“200”,
Aptitude Test Questions and Answers for Investigation Officer II
– the Ministry of Home Affairs.
ABSTRACT
This
document contains 200 multiple-choice questions with answers and rationales
designed to help candidates prepare for the INVESTIGATION OFFICER II – Ministry
of Home Affairs - online aptitude test conducted by the Public Service
Recruitment Secretariat, in Tanzania. The questions integrate content from the
Anti-Trafficking in Persons Act, its Regulations, and related fields such as
criminology, psychology, cyber security, investigation techniques, and logical
reasoning. The set is crafted to reflect the test’s challenging nature, with
closely related answer choices and scenario-based reasoning to assess a
candidate’s comprehensive understanding and problem-solving capacity. It is a
practical tool for developing both subject knowledge and analytical skills
essential for the role.
Prepared
by:
Johnson
Yesaya Mgelwa.
A
lawyer stationed in Dar-es-salaam.
0628729934.
Date:
August 10, 2025
Dear
applicants,
This
collection of questions and answers has been carefully prepared to help all of you
to understand the key areas tested during the interview. The goal is to provide
a useful, and practical study guide so you can all perform confidently and
fairly in the selection process. I wish you the best of luck, and may this
resource support you in achieving success!
Warm
regards,
Johnson
Yesaya Mgelwa
For
Personal Use by Applicants Preparing for Investigation Officer II – Ministry of
Home Affairs, interview
ALL QUESTIONS COMPILED TOGETHER.
1. Which of the following is the primary purpose of conducting a preliminary interview with a complainant in a trafficking in persons case?
A. To determine the suspect’s identity B. To collect background information C. To assess the credibility of the complaint D. To write a full investigation report
Answer: C. To assess the credibility of the complaint
Rationale: A preliminary interview helps the investigation officer
determine whether the allegation has merit and sufficient details to proceed,
rather than jumping straight into full investigation or report writing.
2. In Tanzanian criminal procedure, evidence obtained illegally is generally:
A. Automatically admissible B. Automatically inadmissible C. Admissible if relevant D. Discarded without consideration
Answer: C. Admissible if relevant
Rationale: Tanzanian courts follow the principle that relevance is the
main test for admissibility, meaning even evidence obtained improperly may be
admitted if it is directly relevant to the case, subject to judicial
discretion.
3. When registering a trafficking case in TIPMIS, the most crucial first step is to:
A. Assign a unique case reference number B. Enter suspect’s criminal record C. Upload all evidence documents D. Record interview audio files
Answer: A. Assign a unique case reference number
Rationale: A unique case number ensures proper tracking and avoids
confusion when multiple cases are being processed, which is critical in
database management systems like TIPMIS.
4. In investigative interviewing, an “open-ended question” is designed to:
A. Force the subject to choose between options B. Allow the subject to narrate freely C. Lead the subject toward an answer D. Confirm a specific fact
Answer: B. Allow the subject to narrate freely
Rationale: Open-ended questions encourage detailed responses and can
reveal unexpected information, which is valuable when interviewing victims,
witnesses, or suspects.
5. Which of the following is NOT a psychological effect commonly observed in trafficking victims?
A. Post-traumatic stress disorder B. Memory loss C. Euphoria D. Depression
Answer: C. Euphoria
Rationale: Trafficking victims often exhibit trauma-related conditions
such as PTSD, memory impairment, and depression, but euphoria is not a typical
psychological response in such cases.
6. In the context of cyber security, “phishing” refers to:
A. Tracking illegal financial transactions B. Sending fraudulent messages to obtain information C. Monitoring internet usage D. Accessing encrypted files without permission
Answer: B. Sending fraudulent messages to obtain information
Rationale: Phishing is a cybercrime technique where attackers
impersonate legitimate entities via email or messages to trick individuals into
revealing sensitive data.
7. Which law in Tanzania specifically addresses the offence of trafficking in persons?
A. The Penal Code B. The Anti-Trafficking in Persons Act C. The Criminal Procedure Act D. The Evidence Act
Answer: B. The Anti-Trafficking in Persons Act
Rationale: Tanzania’s Anti-Trafficking in Persons Act provides the legal
framework for prevention, prosecution, and protection measures related to
trafficking offences.
8. When collecting physical evidence from a crime scene, the chain of custody is important to:
A. Avoid contamination B. Prove ownership C. Increase storage capacity D.
Reduce paperwork
Answer: A. Avoid contamination
Rationale: Maintaining a proper chain of custody ensures the integrity
of the evidence and prevents claims of tampering or mishandling during trial.
9. During an interview, a suspect starts showing signs of nervousness when a certain topic is mentioned. This is an example of:
A. Leading question B. Non-verbal cue C. Direct evidence D. Primary confession
Answer: B. Non-verbal cue
Rationale: Non-verbal cues such as body language, hesitation, and
nervousness can provide valuable insights during an interview, though they must
be interpreted cautiously.
10. Which of the following is the safest way to store confidential interview notes?
A. In a locked cabinet B. In a personal handbag C. On an unsecured cloud drive D. In a shared office drawer
Answer: A. In a locked cabinet
Rationale: Confidential materials should be physically secured in locked
storage to prevent unauthorized access, particularly in sensitive cases.
11. In investigative terms, “corroboration” means:
A. Confirming a statement through additional evidence B. Providing a confession C. Recording witness contact details D. Filing a case in court
Answer: A. Confirming a statement through additional evidence
Rationale: Corroboration strengthens the credibility of evidence by
matching it with independent sources or testimony.
12. When directing a complainant on submitting allegations, the officer should primarily focus on:
A. Legal jargon B. Clear and simple instructions C. Long written explanations D. Avoiding any written guidance
Answer: B. Clear and simple instructions
Rationale: Complainants may not understand legal terms, so officers must
use plain language to ensure accurate submission of allegations.
13. Which of the following best describes “trauma-informed interviewing”?
A. Avoiding all questions B. Conducting interviews without recording C. Considering the victim’s emotional and psychological state D. Asking only factual questions
Answer: C. Considering the victim’s emotional and psychological state
Rationale: Trauma-informed interviewing ensures victims are treated
sensitively, avoiding traumatization while still gathering necessary
information.
14. The “principle of legality” in criminal law means:
A. The law applies only to lawyers B. No crime or punishment without a written law C. Any act can be punished if society agrees D. Only serious crimes require a trial
Answer: B. No crime or punishment without a written law
Rationale: This principle ensures individuals are only punished for
actions clearly defined as crimes by law at the time they were committed.
15. In cyber investigations, the term “digital footprint” refers to:
A. Physical shoeprints left at a scene B. Internet-based trail of user activity C. A type of malware D. A fingerprint scanned electronically
Answer: B. Internet-based trail of user activity
Rationale: A digital footprint consists of data left behind by users
when browsing or interacting online, which can be traced for investigations.
16. In the rules of evidence, “hearsay” generally refers to:
A. An eyewitness account B. A statement made outside court offered for its truth C. Physical evidence from the scene D. A written confession by the accused
Answer: B. A statement made outside court offered for its truth
Rationale: Hearsay is an out-of-court statement presented to prove the
truth of the matter asserted, and is usually inadmissible unless exceptions
apply.
17. When interviewing a minor victim, the officer should:
A. Avoid any adult presence B. Involve a trained child psychologist C. Use only closed-ended questions D. Conduct the interview at night
Answer: B. Involve a trained child psychologist
Rationale: Child victims require specialized interviewing techniques,
and a psychologist can ensure the child’s welfare while helping extract
accurate information.
18. Which of the following best defines “probable cause” in investigations?
A. A mere suspicion B. Reasonable grounds to believe an offence has been committed C. The final court judgment D. A signed confession
Answer: B. Reasonable grounds to believe an offence has been committed
Rationale: Probable cause is the legal standard required before taking
certain investigative actions, like arresting or searching a suspect.
19. The safest method to transmit sensitive victim information electronically is to:
A. Use end-to-end encrypted communication B. Send via personal social media C. Post on a secure website without login D. Use public Wi-Fi for convenience
Answer: A. Use end-to-end encrypted communication
Rationale: End-to-end encryption ensures that only the intended
recipient can read the transmitted data, protecting privacy and security.
20. Which of the following is considered direct evidence?
A. CCTV footage of the crime B. Motive of the suspect C. Witness speculation D. Crime scene diagram
Answer: A. CCTV footage of the crime
Rationale: Direct evidence directly proves a fact without inference,
such as video footage capturing the act itself.
21. When a victim is reluctant to speak due to fear of retaliation, the officer should first:
A. Promise immunity B. Provide reassurance of safety and protection C. Record silence as refusal D. Conclude the interview immediately
Answer: B. Provide reassurance of safety and protection
Rationale: Building trust by ensuring the victim feels safe encourages
cooperation and improves the quality of information gathered.
22. In criminal law, the “burden of proof” lies primarily with:
A. The defence B. The prosecution C. The judge D. The police
Answer: B. The prosecution
Rationale: It is the prosecution’s responsibility to prove the accused’s
guilt beyond a reasonable doubt.
23. Which of the following is a sign that an online job offer might be part of a trafficking scam?
A. Requires no qualifications B. Offers unusually high pay for unskilled work C. Provides vague job description D. All of the above
Answer: D. All of the above
Rationale: Traffickers often lure victims with unrealistic offers,
minimal requirements, and vague job details to mask exploitative intentions.
24. An interview conducted to confirm specific facts after an initial interview is called:
A. Preliminary interview B. Follow-up interview C. Cross-examination D. Closing statement
Answer: B. Follow-up interview
Rationale: A follow-up interview is used to clarify, verify, or expand
on details obtained during earlier interviews.
25. In Tanzania, which body is primarily responsible for prosecuting trafficking in persons cases?
A. The Judiciary B. The Prevention and Combating of Corruption Bureau C. The Office of the Director of Public Prosecutions D. The Ministry of Home Affairs
Answer: C. The Office of the Director of Public Prosecutions
Rationale: The DPP is constitutionally mandated to prosecute criminal
cases, including trafficking in persons, on behalf of the state.
26. Which interviewing technique is most effective for detecting deception?
A. Rapid-fire questioning B. Asking for the same story in reverse order C. Avoiding all clarifying questions D. Interrupting frequently
Answer: B. Asking for the same story in reverse order
Rationale: When a subject recounts events in reverse, fabricated stories
become harder to maintain, revealing inconsistencies that may indicate
deception.
27. Under Tanzanian law, which court initially handles most trafficking in persons criminal cases?
A. Primary Court B. District Court C. Resident Magistrate’s Court D. Court of Appeal
Answer: C. Resident Magistrate’s Court
Rationale: Resident Magistrate’s Courts generally have jurisdiction over
serious offences like trafficking in persons, unless otherwise directed.
28. Which of the following best describes “victim-centered investigation”?
A. Prioritizing the collection of evidence over victim welfare B. Ensuring investigative procedures do not harm the victim further C. Only interviewing the victim once D. Relying solely on victim testimony
Answer: B. Ensuring investigative procedures do not harm the victim further
Rationale: Victim-centered approaches focus on protecting the dignity,
safety, and rights of victims throughout the investigative process.
29. In digital forensics, “hash value” is used to:
A. Determine internet speed B. Verify the integrity of digital evidence C. Encrypt personal emails D. Identify suspect’s location
Answer: B. Verify the integrity of digital evidence
Rationale: A hash value is a unique numerical code generated from data;
any alteration to the data changes the hash, indicating tampering.
30. The primary aim of a case file in criminal investigation is to:
A. Store only witness names B. Serve as a permanent, organized record of the case C. Keep all evidence in physical form D. Replace court proceedings
Answer: B. Serve as a permanent, organized record of the case
Rationale: A case file consolidates all information, evidence, and
documentation for reference during investigation and prosecution.
📘 Get the Full Practical Test PDF (Questions 1–150)
You’ve just accessed the first 30 questions. The full set of 150 expertly prepared aptitude test questions for the Investigation Officer II – the Ministry of Home Affairs is available for download in a PDF format
To get access of the full PDF through your Gmail (Questions 1–150), please make a payment of Tsh 10,000 to the LIPA number below:
After payment, please send a text message with the words “Investigation Officer.” to:
⚠️ Important Notice
- The PDF is watermarked and protected for personal use only.
- Redistribution, sharing, screenshotting, or copying the contents is strictly prohibited.
- Legal action may be taken against the misuse of this material.
Thank you for supporting quality content. Best of luck in your interview preparation!
0 Comments
PLACE YOUR COMMENT HERE
WARNING: DO NOT USE ABUSIVE LANGUAGE BECAUSE IT IS AGAINST THE LAW.
THE COMMENTS OF OUR READERS IS NOT OUR RESPONSIBILITY.