Professional Documents
Culture Documents
Criminal Procedure For The Criminal Justice Professional 12th Edition-Test Bank
Criminal Procedure For The Criminal Justice Professional 12th Edition-Test Bank
https://tbzuiqe.com/product/criminal-procedure-for-the-criminal-justice-professional-12th-edition-test-
bank/
Sample Test
Chapter 03
ANSWER: d
REFERENCES: Property and Privacy Inquiries for Criminal Searches and Seizures
LEARNING OBJECTIVES: CPCJ.FERD.16.3.1
2. The change from viewing the Fourth Amendment as law that protected
property to a view that the law protected persons was prompted by cases
that concerned _____.
c. electronic surveillance
ANSWER: c
REFERENCES: Property and Privacy Inquiries for Criminal Searches and Seizures
ANSWER: a
REFERENCES: Property and Privacy Inquiries for Criminal Searches and Seizures
ANSWER: a
REFERENCES: Property and Privacy Inquiries for Criminal Searches and Seizures
5. The U.S. Supreme Court has defined a “search” to occur when _____.
b. an individual has a subjective expectation of privacy and the expectation of privacy has been infringed upon
c. an individual has a subjective expectation of privacy that society considers reasonable and the privacy expecta
REFERENCES: Property and Privacy Inquiries for Criminal Searches and Seizures
6. The police suspect that a store is illegally selling illicit drug paraphernalia.
A plain clothes detective working undercover enters the store, purchases
items, leaves the store, and comes back with a search warrant for the store
and an arrest warrant for the store’s owner. In terms of the Fourth
Amendment, the initial possession of the goods by the police _____.
a. constituted a search, but not a seizure
ANSWER: c
REFERENCES: Property and Privacy Inquiries for Criminal Searches and Seizures
c. The concept of probable cause is a finely tuned standard that has a precise understanding among those who u
d. The concept deals with probability that evidence will be found or that the individual committed an offense.
ANSWER: d
c. courts may force police to take action when they otherwise would not
ANSWER: a
a. The officer does not have justification to stop the car and investigate further.
b. The officer has justification to stop the car and investigate because probable cause is based on the collective k
c. The officer has justification to stop the car and investigate because (s)he has personal knowledge of the crime.
d. The officer has justification to stop the car and investigate simply because the motor vehicle is being operated
ANSWER:
REFERENCES:
LEARNING OBJECTIVES:
KEYWORDS:
10. A patrol officer stops a car and makes an arrest on the basis of
information obtained from a bulletin that officers in another jurisdiction are
looking for the driver of a certain car that was described in the bulletin.
Assume that the information contained in the bulletin was incorrect. Which
statement would be true?
b. The arresting officer is shielded from any civil liability for false arrest.
c. The arrest would still be valid and the officer is shielded from any civil liability for false arrest.
d. The arrest would not be valid and the officer is not shielded from any civil liability for false arrest.
ANSWER:
REFERENCES:
LEARNING OBJECTIVES:
KEYWORDS:
11. Which of the following, standing alone, can serve as the basis for
probable cause?
b. furtive conduct
ANSWER:
REFERENCES:
LEARNING OBJECTIVES:
KEYWORDS:
12. Which of the following, standing alone, can serve as the basis for
probable cause?
a. an admission
REFERENCES:
LEARNING OBJECTIVES:
KEYWORDS:
a. informant method
d. hearsay method
ANSWER:
REFERENCES:
LEARNING OBJECTIVES:
KEYWORDS:
b. cannot be a criminal
c. must have a “sufficient basis” for the knowledge
ANSWER:
REFERENCES:
LEARNING OBJECTIVES:
KEYWORDS:
b. all states adopted totality of circumstances, but the federal government retained the Aguilar-Spinelli
d. some states rejected the Gates decision and retained the Aguilar-Spinelli criteria on the basis of their own sta
ANSWER:
REFERENCES:
LEARNING OBJECTIVES:
KEYWORDS:
16. A citizen contacts the local police department and alleges that a
particular person is dealing drugs out of his home. The citizen states that
(s)he thought the police should know, but that (s)he does not “want to get
involved by giving my name.” What information would the officer need to
state in the affidavit to satisfy the first prong of Aguilar-Spinelli (basis of
knowledge)?
a. The name of the high school student that purchased the drugs.
c. How, when, and where the drug dealer obtained the drugs that were sold.
d. The reasons to believe that the informant was providing truthful information.
ANSWER:
REFERENCES:
LEARNING OBJECTIVES:
KEYWORDS:
b. show how the third person knows the information furnished to the informant and why the information from th
c. show how the third person knows the information furnished to the informant and why the information, from b
show how the third person knows the information furnished to the informant; why the information, from both
d.
information could not be obtained using any other method
ANSWER:
REFERENCES:
LEARNING OBJECTIVES:
KEYWORDS:
ANSWER: b
c. need not be disclosed unless the informant information is part of an agreement with the prosecutor in a pendi
ANSWER:
REFERENCES:
LEARNING OBJECTIVES:
KEYWORDS:
c. discovery
d. verification
ANSWER:
REFERENCES:
LEARNING OBJECTIVES:
KEYWORDS:
22. Reasons the U.S. Supreme Court put into effect the totality of the
circumstances test for assessing informant information based on the Illinois
v. Gates (1983) decision include _____.
ANSWER: b
23. United States v. De Los Santos, 810 F.2d 1326 (5th Cir. 1987) illustrates
the _____.
a. near-impossibility of satisfying the totality of circumstances test
ANSWER:
REFERENCES:
LEARNING OBJECTIVES:
KEYWORDS:
b. privacy
c. reasonableness
d. probable cause
ANSWER: c
REFERENCES: Reasonableness
ANSWER: b
REFERENCES: Reasonableness
b. Rigid application of the criteria is the best way to analyze probable cause based on informant information.
c. The criteria are so outdated that the case is completely useless in assessing probable cause.
d. The criteria are a good ending point of the probable cause analysis, but there are several steps that need to oc
ANSWER:
REFERENCES:
LEARNING OBJECTIVES:
KEYWORDS:
a. Dawson v. State (1971)
c. Aguilar v. Texas (1964)
d. Illinois v. Gates (1983)
ANSWER:
REFERENCES:
LEARNING OBJECTIVES:
KEYWORDS:
REFERENCES: Reasonableness
ANSWER: d
REFERENCES: Property and Privacy Inquiries for Criminal Searches and Seizures
c. absolute cause
d. probable cause
ANSWER: d
a. True
b. False
ANSWER: False
REFERENCES: Property and Privacy Inquiries for Criminal Searches and Seizures
ANSWER: True
REFERENCES: Property and Privacy Inquiries for Criminal Searches and Seizures
b. False
ANSWER: True
REFERENCES: Reasonableness
34. The U.S. Supreme Court has a strong preference that arrests and
searches be authorized by a warrant.
a. True
b. False
ANSWER: True
REFERENCES: Property and Privacy Inquiries for Criminal Searches and Seizures
a. True
b. False
ANSWER: True
b. False
ANSWER: True
REFERENCES: Probable Cause
b. False
ANSWER:
REFERENCES:
LEARNING OBJECTIVES:
KEYWORDS:
38. Ordinary citizen informants, even when the tip is given anonymously, are
always presumed credible (trustworthy) and no further evidence of credibility
need be stated in the affidavit beyond their name and address and their
status as a victim of, or witness to, a crime.
a. True
b. False
ANSWER:
REFERENCES:
LEARNING OBJECTIVES:
KEYWORDS:
b. False
ANSWER: True
b. False
ANSWER: False
REFERENCES: Reasonableness
41. In terms of applying the privacy right that exists under the Fourth
Amendment, the amendment is said to protect __________, not
__________.
ANSWER: people; places
REFERENCES: Property and Privacy Inquiries for Criminal Searches and Seizures
REFERENCES: Property and Privacy Inquiries for Criminal Searches and Seizures
REFERENCES: Property and Privacy Inquiries for Criminal Searches and Seizures
44. Probable cause is evaluated by examining the __________ of the police
at the time of the arrest or search, not merely the personal knowledge of the
arresting or searching officer.
ANSWER:
REFERENCES:
LEARNING OBJECTIVES:
KEYWORDS:
47. The elements of the __________ two-pronged test are important
considerations in determining the existence of probable cause based on
informant testimony.
ANSWER:
REFERENCES:
LEARNING OBJECTIVES:
KEYWORDS:
ANSWER:
REFERENCES:
LEARNING OBJECTIVES:
KEYWORDS:
REFERENCES: Property and Privacy Inquiries for Criminal Searches and Seizures
50. Third party information is often referred to as ________.
ANSWER:
REFERENCES:
LEARNING OBJECTIVES:
KEYWORDS:
CPCJ.FERD.16.3.4
LEARNING OBJECTIVES: CPCJ.FERD.16.3.5
CPCJ.FERD.16.3.6
CPCJ.FERD.16.3.4
LEARNING OBJECTIVES: CPCJ.FERD.16.3.5
CPCJ.FERD.16.3.6
REFERENCES: Reasonableness
56. Do you see any changes in how “privacy” was viewed before and
after Katz v. U.S. (1967)? Justify your answer.
REFERENCES: Property and Privacy Inquiries for Criminal Searches and Seizures
REFERENCES: Property and Privacy Inquiries for Criminal Searches and Seizures
CPCJ.FERD.16.3.4
LEARNING OBJECTIVES: CPCJ.FERD.16.3.5
CPCJ.FERD.16.3.6
59. Write a brief paragraph explaining the importance of note-taking by an
officer as the case progresses.
ANSWER: Answers will vary.
CPCJ.FERD.16.3.3
LEARNING OBJECTIVES:
CPCJ.FERD.16.3.5
REFERENCES:
LEARNING OBJECTIVES:
KEYWORDS:
Chapter_05
1. _____ concerns the use of scientific methods toward the preservation,
collection, and interpretation of digital evidence from digital sources.
a. Forensic computer information systems
b. Computer forensics
c. Electronic surveillance
d. Computer science
ANSWER: b
a. entering the place(s) housing the devices on which data are stored
b. seizing the devices on which the data may be stored as well as devices linked via networks
d. providing the devices to forensic computer specialists who search for data described in a warrant
ANSWER: a
b. Trojans
c. wipes
d. back doors
ANSWER: a
ANSWER: c
b. validated the law because it properly limited the nature, scope, or duration of the electronic surveillance
c. invalidated the law because the government did not establish probable cause
d. invalidated the law because it failed to properly limit the nature, scope, or duration of the electronic surveillan
ANSWER: d
6. The term _____ transfer refers to a transfer containing the human voice at
any point between, and including, the point of origin and the point of
reception?
a. aural
b. electronic
c. intercept
d. oral
ANSWER: a
b. roving
c. non-specific
d. roaming
ANSWER: b
ANSWER: a
REFERENCES: Intelligence Surveillance
b. The time period allowed to obtain the evidence is the same for forensic searches and more traditional searche
c. Law enforcement is allowed a shorter time period to obtain the evidence than normally allowed under a tradi
d. Rule 41 does not require magistrates to specify a time limit because the amount of time is unpredictable.
ANSWER: d
11. Title III of the Omnibus Crime Control and Safe Streets Act of 1968
_____.
c. permits taps even when ordinary investigative procedures have not been exhausted
ANSWER: d
12. In the case of Olmstead v. United States, the Court decided that the
practice of wiretapping was not covered by the Fourth Amendment, primarily
because _____.
b. the evidence was obtained only by hearing (and did not involve tangible items) so the interception of a conver
c. the Fourth Amendment protects people, but not places
d. there was no legitimate remedy for the alleged violation at the time, as the exclusionary rule did not yet exist y
ANSWER: b
a. Electronic surveillance
b. Covert surveillance
c. Covert intelligence
d. Cyber surveillance
ANSWER: a
ANSWER: b
c. as soon as practicable
ANSWER: b
16. Neither Title III of the Omnibus Crime Control and Safe Streets Act of
1968 nor the Fourth Amendment requires law enforcement to _____.
a. obtain a judicial order to intercept wire, oral, or electronic communications
b. obtain judicial authorization to covertly enter the premises to install a listening device
d. conduct themselves in a way that minimizes the interception of communications not subject to the intercepti
ANSWER: b
b. on-hold
c. under seal
d. en todos
ANSWER: c
18. Within a reasonable time, but not later than _____ days after the
termination of the period of an order, an inventory must be served on the
persons named in the order and on such other parties to intercepted
communications as the judge determines in the interest of justice.
a. twenty
b. thirty
c. sixty
d. ninety
ANSWER: d
19. Title III of the Omnibus Crime Control and Safe Streets Act of 1968
refers to a “person who was a party to any intercepted” wire or oral
communication or “a person against whom the interception was directed” as
_____.
a. suspect
b. aggrieved
c. felonious
d. victimized
ANSWER: b
a. Title III of the Wiretap Act prevents the use of the communication in court against another party, but the Fourth
the Fourth Amendment prevents the use of the communication in court against another party, but Title III of th
b.
another party
c. both the Fourth Amendment and Title III of the Wiretap Act prevent use of the communication in court against
d. neither Title III of the Wiretap Act nor the Fourth Amendment prevents the use of the communication in court a
ANSWER: d
c. provider
d. exigent circumstances
ANSWER: c
b. provider
c. public access
d. exceptional privilege
ANSWER: a
23. What is the difference between a pen register and a trap-and-trace
device?
A pen register records incoming addressing information (such as caller ID information); whereas a trap-and-trac
a.
numbers dialed from a phone).
A pen register records outgoing addressing information (such as numbers dialed from a phone); whereas a trap
b.
caller ID information).
c. A pen register intercepts communication; whereas a trap-and-trace device does not intercept communication.
d. A pen register does not intercept communication; whereas a trap-and-trace device intercepts communication.
ANSWER: b
c. another application is made to a court “as soon as practicable” for a determination that the interception comp
ANSWER: c
25. Title III of the Omnibus Crime Control and Safe Streets Act of 1968 does
not apply to the use of electronic devices emitting signals that enable law
enforcement officials to track the location of objects and persons. Why?
b. By their very nature, the devices are mobile and this not covered.
ANSWER: c
26. Title III of the Omnibus Crime Control and Safe Streets Act of 1968
specifically exempts _____ from the warrant requirement.
a. buildings
b. cell phones
c. tone-only pagers
d. answering machines
ANSWER: c
27. Prior to the passing of Title III of the Omnibus Crime Control and Safe
Streets Act of 1968, the United States Government utilized a “national
security exception” to conduct warrantless electronic surveillance of foreign
powers. In 1978, the Foreign Intelligence Surveillance Act (FISA) was
passed as a result of the _____.
a. Watergate scandal
ANSWER: a
ANSWER: d
29. Title III of the Omnibus Crime Control and Safe Streets Act of 1968 is
often referred to as the _____.
a. Digital Act
b. Wiretap Act
c. Electronics Act
d. Surveillance Act
ANSWER: b
b. FISA
ANSWER: d
b. False
ANSWER: True
a. True
b. False
ANSWER: True
a. True
b. False
ANSWER: True
a. True
b. False
ANSWER: True
b. False
ANSWER: False
a. True
b. False
ANSWER: True
37. Title III of the Wiretap Act applies to private searches and seizures of
wire, oral, or electronic communications.
a. True
b. False
ANSWER: True
38. If a conversation takes place in public where other parties can overhear
the conversation, there is no reasonable expectation of privacy. However,
any recording of such a conversation would violate Title III of the Wiretap
Act.
a. True
b. False
ANSWER: False
REFERENCES: Electronic Surveillanc
39. Title III of the Wiretap Act applies to the use of electronic devices
emitting signals that enable law enforcement officials to track the location of
objects and persons.
a. True
b. False
ANSWER: False
40. Title III of the Wiretap Act does not cover video surveillance using video
cameras that record only images and not aural communications.
a. True
b. False
ANSWER: True
ANSWER: forensics
ANSWER: cloud
REFERENCES: Searches of Electronically Stored Information
50. Title III of the Wiretap Act provides authority for designated officials to
intercept wire, oral, or electronic communications without a prior interception
order if an emergency situation exists that involves immediate danger of
death or serious physical injury to any person. This is referred to as the
__________.
ANSWER: exigent circumstances exception
51. Briefly describe how the Title III of the Omnibus Crime Control and Safe
Streets Acts of 1968 originated.
ANSWER: Answers will vary.
52. What impact has “cloud” technology had upon law enforcement in terms
of electronic surveillance? Explain your reasoning.
ANSWER: Answers will vary.
REFERENCES: Searches of Electronically Stored Information
54. Outline the two stage process used for most searches of electronically
stored information.
ANSWER: Answers will vary.
55. Compare and contrast an interception order under Title III of the Wiretap
Act and an ordinary search warrant.
ANSWER: Answers will vary.
58. Explain the conflicting demands for more effective law enforcement and
individual privacy rights relevant to electronic surveillance.
ANSWER: Answers will vary.
59. Explain the jurisdiction and procedures of the Foreign Intelligence
Surveillance Court (FISC).
ANSWER: Answers will vary.