Easter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Certified Fraud Examiner - Investigation Exam Question and Answers

Certified Fraud Examiner - Investigation Exam

Last Update Apr 5, 2024
Total Questions : 170

We are offering FREE CFE-Investigation ACFE exam questions. All you do is to just go and sign up. Give your details, prepare CFE-Investigation free exam questions and then go for complete pool of Certified Fraud Examiner - Investigation Exam test questions that will help you more.

CFE-Investigation pdf

CFE-Investigation PDF

$35  $99.99
CFE-Investigation Engine

CFE-Investigation Testing Engine

$42  $119.99
CFE-Investigation PDF + Engine

CFE-Investigation PDF + Testing Engine

$56  $159.99
Questions 1

If you are seizing a computer for forensic analysis, why is it generally necessary to seize any copiers connected to it?

Options:

A.  

Many copiers connect via parallel cables, which store and transmit copy job data.

B.  

Most copiers store, process, and transmit data m a cloud environment

C.  

Many copiers have internal hard drives that might contain information relevant to a fraud examination

D.  

Most copiers today are nonimpact copiers, meaning that they store copied images indefinitely.

Discussion 0
Questions 2

Which of the following is NOT a step a fraud examiner must take before seizing evidence in a digital forensic investigation?

Options:

A.  

Obtain and become familiar with any legal orders that apply to the investigation

B.  

Assemble an investigation team comprised only of outside digital forensic experts

C.  

Ensure that only trained professionals employ any software used in a forensic capacity

D.  

Determine whether there are privacy issues related to the item(s) to be searched.

Discussion 0
Questions 3

Which of the following is the LEAST ACCURATE statement about seizing a computer for examination?

Options:

A.  

When taking a computer for examination, if the computer is off. it should remain off when it is removed.

B.  

When seizing a computer that is running, it is acceptable for a fraud examiner to review the files contained on the machine prior to seizing it.

C.  

Before removing a computer system from a scene for further analysis, it is important to document the system's setup with photographs or diagrams.

D.  

When seizing a computer for examination, the seizing party should took around the area for passwords because many people leave passwords near their computers

Discussion 0
Questions 4

Nobles, a digital forensic examiner for a government agency, is conducting a criminal investigation of Lucas, a construction company executive, for alleged bribery of foreign officials Nobles obtains a court order authorizing him to seize Lucas's personal computer for forensic examination. Which of the following is the MOST ACCURATE statement?

Options:

A.  

If Lucas's computer is running. Nobles may retrieve data from the computer directly via its normal interface 4 the evidence that he needs exists only in the form of volatile data

B.  

If Lucas's computer is off and Nobles needs evidence that exists only in the form of volatile data, he should turn the computer on and retrieve data directly via the computer's normal interlace.

C.  

If Lucas's computer is off. Nobles should not turn it on unless he plans to use an encryption device that can guarantee that the system's hard drive will not be accessed during startup.

D.  

If Lucas's computer is running. Nobles should perform a graceful shutdown by turning it off using the normal shutdown process

Discussion 0
Questions 5

Which of the following is NOT one of the main limitations of conducting a search for public records using online databases?

Options:

A.  

Online public records searches are limited in the jurisdictions they cover.

B.  

Public records database companies are difficult to find.

C.  

Online coverage of public records varies widely from jurisdiction to jurisdiction

D.  

The timeliness and accuracy of information in online databases must be validated

Discussion 0
Questions 6

Which of the following is a common characteristic that asset hiders look for in the financial vehicles they use to conceal their assets?

Options:

A.  

Accessibility

B.  

Transparency

C.  

Exclusivity

D.  

Traceability

Discussion 0
Questions 7

Which of the following is NOT true about observing the reactions of interview subjects?

Options:

A.  

The interpretation of an interview subject's reactions requires specific skills on the part of the interviewer.

B.  

The observation of a subjects body language is often just as important as the observation of the words used by the subject.

C.  

Emotive words should be used early in the interview to observe the respondents emotional reaction.

D.  

To effectively observe reactions, an interviewer should move from less sensitive to more sensitive questions as the interview progresses.

Discussion 0
Questions 8

During an interview, Alex asked a fraud suspect if he could retrieve the suspect's account records from her bank. The suspect said, "yes." but she did not provide consent in writing Although the suspect orally consented, the suspect's bank is NOT required to allow Alex to access the suspect's account records at this point.

Options:

A.  

True

B.  

False

Discussion 0
Questions 9

Smith, a Certified Fraud Examiner (CFE) for the Ajax Co.. observes Jones, an accounts payable clerk, driving an expensive sports car to work. Smith also has knowledge that Jones recently had extensive remodeling done on her residence. Smith has sufficient predication to:

Options:

A.  

Conduct discreet inquiries into Jones's responsibilities as an accounts payable clerk

B.  

Notify management of the possibility that Jones has committed fraudulent acts.

C.  

Search Jones's mobile phone for evidence of misconduct

D.  

Accuse Jones directly of having committed fraud.

Discussion 0
Questions 10

Louis, a Certified Fraud Examiner (CFE). is investigating a potential internal fraud case originating from a whistteblower tip about embezzlement. He discovers that the organization purportedly affected by the embezzlement recorded the tip in a memorandum. Which type of evidence would the memorandum be considered?

Options:

A.  

Testimonial evidence

B.  

Incriminating evidence

C.  

Documentary evidence

D.  

Verbal evidence

Discussion 0
Questions 11

In response to an accusation made during an admission-seeking interview, the subject begins to voice a denial to the charge. How should the interviewer react to the first indication of a subject's denial?

Options:

A.  

Allow the subject 1o continue denying the charge

B.  

Argue the point directly with the subject until a confession is obtained

C.  

Remind the subject of the laws against perjury.

D.  

Interrupt the denial by using a delaying tactic.

Discussion 0
Questions 12

Which of the following BEST describes the data analytics approach known as predictive analytics?

Options:

A.  

The configuration of a business program to emulate and Integrate the actions of a human to execute certain business processes, thus increasing efficiency and automating repetitive manual tasks

B.  

The use of historical data, along with analyses, statistics, and machine learning components, to build a mathematical model that captures important trends and creates a quantitative forecast

C.  

The employment of computer systems to perform human-like tasks such as visual perception and decision-making

D.  

The use of layered artificial neural networks to accommodate more data and more sophisticated algorithms to identify complex patterns

Discussion 0
Questions 13

Which of the following is NOT an advantage to using link analysis in a fraud investigation?

Options:

A.  

Link analysis visually displays financial ratio analysis

B.  

Link analysis is an affective tool to demonstrate complex networks

C.  

Link analysis helps identify indirect relationships with several degrees of separation.

D.  

Link analysis allows the investigator to discover patterns in data.

Discussion 0
Questions 14

Which of the following types of information would LEAST LIKELY be found when searching external sources without the subject's consent or a legal order?

Options:

A.  

A witness's address

B.  

Assets owned by a subject

C.  

A subject's employee personnel file

D.  

A competitor's ownership information

Discussion 0
Questions 15

The term_____________refers to a process of resolving allegations of fraud from inception to disposition.

Options:

A.  

Fraud theory

B.  

Forensic investigation

C.  

Fraud management

D.  

Fraud examination

Discussion 0
Questions 16

Which of the following is TRUE of a follow-up/recommendations section in a written fraud examination report?

Options:

A.  

A follow-up/recommendations section is not a required part of every written fraud examination report

B.  

A follow-up/recommendations section calculates the amount of loss caused by any misconduct identified during the investigation

C.  

A follow-up/recommendations section must include a list of organizational failings that contnbuted to the fraud

D.  

All of the above

Discussion 0
Questions 17

Allison, a Certified Fraud Examiner (CFE). is investigating a potential procurement fraud scheme. While interviewing a subject, she asks. "Why did you choose to do business with that vendor?" This can BEST be described as a(n):

Options:

A.  

Open question

B.  

Complex question

C.  

Leading question

D.  

Closed question

Discussion 0
Questions 18

Arnold, a Certified Fraud Examiner (CFE) for Integra Wealth, learns that Elizabeth, an accounts payable clerk, recently purchased an expensive ski boat Arnold also knows that Elizabeth recently purchased a vacation home on a nearby lake Arnold has sufficient predication to:

Options:

A.  

Notify management of the possibility that Elizabeth has committed fraudulent acts

B.  

Search Elizabeth's mobile phone for evidence of misconduct.

C.  

Accuse Elizabeth directly of having committed fraud

D.  

Conduct discreet inquiries into Elizabeth's responsibilities as an accounts payable clerk

Discussion 0
Questions 19

Nathaniel, a Certified Fraud Examiner (CFE). is investigating an alleged inventory theft scheme. While interviewing a subject, he asks, "When were you promoted to manager of the department?" This can BEST be described as a(n):

Options:

A.  

Leading question

B.  

Open question

C.  

Complex question

D.  

Closed question

Discussion 0
Questions 20

Which of the following is TRUE of a follow-up/recommendations section in a written fraud examination report?

Options:

A.  

A follow-up recommendations section is a required part of every written fraud examination report

B.  

A follow-up/recommendations section calculates the amount of fraud-related loss sustained by the organization

C.  

A follow-up/recommendations section should state remedial measures for the organization to undertake

D.  

All of the above

Discussion 0
Questions 21

Anne used Will as a confidential informant in her investigation Anne listed information provided by Will in her final report, referring to him using his initials. She paid Will in cash and obtained a receipt for the transaction. Which of Anne's methods was NOT considered a best practice when using informants?

Options:

A.  

Referring to Will using his initials

B.  

Obtaining a receipt from Will

C.  

Using information provided by Will in her report

D.  

Using cash to pay Will

Discussion 0
Questions 22

Assuming that a jurisdiction has prohibited pretexting against financial institutions, which of the following actions would constitute illegal pretexting?

Options:

A.  

Intentionally making false statements on loan applications

B.  

Stealing a person's mail lo obtain the person's bank account number

C.  

Impersonating an account holder to access their bank records

D.  

Setting up a bank account in an assumed name

Discussion 0
Questions 23

Rachel, a fraud suspect, has decided to confess to Linda, a Certified Fraud Examiner (CFE). In obtaining a verbal confession from Rachel. Linda should obtain all of the following items of information EXCEPT:

Options:

A.  

The approximate beginning and end dates of the fraud

B.  

A statement from Rachel that her conduct was an accident

C.  

A general estimate of the amount of money involved

D.  

Rachel's motive for the offense

Discussion 0
Questions 24

A fraud examiner is based in Mexico, a non-European Union (EU) country, and is collecting personal information from their company's human resources (HR) files about an employee based in Germany, an EU country. Based on these facts, the fraud examiner would need to comply with the EU"s General Data Protection Regulation (GDPR) when conducting their internal investigation.

Options:

A.  

True

B.  

False

Discussion 0
Questions 25

Delta, an interviewer with little experience, asks Sigma, the respondent, the following question: "Were you aware that the signature was forged, and why didn't you tell anyone earlier?" This kind of question is called a_____________question

Options:

A.  

Complex

B.  

Controlled answer

C.  

Free narrative

D.  

Double-negative

Discussion 0