should you collect evidence
Adaptability - ANSWER They should know how to prepare for a variety of situations and how to adjust to work environments and demands (e.g. sitting for long periods, in stairwells, confined environments, etc.). The Private Security and Investigative Services Act, 2005 regulates - ANSWER investigative services and private security industry Is PSISA federal, provincial or municipal? - ANSWER provincial Under PSISA loss prevention specialists are considered to be - ANSWER security guards and do not require a PI license What do Section 34 and 40 of the PSISA outline - ANSWER Rules and standards for PI's day to day activitys PIs must carry their license when working, and shall identify themselves when requested by a member of the public. (True or False) - ANSWER True During an undercover investigation, PIs do not have to carry or show their licence. (True or False) - ANSWER True PIs are prohibited from carrying any symbol of authority other than ________________ - ANSWER Their licence The Code of Conduct states "private investigators must avoid using __________ " - ANSWER Excessive force What does PIPEDA stand for? - ANSWER Personal Information Protection and Electronic Documents Act