Pre-Summer Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

ACFE CFE-Investigation Dumps

Certified Fraud Examiner (CFE) - Investigation Questions and Answers

Question 1

When documenting interviews, it is BEST practice for the interviewer to:

Options:

A.

Document notes for each interview separately, nduding those for electronic recordings.

B.

Write down verbatim all of (he information that the subject provides during the interview

C.

Err on the side of taking too many notes rather than too few.

D.

Note impressions regarding the subject's guilt or innocence.

Question 2

Which of the following statements concerning access to nonpublic records is FALSE?

Options:

A.

When civil litigation has commenced, a party often may obtain a subpoena or legal order for an individual's relevant bank records.

B.

A fraud examiner can request a business's bank records even if the business is not legally obligated to comply.

C.

An audit clause can be designed to allow a party to inspect the books of a business partner or vendor.

D.

During the government's criminal investigation, a fraud examiner not employed by the government has a right to access relevant documents that the government has obtained.

Question 3

Which of the following statements about how fraud examiners should approach fraud examinations is FALSE?

Options:

A.

In most examinations, fraud examiners should start interviewing the least involved candidates and proceed toward those who are potentially more involved.

B.

When conducting fraud examinations, fraud examiners should start with specific details and move toward more general information.

C.

When conducting fraud examinations, fraud examiners should adhere to the fraud theory approach.

D.

When conducting fraud examinations, fraud examiners should begin with general information that is known and then move to the more specific details.

Question 4

Which of the following is a measure that can help avoid alerting suspected perpetrators who are under investigation?

Options:

A.

Terminate the suspected employee.

B.

Notify everyone in the affected department

C.

Delay taking any action.

D.

Inform only those who need to know.

Question 5

A fraud examiner believes that a suspect might have used illicit funds to construct a commercial building to fit a restaurant. Which of the following records would be the MOST helpful in confirming the owner of the building?

Options:

A.

Local court records

B.

Commercial filings

C.

Building permit records

D.

Voter registration records

Question 6

A fraud examiner is based in Mexico, a non-European Union (EU) country, and is collecting personal information from their company's human resources (HR) files about an employee based in Germany, an EU country. Based on these facts, the fraud examiner would need to comply with the EU"s General Data Protection Regulation (GDPR) when conducting their internal investigation.

Options:

A.

True

B.

False

Question 7

Which of the following is a factor that fraud examiners should consider when determining whether to dispose of evidence following the conclusion of a fraud examination?

Options:

A.

Whether the information was presented by a lay witness or an expert witness

B.

Whether the evidence is documentary or testimonial

C.

Whether the evidence is direct or circumstantial

D.

Whether the organization has a general document retention policy in place

Question 8

Which of the following can be obtained from a wire transfer record?

Options:

A.

The amount of the transfer in question

B.

The type of money order used to make the transfer

C.

The location of the customs port of entry for the transfer

D.

The recipient's government identification number

Question 9

Orlando is conducting a fraud examination regarding Fast Freight, a large publicly traded corporation, and wants to find the current officers and directors of the company. Which of the following would be the best source of information for this purpose?

Options:

A.

Commercial filings

B.

Real property records

C.

The company's corporate bylaws

D.

Regulatory securities records

Question 10

Which of the following is a common characteristic that asset hiders look for in the financial vehicles they use to conceal their assets?

Options:

A.

Accessibility

B.

Transparency

C.

Exclusivity

D.

Traceability

Question 11

Which of the following is considered a best practice for preserving the confidentiality of a fraud investigation?

Options:

A.

Suspend all employees involved in the investigation pending the investigation's outcome.

B.

Ensure that the investigation is conducted at the direction of, or under the supervision of. a government official

C.

Avoid using email or other electronic means to transmit confidential case information

D.

Implement a blanket policy prohibiting all employees from discussing anything related to employee investigations

Question 12

Which of the following is the MOST ACCURATE statement about imaging suspect computers' hard drives?

Options:

A.

Imaging enables the retrieval of data from the suspect computer directly via its operating system.

B.

Imaging prohibits access to the suspect computer's hard drive by individuals not professionally trained in forensic analysis

C.

Imaging creates pictures of the suspect computer system and its wires and cables

D.

Imaging allows for the analysis of data from a suspect computer without altering or damaging the original data in any way

Question 13

Martin is a fraud examiner. He contacts Dianne for the purpose of conducting a routine, information-gathering interview. Dianne says that she wants her coworker. Sheila, whom Martin also plans to interview, to be present during the interview. Martin should:

Options:

A.

Interview Dianne and Sheila separately

B.

Allow Sheila to be present but only if she does not speak

C.

Interview Dianne and Sheila together by himself

D.

Interview Dianne and Sheila together, but bring in a second interviewer

Question 14

Management at First Choice Inc. suspects that Nathan, its chief financial officer (CFO), has been embezzling funds. It hires Reina. a Certified Fraud Examiner (CFE), to investigate the matter When conducting the fraud examination. Reina should proceed as though;

Options:

A.

After Nathan is terminated, the case will end

B.

The case will end in litigation.

C.

Nathan is guilty

D.

The matter will be resolved completely internally.

Question 15

Which of the following statements would be IMPROPER if included in the fraud examination report of a Certified Fraud Examiner (CFE» who is also qualified as an accounting expert?

Options:

A.

"The company's internal controls were wholly inadequate to prevent this type of violation and should be remediated at the earliest possible time."

B.

"The evidence shows that expenses in excess of $5 million were omitted from the company's financial statements "

C.

"Based on statements the suspect made to me. it is my assessment that the suspect has a dishonest disposition."

D.

"From my examination, it appears that the company's financial statements were not presented in accordance with generally accepted accounting principles "

Question 16

Which of the following is the MOST ACCURATE statement regarding a fraud examiner's ability to trace cryptocurrency transactions?

Options:

A.

Each Blockchain transaction contains a user's cryptographic address, which can help identify patterns that might link the user to criminal activity.

B.

Most jurisdictions do not require digital wallet providers to record any personal information about cryptocurrency users

C.

Cryptocurrency ownership cannot be determined through an analysis of details on a subject's bank statements.

D.

Most cryptocurrencies rely on private block chains, which allow users' transactions to be completely anonymous and therefore difficult to trace.

Question 17

Elsa, a fraud examiner at ABC Corp., is interviewing Leah, a fraud suspect. Leah allegedly committed a fraud scheme that resulted in a loss of $200,000 for ABC. Elsa asks Leah directly whether she was involved in the fraud. Which of the following responses from Leah is MOST LIKELY an indication that she is being deceptive?

Options:

A.

“No, I have never stolen anything from ABC.”

B.

“I had no involvement with the scheme.”

C.

“Why would I do something like that?”

D.

“No, I did not commit fraud against ABC.”

Question 18

A law enforcement officer receives a reliable tip from an informant that a government employee is soliciting bribes in exchange for awarding contracts to the employee's agency. To investigate, the officer poses as a potential contractor and contacts the suspect employee about the possibility of getting a contract with the agency. During the conversation, the suspect demands a cash payment for the officer to be considered for upcoming contracts. If the suspect claims entrapment at trial, then which of the following is MOST LIKELY to occur?

Options:

A.

The suspect's claim will succeed because the investigator used deceit

B.

The suspect's claim will succeed because the investigator lacked probable cause

C.

The suspect's claim will fail because the investigator had adequate predication

D.

The suspect's claim will fail because the investigator is a law enforcement agent

Question 19

A fraud examiner contacts a witness regarding an interview. If the respondent says. ‘I’m too busy." how should the fraud examiner react?

Options:

A.

Explain that the respondent will be subject to discipline if they do not participate

B.

Stress that the interview will be short.

C.

Caution the witness that avoidance of the interview will be considered suspicious.

D.

Inquire about a more convenient time

Question 20

Gamma, a Certified Fraud Examiner (CFE>, was conducting an admission-seeking interview of Delta, a fraud suspect. Gamma tells Delta, "It isn't like you took something from a friend or neighbor I can see how you could say. 'Well, this would be okay as long as it is the company and not my coworkers.' Isn't that right?" This technique seeks to establish rationalization by:

Options:

A.

Convincing DDU that the incident had suffcinet justification

B.

Reducing Delta's perception of the legal seriousness of the matter

C.

Depersonalizing the victim

D.

Developing revenge as a motive

Question 21

A fraud examiner contacts a witness for an interview regarding a bribery case, but the witness says that they are too busy to be interviewed. It is MOST APPROPRIATE for the fraud examiner to respond by:

Options:

A.

Telling the witness that they will be disciplined if they do not agree to meet that day.

B.

Suggesting that the witness choose a time and location that is more convenient.

C.

Asking the witness to detail what they are busy doing for reporting purposes.

D.

Emphasizing to the witness that their help is needed and it will not take long.

Question 22

Sylvia, a novice interviewer, asks Adam, the respondent, the following question: "Didn't you know that something wasn't right?" This kind of question is called a_____________question.

Options:

A.

Double-negative

B.

Free narrative

C.

Controlled answer

D.

Complex

Question 23

Which of the following is the MOST IMPORTANT question for a fraud examiner to ask before commencing a legal action to recover assets?

Options:

A.

"Has the defendant been previously arrested for allegedly committing a white-collar crime?"

B.

"Does the defendant have sufficient property or money to satisfy a money judgment?"

C.

"Is there a relevant statute of limitations?"

D.

"Is the suspect guilty of the fraudulent act?"

Question 24

Charles, a fraud examiner, accuses George of fraud during an admission-seeking interview. George immediately denies the charge How should Charles respond to George's denial?

Options:

A.

Counter the denial by arguing with George until further denials are futile

B.

Use a delaying tactic to interrupt the denial

C.

Remind George he has to tell the truth or face perjury.

D.

Allow George to continue denying the charge.

Question 25

Which of the following is the LEAST ACCURATE statement about seizing a computer for examination?

Options:

A.

When taking a computer for examination, if the computer is off. it should remain off when it is removed.

B.

When seizing a computer that is running, it is acceptable for a fraud examiner to review the files contained on the machine prior to seizing it.

C.

Before removing a computer system from a scene for further analysis, it is important to document the system's setup with photographs or diagrams.

D.

When seizing a computer for examination, the seizing party should took around the area for passwords because many people leave passwords near their computers

Question 26

Andrew wants to use a confidential informant in his investigation. He plans to compensate the informant with cash and obtain a receipt. He also plans to identify his source in a memorandum and his final report using only the informant's initials. Which of Andrew's plans is NOT considered a best practice when using an informant?

Options:

A.

Referring to the informant in the memorandum using the informant's initials

B.

Using information from the informant in his final report

C.

Creating a receipt regarding the cash payment

D.

Compensating the informant with cash

Question 27

Naveed, a fraud suspect, has decided to make an admission to Omar, a Certified Fraud Examiner (CFE). Which of the following items of information should Omar obtain from Naveed during the verbal admission?

Options:

A.

A general estimate of the amount of money involved in the fraud

B.

Facts about the fraud known to co-conspirators and witnesses

C.

A statement from Naveed indicating that his conduct was an accident

D.

Controls that would have prevented Naveed from committing the fraud

Question 28

Due to risks of illicit transactions, most jurisdictions require financial institutions to obtain information about which of the following from an institution with which they have a foreign correspondent relationship?

Options:

A.

The institution's ownership details

B.

The institution's investment portfolio

C.

The institution's client loan profiles

D.

The institution's tax statements

Question 29

Which of the following BEST describes the data analytics approach known as predictive analytics?

Options:

A.

The employment of a learning algorithm that identifies similarities, patterns, or anomalies within a data set on its own, without human involvement

B.

The configuration of a business program to emulate and integrate the actions of a human to execute certain business processes thus increasing efficiency and automating repetitive manual tasks

C.

The use of historical data, along with analyses, statistics, and machine learning components, to build a mathematical model that captures important trends and creates a quantitative forecast

D.

The use of layered artificial neural networks to accommodate more data and more sophisticated algorithms to identify complex patterns

Question 30

During an interview, Alex asked a fraud suspect if he could retrieve the suspect's account records from her bank. The suspect said, "yes." but she did not provide consent in writing Although the suspect orally consented, the suspect's bank is NOT required to allow Alex to access the suspect's account records at this point.

Options:

A.

True

B.

False

Question 31

Elizabeth, a Certified Fraud Examiner (CFE), is conducting an admission-seeking interview with Shannon, a fraud suspect. Shannon is seated approximately five feet away from Elizabeth in an empty room The room has several pictures and posters on the wall, and the door is closed According to admission-seeking interview best practices, what change should Elizabeth make to the interview environment to increase the chances of the interview's success?

Options:

A.

Move the interview to a room without pictures or wall hangings to prevent distractions

B.

Open the door so that Shannon feels free to leave at any time

C.

Place a table between her and Shannon to create a psychological barrier

D.

All of the above

Question 32

Anne used Will as a confidential informant in her investigation Anne listed information provided by Will in her final report, referring to him using his initials. She paid Will in cash and obtained a receipt for the transaction. Which of Anne's methods was NOT considered a best practice when using informants?

Options:

A.

Referring to Will using his initials

B.

Obtaining a receipt from Will

C.

Using information provided by Will in her report

D.

Using cash to pay Will

Question 33

Which of the following questions is MOST HELPFUL for fraud examiners to ask themselves when determining the legality of electronically recording a conversation?

Options:

A.

"Can the recording include both audio and video?

B.

"Will the recording equipment produce a digital file?"

C.

"Will the recorded conversation take place before or after work?"

D.

"How long is the anticipated recording expected to last?"

Question 34

When planning for the interview phase of an investigation, which of the following steps should NOT be taken by the fraud examiner?

Options:

A.

Consider what the interview is intended to accomplish and state an objective.

B.

Review the case file to ensure that important information has not been overlooked

C.

Prepare a detailed list of questions to ask the subject during the interview.

D.

Ensure that the interview is held in a venue where the subject will feel Uncomfortable

Question 35

Barnes, a Certified Fraud Examiner (CFE). is using data analysis to identify anomalies that might indicate fraud in XYZ Company's accounts payable transactions. Which of the following is the MOST EFFECTIVE data analysis function that Barnes could use to look for potential fraud in accounts payable?

Options:

A.

Compare book and tax depreciation and indicate variances

B.

Identify paycheck amounts over a certain limit

C.

Review recurring monthly expenses and compare to posted/paid invoices

D.

All of the above

Question 36

Which of the following questions would be most effective when starting the calibration process during an interview?

Options:

A.

"Did you commit any misconduct against the company?"

B.

"Do you know what the punishment is for violations like this'5"

C.

"Do you know who might have defrauded the company?"

D.

"How many jobs have you had before this one?’

Question 37

Which of the following statements concerning access to nonpublic records is MOST ACCURATE?

Options:

A.

Once a criminal case is filed, all records obtained by the government are considered public records

B.

Nonpublic records cannot be obtained by subpoena or legal order in a civil action

C.

In most junsdictions. banks are allowed to turn over a suspect's account information directly to a fraud victim when there is adequate evidence of wrongdoing.

D.

The government usually will not share nonpublic records with a fraud victim during an investigation into the underlying fraud.

Question 38

Which of the following would be most useful in determining when a specific document file was created?

Options:

A.

The document's metadata

B.

Internet activity data

C.

The system tog

D.

Operating system partition

Question 39

Which of the following statements concerning a well-written fraud examination report is MOST ACCURATE?

Options:

A.

The report should convey all Information provided by witnesses

B.

Only relevant facts that support the fraud allegation should be included in the report

C.

The report writer should avoid technical jargon where possible

D.

Signed copies of the fraud examiner's interview notes should be used to report interview details

Question 40

All of the following are true with regard to textual analytics EXCEPT:

Options:

A.

When conducting textual analysis, the fraud examiner should come up with a list of fraud keywords to search for.

B.

Textual analytics is used to reveal patterns, sentiments, and relationships indicative of fraud

C.

The purpose of textual analytics is to search for and find an admission of fraud that can be presented in court

D.

Textual analytics provides the ability to uncover warning signs of potentially fraudulent employee behavior

Question 41

When a fraud examiner is conducting an examination and is in the process of collecting documents, the fraud examiner should:

Options:

A.

Dust all physical key documents for fingerprints

B.

Establish a document database early in the investigation

C.

Make copies of originals and leave the originals where they were found

D.

Organize all the documents obtained in chronological order

Question 42

Which of the following is a reason why a subject's credit card records are useful in tracing investigations?

Options:

A.

Credit card statements show source of the funds used to pay a credit card bill

B.

Credit card records show the movements and habits of the subject

C.

Credit card records provide insight into the subject's litigation history

D.

Credit card records contain information about the division and distribution of the subject's assets

Question 43

Which of the following is TRUE of a follow-up/recommendations section in a written fraud examination report?

Options:

A.

A follow-up recommendations section is a required part of every written fraud examination report

B.

A follow-up/recommendations section calculates the amount of fraud-related loss sustained by the organization

C.

A follow-up/recommendations section should state remedial measures for the organization to undertake

D.

All of the above

Question 44

Which of the following is one of the purposes of closing questions in a routine interview?

Options:

A.

To close the interview positively and maintain goodwill

B.

To assess whether the subject is ready to confess

C.

To confirm the credibility of the witness being interviewed

D.

To reduce testimony to a signed, written statement

Question 45

Jason is an investigator who is conducting an interview with Dina. a fraud suspect. After introducing himself. Jason attempts to be amiable by asking about Dina's favorite sports team and complimenting her eyeglass frames. Jason is attempting to:

Options:

A.

Establish the interview theme.

B.

Establish rapport.

C.

Calibrate the witness.

D.

Exhibit passive listening

Question 46

Which of the following is the MOST ACCURATE statement about trying to locate a subject using online records?

Options:

A.

Most public records services do not maintain a list of past addresses

B.

Obtaining a past address of the subject should be the first step in trying to locate a subject using online records

C.

The first step in locating someone using online records is to obtain a list of past employers

D.

Online records are generally not useful in locating subjects whose address is unknown

Question 47

June, a fraud examiner, is preparing to interview a subject who is from a different jurisdiction. Before conducting the interview, June should:

Options:

A.

Familiarize the subject with the cultural practices common in June’s jurisdiction so there are no surprises.

B.

Research the cultural norms common in the subject’s jurisdiction so they can be avoided to make the subject less comfortable.

C.

Consult with legal counsel in advance only if the investigation is likely to involve a third jurisdiction.

D.

Verify whether the subject’s jurisdiction has any rules in place that would prevent June from compelling the subject to cooperate with her.

Question 48

Baker, a Certified Fraud Examiner (CFE). is getting prepared to conduct a lengthy and complex interview. To prepare himself. Baker should:

Options:

A.

Writs down a detailed list of questions in advance

B.

Avoid bringing any notes with him to the interview

C.

Write down key points to go over with the respondent

D.

Take only the documents he wishes to go over

Question 49

Which of the following statements is MOST ACCURATE regarding covert operations?

Options:

A.

Fraud examiners should conduct coven operations only after attempting conventional methods of evidence-gathering

B.

Mistakes in covert operations generally do not cause damage to their associated investigations

C.

Covert operations rarely prove beneficial to investigations even when planned properly.

D.

Most jurisdictions provide protections for investigators conducting covert operations that shield them from reputational, financial, and legal consequences.

Question 50

Antonio is the former boyfriend of Hannah, a fraud suspect. He approaches Ashley, a fraud examiner at Hannah's company, and offers to provide critical information about Hannah's fraud in exchange for full confidentiality. Which of the following is the MOST APPROPRIATE response for Ashley to make?

Options:

A.

Ashley should explain that Antonio may have qualified confidentiality but that she cannot make any absolute assurances

B.

Ashley should promise Antonio unqualified confidentiality over all information provided

C.

Ashley should explain that all information must be disclosed to management so nothing Antonio says will be confidential

D.

Ashley should promise Antonio that his identity will not become known.

Question 51

Which of the following is the MOST ACCURATE statement concerning the volatility of digital evidence?

Options:

A.

Digital evidence is more volatile than tangible evidence because digital evidence is subject to claims of spoliation, whereas tangible evidence is not.

B.

Digital evidence is more volatile than tangible evidence because the rules of admissibility for digital evidence are stricter than such rules for tangible evidence.

C.

If the integrity of digital evidence is violated, it can often be restored through a digital cleansing process

D.

The failure to preserve the integrity of digital evidence could result in evidence being deemed inadmissible in a legal proceeding

Question 52

Which of the following is NOT one of the main limitations of conducting a search for public records using online databases?

Options:

A.

Online records companies are difficult to find.

B.

Fraud examiners must validate the accuracy of the records obtained online

C.

The online record might only be a brief abstract of the original.

D.

Fraud examiners often must search for public records in multiple jurisdictions.

Question 53

Which of the following is the MOST APPROPRIATE way to document information obtained from social media sites?

Options:

A.

Save links of the social media postings and pages in a web browser.

B.

Request a copy of the information from the social media platforms.

C.

Conduct a forensic shutdown of a computer to preserve the metadata from the social media sites and profiles visited.

D.

Download and preserve the information from the social media sites so that it can be established as authentic if used in court.

Question 54

Tara. a Certified Fraud Examiner (CFE). is searching social media sites for evidence in a fraud investigation. Which of the following is the MOST ACCURATE statement regarding what Tara should do when mining social media sites for evidence of fraud?

Options:

A.

Tara should preserve the information by saving the links of the postings as bookmarks in her browser.

B.

Tara should preserve the metadata by printing out the web pages of each of the postings.

C.

Tara should conduct a forensic shutdown of the computer to preserve the metadata m the social networking sites.

D.

Tara should preserve the information from the sites so that it can be established as authentic if used in court.

Page: 1 / 18
Total 181 questions