Big Black Friday Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Certified Fraud Examiner (CFE) - Investigation Question and Answers

Certified Fraud Examiner (CFE) - Investigation

Last Update Nov 30, 2025
Total Questions : 170

We are offering FREE CFE-Investigation ACFE exam questions. All you do is to just go and sign up. Give your details, prepare CFE-Investigation free exam questions and then go for complete pool of Certified Fraud Examiner (CFE) - Investigation test questions that will help you more.

CFE-Investigation pdf

CFE-Investigation PDF

$36.75  $104.99
CFE-Investigation Engine

CFE-Investigation Testing Engine

$43.75  $124.99
CFE-Investigation PDF + Engine

CFE-Investigation PDF + Testing Engine

$57.75  $164.99
Questions 1

Amanda needs to know the location of the principal office and the date of incorporation of a company she is investigating. Which of the following would be the BEST source of this information?

Options:

A.  

The organizational filing with the government of the jurisdiction in which the company is incorporated

B.  

The company's income tax filings

C.  

The contractual records of any real property owned by the corporation

D.  

The comprehensive litigation file in the local court in the jurisdiction in which the company is headquartered

Discussion 0
Questions 2

Jackson, a Certified Fraud Examiner (CFE). is analyzing Elm Company's accounts payable data to identify anomalies that might indicate fraud. Which of the following is the MOST EFFECTIVE data analysis function that Jackson could use to look for potential fraud in accounts payable?

Options:

A.  

Compare book and tax depreciation and indicate variances

B.  

Identify paychecks with amounts over a certain limit

C.  

Summarize large invoices by amount and vendor

D.  

All of the above

Discussion 0
Questions 3

Vishal, a Certified Fraud Examiner (CFE). has just initiated an interview with Steve, a fraud suspect. After a short introduction. Vishal jokes about the fact that he and Steve are wearing the same tie and then proceeds to ask Steve about the previous night's major sporting event Vishal is attempting to

Options:

A.  

Establish the interview theme

B.  

Condition the witness.

C.  

Establish rapport

D.  

Exhibit passive listening.

Discussion 0
Questions 4

Shane, a Certified Fraud Examiner (CFE). is investigating Larsen. who is active on various social networking sites. Shane wants to search and extract information from Larson's social media postings so that it can be used in court as evidence Which of the following is the MOST ACCURATE statement regarding what Shane should do when conducting a social media investigation of Larsen?

Options:

A.  

Shane should conduct a forensic shutdown of his computer to preserve the metadata in the social networking sites.

B.  

Shane should preserve the information from the social networking sites so that it can be established as authentic if used in court.

C.  

Shane should email himself the links of the postings so that he can retrieve them later.

D.  

Shane should preserve the information by saving the links of the postings in his 'bookmarks"

Discussion 0
Questions 5

Lmdsey, a Certified Fraud Examiner (CFE). has been retained to investigate allegations of bribery and kickbacks allegedly committed by a member of an organization's procurement department. Lindsey conducts an interview during which one of the accused's colleagues states that they overheard the accused discussing a free tnp received from one of the organization's vendors. Which type of evidence would the interviewee's statement be considered?

Options:

A.  

Documentary evidence

B.  

Testimonial evidence

C.  

Verbal evidence

D.  

Inconclusive evidence

Discussion 0
Questions 6

Which of the following would be MOST USEFUL m determining who created a specrfic document file?

Options:

A.  

Operating system partition

B.  

Internet activity data

C.  

The system log

D.  

The document's metadata

Discussion 0
Questions 7

Which of the following statements is MOST ACCURATE regarding how a fraud examiner should prepare for an interview with a subject from a different jurisdiction?

Options:

A.  

Failing to observe cultural norms is not a concern if the interviewer is from a different country than the interviewee.

B.  

Consulting with legal counsel is only necessary when an investigation spans multiple

C.  

A fraud examiner should find out whether the interviewee can insist upon the presence of a legal representative

D.  

A fraud examiner does not need to research cultural considerations such as appropriate greetings and eye contact.

Discussion 0
Questions 8

Which of the following is NOT true with regard to tracing the disposition of loan proceeds?

Options:

A.  

Tracing loan proceeds can determine if the proceeds were deposited into hidden accounts.

B.  

Tracing loan proceeds can uncover previously hidden assets

C.  

Tracing loan proceeds can determine if hidden accounts were used for loan payments

D.  

Tracing loan proceeds can identify the presence of internal control weaknesses.

Discussion 0
Questions 9

Nathaniel, a Certified Fraud Examiner (CFE). is investigating an alleged inventory theft scheme. While interviewing a subject, he asks, "When were you promoted to manager of the department?" This can BEST be described as a(n):

Options:

A.  

Leading question

B.  

Open question

C.  

Complex question

D.  

Closed question

Discussion 0
Questions 10

Which of the following is a best practice for obtaining a signed statement?

Options:

A.  

Make sure that everything is included in the signed statement and that no addendum are made

B.  

Have the suspect write out the entire statement in their own handwriting

C.  

Have two individuals witness the signing of the document when possible.

D.  

Include all of the subject's offenses, whether related or not, in a angle document.

Discussion 0
Questions 11

Anne used Will as a confidential informant in her investigation Anne listed information provided by Will in her final report, referring to him using his initials. She paid Will in cash and obtained a receipt for the transaction. Which of Anne's methods was NOT considered a best practice when using informants?

Options:

A.  

Referring to Will using his initials

B.  

Obtaining a receipt from Will

C.  

Using information provided by Will in her report

D.  

Using cash to pay Will

Discussion 0
Questions 12

Jade, a Certrfied Fraud Examiner (CFE). is conducting an internal investigation in which an employee is suspected of stealing inventory and selling it through a possible shell company called Hidden Finds. LLC. When Jade tries to check Hidden Finds' website, a message appears that redirects customers to a web address that ends with onion To view the website's content. Jade will need to install a specialized web browser that enables her to access which of the following?

Options:

A.  

The deep archives

B.  

The free web

C.  

The dark web

D.  

The internet archives

Discussion 0
Questions 13

Which of the following is INCORRECT with regard to locating individuals using online records?

Options:

A.  

Before engaging in a search the fraud examine' should know the mod powerful and useful '>Des of searches

B.  

If an individual has moved, obtaining a past address is usually of no help

C.  

Online records are very useful in locating subjects whose whereabouts are unknown

D.  

Obtaining a past address of the subject should be the first step in trying to locate a subject using online records.

Discussion 0
Questions 14

An investigator is preparing to administer what is likely to be an intense and extended interview with a fraud suspect. To organize their thoughts prior to the interview, the fraud examiner should:

Options:

A.  

Provide the suspect with a list of questions to ensure detailed responses-

B.  

Make a list of key points to go over with the respondent.

C.  

Develop a list of questions ranked in order of importance.

D.  

Memorize a detailed list of questions, but avoid taking a written list to the interview

Discussion 0
Questions 15

Charles, a fraud examiner, accuses George of fraud during an admission-seeking interview. George immediately denies the charge How should Charles respond to George's denial?

Options:

A.  

Counter the denial by arguing with George until further denials are futile

B.  

Use a delaying tactic to interrupt the denial

C.  

Remind George he has to tell the truth or face perjury.

D.  

Allow George to continue denying the charge.

Discussion 0
Questions 16

Which of the following is the MOST ACCURATE statement about how fraud examiners shook! approach fraud examinations?

Options:

A.  

Fraud examinations should begin with general information that is known, starting at the periphery, and then move to the more specific details.

B.  

When conducting fraud examinations, fraud examiners should adhere to the means-and-ends approach

C.  

When conducting fraud examinations, fraud examiners should operate under the assumption that the subjects are guilty

D.  

In most examinations, fraud examiners should interview those who are more involved in the matters at issue before interviewing those who are less involved.

Discussion 0
Questions 17

Beta, a Certified Fraud Examiner (CFE). is conducting an admission-seeking interview of Delta, a fraudsuspect. In establishing a rationalization. Beta says to Delta. "I know you didn't do this for yourself: it was for your family." This technique seeks to establish rationalization by:

Options:

A.  

Reducing Delta's stress about possibly being fired

B.  

Claiming Delta's action was for altruistic reasons

C.  

Reducing Delta's perception of the legal seriousness of the matter

D.  

Establishing that Delta's family was being treated unfairly

Discussion 0
Questions 18

Fraud examination reports should be written with which of the following audiences in mind?

Options:

A.  

The media

B.  

Opposing legal counsel

C.  

Investors and owners

D.  

All of the above

Discussion 0
Questions 19

Due to risks of illicit transactions, most jurisdictions require financial institutions to obtain information about which of the following from an institution with which they have a foreign correspondent relationship?

Options:

A.  

The institution's ownership details

B.  

The institution's investment portfolio

C.  

The institution's client loan profiles

D.  

The institution's tax statements

Discussion 0
Questions 20

Delta, an interviewer with little experience, asks Sigma, the respondent, the following question: "Were you aware that the signature was forged, and why didn't you tell anyone earlier?" This kind of question is called a_____________question

Options:

A.  

Complex

B.  

Controlled answer

C.  

Free narrative

D.  

Double-negative

Discussion 0
Questions 21

Which of the following data analysis functions is used to determine whether company policies are met by employee transactions, such as verifying that traveling employees book their accommodations at approved hotels?

Options:

A.  

The correlation analysis function

B.  

The Join function

C.  

The gap testing function

D.  

The compliance verification function

Discussion 0
Questions 22

Which of the following is NOT a function of a fraud examination report?

Options:

A.  

To convey all the evidence necessary for other parties to thoroughly evaluate the case

B.  

To add credibility to the fraud examiner's work

C.  

To corroborate previously known facts

D.  

To communicate the fraud examiner's qualifications for providing opinions about the case

Discussion 0
Questions 23

Which of the following is NOT one of the main limitations of conducting a search for public records using online databases?

Options:

A.  

Online records companies are difficult to find.

B.  

Fraud examiners must validate the accuracy of the records obtained online

C.  

The online record might only be a brief abstract of the original.

D.  

Fraud examiners often must search for public records in multiple jurisdictions.

Discussion 0
Questions 24

Which of the following is NOT a step a fraud examiner must take before seizing evidence in a digital forensic investigation?

Options:

A.  

Obtain and become familiar with any legal orders that apply to the investigation

B.  

Assemble an investigation team comprised only of outside digital forensic experts

C.  

Ensure that only trained professionals employ any software used in a forensic capacity

D.  

Determine whether there are privacy issues related to the item(s) to be searched.

Discussion 0
Questions 25

Which of the following statements concerning a well-written fraud examination report is MOST ACCURATE?

Options:

A.  

The report should convey all Information provided by witnesses

B.  

Only relevant facts that support the fraud allegation should be included in the report

C.  

The report writer should avoid technical jargon where possible

D.  

Signed copies of the fraud examiner's interview notes should be used to report interview details

Discussion 0
Questions 26

Which of the following is the MOST ACCURATE statement regarding a fraud examiner's ability to trace cryptocurrency transactions?

Options:

A.  

Each Blockchain transaction contains a user's cryptographic address, which can help identify patterns that might link the user to criminal activity.

B.  

Most jurisdictions do not require digital wallet providers to record any personal information about cryptocurrency users

C.  

Cryptocurrency ownership cannot be determined through an analysis of details on a subject's bank statements.

D.  

Most cryptocurrencies rely on private block chains, which allow users' transactions to be completely anonymous and therefore difficult to trace.

Discussion 0
Questions 27

Assuming that a jurisdiction has prohibited pretexting against financial institutions, which of the following actions would constitute illegal pretexting?

Options:

A.  

Intentionally making false statements on loan applications

B.  

Stealing a person's mail lo obtain the person's bank account number

C.  

Impersonating an account holder to access their bank records

D.  

Setting up a bank account in an assumed name

Discussion 0
Questions 28

Which of the following questions is MOST HELPFUL for fraud examiners to ask themselves when determining the legality of electronically recording a conversation?

Options:

A.  

"Can the recording include both audio and video?

B.  

"Will the recording equipment produce a digital file?"

C.  

"Will the recorded conversation take place before or after work?"

D.  

"How long is the anticipated recording expected to last?"

Discussion 0
Questions 29

Nobles, a digital forensic examiner for a government agency, is conducting a criminal investigation of Lucas, a construction company executive, for alleged bribery of foreign officials Nobles obtains a court order authorizing him to seize Lucas's personal computer for forensic examination. Which of the following is the MOST ACCURATE statement?

Options:

A.  

If Lucas's computer is running. Nobles may retrieve data from the computer directly via its normal interface 4 the evidence that he needs exists only in the form of volatile data

B.  

If Lucas's computer is off and Nobles needs evidence that exists only in the form of volatile data, he should turn the computer on and retrieve data directly via the computer's normal interlace.

C.  

If Lucas's computer is off. Nobles should not turn it on unless he plans to use an encryption device that can guarantee that the system's hard drive will not be accessed during startup.

D.  

If Lucas's computer is running. Nobles should perform a graceful shutdown by turning it off using the normal shutdown process

Discussion 0
Questions 30

Which of the following statements concerning access to nonpublic records is FALSE?

Options:

A.  

When civil litigation has commenced, a party often may obtain a subpoena or legal order for an individual's relevant bank records.

B.  

A fraud examiner can request a business's bank records even if the business is not legally obligated to comply.

C.  

An audit clause can be designed to allow a party to inspect the books of a business partner or vendor.

D.  

During the government's criminal investigation, a fraud examiner not employed by the government has a right to access relevant documents that the government has obtained.

Discussion 0
Questions 31

Which of the following questions would be most effective when starting the calibration process during an interview?

Options:

A.  

"Did you commit any misconduct against the company?"

B.  

"Do you know what the punishment is for violations like this'5"

C.  

"Do you know who might have defrauded the company?"

D.  

"How many jobs have you had before this one?’

Discussion 0
Questions 32

Which of the following statements would be IMPROPER if included in the fraud examination report of a Certified Fraud Examiner (CFE» who is also qualified as an accounting expert?

Options:

A.  

"The company's internal controls were wholly inadequate to prevent this type of violation and should be remediated at the earliest possible time."

B.  

"The evidence shows that expenses in excess of $5 million were omitted from the company's financial statements "

C.  

"Based on statements the suspect made to me. it is my assessment that the suspect has a dishonest disposition."

D.  

"From my examination, it appears that the company's financial statements were not presented in accordance with generally accepted accounting principles "

Discussion 0
Questions 33

Rachel, a fraud suspect, has decided to confess to Linda, a Certified Fraud Examiner (CFE). In obtaining a verbal confession from Rachel. Linda should obtain all of the following items of information EXCEPT:

Options:

A.  

The approximate beginning and end dates of the fraud

B.  

A statement from Rachel that her conduct was an accident

C.  

A general estimate of the amount of money involved

D.  

Rachel's motive for the offense

Discussion 0
Questions 34

Baker, a Certified Fraud Examiner (CFE). contacts Dierdre for the purpose of conducting a routine, information-gathering interview Dierdre expresses a desire that her coworker. Matthew, whom Baker also plans to interview, be interviewed at the same time Baker should:

Options:

A.  

Interview Dierdre and Matthew separately.

B.  

Interview Dierdre and Matthew at the same time, but bring in a second interviewer

C.  

Interview Dierdre and Matthew at the same time by himself

D.  

Allow Matthew to be present as a silent observer.

Discussion 0
Questions 35

Which of the following statements about the process of obtaining a verbal confession is NOT true?

Options:

A.  

The transition from the accusation to the confession should occur when the accused supplies the first detailed information about the offense.

B.  

Fraudsters tend to overestimate the amount of funds involved in the offense to relieve themselves of the guilt of their dishonest actions.

C.  

If the subject lies about an aspect of the offense in the process of confessing, it is best to proceed initially as if the falsehood has been accepted as truth.

D.  

The three general approaches to obtaining a verbal confession are chronologically, by transaction, or by event.

Discussion 0
Questions 36

Which of the following types of data is BEST suited for a BenfordTs Law analysis?

Options:

A.  

Employee identification numbers

B.  

Telephone numbers

C.  

A listing of payment amounts

D.  

Vendor addresses

Discussion 0
Questions 37

Gunn, a Certified Fraud Examiner (CFE). was hired to trace Kelly's financial transactions. During his investigation. Gunn obtains records of electronic payments that Kelly made during the past three years. Which of the following are these records MOST LIKELY to reveal?

Options:

A.  

If Kelly has been skimming funds

B.  

The cities and countries in which Kelly conducts business

C.  

The division and distribution of Kelly's assets

D.  

The market value of any real property Kelly owns

Discussion 0
Questions 38

Tara. a Certified Fraud Examiner (CFE). is searching social media sites for evidence in a fraud investigation. Which of the following is the MOST ACCURATE statement regarding what Tara should do when mining social media sites for evidence of fraud?

Options:

A.  

Tara should preserve the information by saving the links of the postings as bookmarks in her browser.

B.  

Tara should preserve the metadata by printing out the web pages of each of the postings.

C.  

Tara should conduct a forensic shutdown of the computer to preserve the metadata m the social networking sites.

D.  

Tara should preserve the information from the sites so that it can be established as authentic if used in court.

Discussion 0
Questions 39

Which of the following BEST describes the data analytics approach known as predictive analytics?

Options:

A.  

The employment of a learning algorithm that identifies similarities, patterns, or anomalies within a data set on its own, without human involvement

B.  

The configuration of a business program to emulate and integrate the actions of a human to execute certain business processes thus increasing efficiency and automating repetitive manual tasks

C.  

The use of historical data, along with analyses, statistics, and machine learning components, to build a mathematical model that captures important trends and creates a quantitative forecast

D.  

The use of layered artificial neural networks to accommodate more data and more sophisticated algorithms to identify complex patterns

Discussion 0
Questions 40

Which of the following situations would probably NOT require access to nonpublic records to develop evidence?

Options:

A.  

Obtaining personal health care records

B.  

Accessing banking records to trace assets

C.  

Reviewing a company's business filings

D.  

Analyzing an individual's personal mobile phone records

Discussion 0
Questions 41

Which of the following is a measure that can help avoid alerting suspected perpetrators who are under investigation?

Options:

A.  

Terminate the suspected employee.

B.  

Notify everyone in the affected department

C.  

Delay taking any action.

D.  

Inform only those who need to know.

Discussion 0
Questions 42

Which of the following is the MOST IMPORTANT question for a fraud examiner to ask before commencing a legal action to recover assets?

Options:

A.  

"Is there a relevant statute of limitations9"

B.  

"Does the suspect already have a criminal record?"

C.  

"Is the suspect guilty of the fraudulent act?''

D.  

"Are nonlegal recovery methods or remedies available?''

Discussion 0
Questions 43

A fraud examiner contacts a witness regarding an interview. If the respondent says. ‘I’m too busy." how should the fraud examiner react?

Options:

A.  

Explain that the respondent will be subject to discipline if they do not participate

B.  

Stress that the interview will be short.

C.  

Caution the witness that avoidance of the interview will be considered suspicious.

D.  

Inquire about a more convenient time

Discussion 0
Questions 44

Pedro, a Certified Fraud Examiner (CFE). is conducting an admission-seeking interview of Manuel, a fraud suspect. After Pedro diffused Manuel's alibis. Manuel became withdrawn and stowty began to slouch m his chair, bowing his head and beginning to cry. What should Pedro do now?

Options:

A.  

Leave the room for a short lime

B.  

Ask Manuel to sit up straight

C.  

Demand that Manuel stop crying.

D.  

Present an alternative question.

Discussion 0
Questions 45

In response to an accusation made during an admission-seeking interview, the subject begins to voice a denial to the charge. How should the interviewer react to the first indication of a subject's denial?

Options:

A.  

Allow the subject 1o continue denying the charge

B.  

Argue the point directly with the subject until a confession is obtained

C.  

Remind the subject of the laws against perjury.

D.  

Interrupt the denial by using a delaying tactic.

Discussion 0
Questions 46

Which of the following is a reason why a subject's credit card records and statements can be useful in tracing investigations?

Options:

A.  

Credit card records can provide leads to help identify a subjects hidden assets

B.  

Credit card records can show signs that the subject has skimmed funds.

C.  

Credit card statements show the source of the funds used to pay a credit card bill.

D.  

Credit card statements provide insight into the subject's litigation history

Discussion 0
Questions 47

Which of the following is the MOST ACCURATE statement regarding the analysis phase in digital forensic investigations?

Options:

A.  

When analyzing data for evidence, fraud examiners should look for exculpatory evidence But not inculpatory evidence

B.  

During the analysis phase, it is best to use just one forensic tool for identifying, extracting, and collecting digital evidence

C.  

The primary concern when analyzing digital evidence is to maintain the integrity of the data at all times

D.  

The analysis phase of digital forensic investigations should not commence unless it is venfied that the suspect devices do not contain relevant data

Discussion 0
Questions 48

Allison, a Certified Fraud Examiner (CFE). is investigating a potential procurement fraud scheme. While interviewing a subject, she asks. "Why did you choose to do business with that vendor?" This can BEST be described as a(n):

Options:

A.  

Open question

B.  

Complex question

C.  

Leading question

D.  

Closed question

Discussion 0
Questions 49

Susan, a Certified Fraud Examiner (CFE). is conducting an ad mission-seeking interview of Beth, a fraud suspect. After Susan gave Beth a suitable rationalization for her conduct. Beth continued her denials, giving various alibis. Which of the following would be the LEAST EFFECTIVE technique for Susan to use in this situation?

Options:

A.  

Displaying evidence that specifically contradicts Beth's alibis

B.  

Discussing some of Beth's prior deceptions

C.  

Discussing the testimony of other witnesses

D.  

Displaying all the evidence she has against Beth at once

Discussion 0
Questions 50

Thea is conducting a fraud examination for a company and suspects one of the company's vendors (a one-person operation) of fraudulent billing. Thea wants to obtain a copy of the suspect individual's credit report and personal data from a third-party information broker. If Thea works in a jurisdiction that regulates the distribution of personal credit information, she cannot obtain the suspect's personal credit data under any circumstances.

Options:

A.  

True

B.  

False

Discussion 0
Questions 51

Elizabeth, a Certified Fraud Examiner (CFE), is conducting an admission-seeking interview with Shannon, a fraud suspect. Shannon is seated approximately five feet away from Elizabeth in an empty room The room has several pictures and posters on the wall, and the door is closed According to admission-seeking interview best practices, what change should Elizabeth make to the interview environment to increase the chances of the interview's success?

Options:

A.  

Move the interview to a room without pictures or wall hangings to prevent distractions

B.  

Open the door so that Shannon feels free to leave at any time

C.  

Place a table between her and Shannon to create a psychological barrier

D.  

All of the above

Discussion 0