Certified Fraud Examiner (CFE) - Investigation Questions and Answers
Anita is interviewing her client's employee, whom she suspects committed check fraud. During the interview. Anita asks if she can obtain account records from the suspect's bank If the suspect only gives Anita oral consent, the suspect's bank is required to allow Anita access to the suspect's account records.
Which of the following terms refers to a process of resolving allegations of fraud from inception to disposition?
Which of the following BEST describes the data analytics approach known as predictive analytics?
Louis, a Certified Fraud Examiner (CFE). is investigating a potential internal fraud case originating from a whistteblower tip about embezzlement. He discovers that the organization purportedly affected by the embezzlement recorded the tip in a memorandum. Which type of evidence would the memorandum be considered?
Gilbert is preparing to conduct a covert investigation. Before acting, he wants to wnte a memorandum documenting his plan. Which of the following pieces of information should he include in this memorandum?
Beta, a Certified Fraud Examiner (CFE). is conducting an admission-seeking interview of Gamma, a fraud suspect. After Beta gave Gamma an appropriate rationalization for his conduct, Gamma continued his denials, giving various alibis. These alibis can usually be diffused by all of the following techniques EXCEPT:
Which of the following data is the MOST DIFFICULT to recover during a digital forensic examination?
Jackson, a digital forensic examiner for a government agency, is conducting a criminal investigation into the alleged embezzlement of funds from the government's Welfare Department (WD). Ginny. a WD employee, is the prime suspect. Jackson obtains a court order authorizing him to seize Ginny's personal computer for forensic examination. Which of the following is the MOST ACCURATE statement?
Which of the following statements about fraud response plans is FALSE?
Baker, a Certified Fraud Examiner (CFE). is getting prepared to conduct a lengthy and complex interview. To prepare himself. Baker should:
Christopher, a fraud examiner, is conducting an admission-seeking interview with Jennifer, an employee suspected of stealing cash. Which of the following is the LEAST EFFECTIVE phrasing for Christopher to use when posing an admission-seeking question to Jennifer?
Assuming that a jurisdiction has prohibited pretexting against financial institutions, which of the following actions would constitute illegal pretexting?
Tara. a Certified Fraud Examiner (CFE). is searching social media sites for evidence in a fraud investigation. Which of the following is the MOST ACCURATE statement regarding what Tara should do when mining social media sites for evidence of fraud?
When documenting interviews, it is BEST practice for the interviewer to:
Which of the following is NOT true with regard to tracing the disposition of loan proceeds?
Nobles, a digital forensic examiner for a government agency, is conducting a criminal investigation of Lucas, a construction company executive, for alleged bribery of foreign officials Nobles obtains a court order authorizing him to seize Lucas's personal computer for forensic examination. Which of the following is the MOST ACCURATE statement?
Which of the following is NOT a function of a fraud examination report?
Which of the following sets of numbers could a fraud examiner MOST LIKELY benefit from running a Benford’s Law analysis on?
In response to an accusation made during an admission-seeking interview, the subject begins to voice a denial to the charge. How should the interviewer react to the first indication of a subject's denial?
Allison, a Certified Fraud Examiner (CFE). is investigating a potential procurement fraud scheme. While interviewing a subject, she asks. "Why did you choose to do business with that vendor?" This can BEST be described as a(n):
Nathaniel, a Certified Fraud Examiner (CFE). is investigating an alleged inventory theft scheme. While interviewing a subject, he asks, "When were you promoted to manager of the department?" This can BEST be described as a(n):
Which of the following is a factor that fraud examiners should consider when determining whether to dispose of evidence following the conclusion of a fraud examination?
An investigator is preparing to administer what is likely to be an intense and extended interview with a fraud suspect. To organize their thoughts prior to the interview, the fraud examiner should:
Which of the following is NOT one of the main limitations of conducting a search for public records using online databases?
Which of the following is the MOST ACCURATE statement about trying to locate a subject using online records?
John, a fraud investigator, is interviewing Mary, who he suspects has been embezzling company funds. Which of the following is the recommended approach John should use to ask Mary questions?
Which of the following questions is MOST HELPFUL for fraud examiners to ask themselves when determining the legality of electronically recording a conversation?
Which of the following is NOT true with regard to tracing the disposition of loan proceeds?
Why is it necessary to image a seized computer's hard drive for forensic analysis?
Which of the following situations would MOST LIKELY require access to nonpublic records to develop evidence?
Which of the following would be most useful in determining when a specific document file was created?
Which of the following statements would be IMPROPER if included in the fraud examination report of a Certified Fraud Examiner (CFE» who is also qualified as an accounting expert?
If the following statements were included in a fraud examination report of a qualified expert, which of them would be IMPROPER?
Janet suspects that a local restaurant is being used as a front business for a criminal operation. Which of the following types of records would be the MOST LIKELY to help Janet discover who owns the restaurant building?
Assuming that a jurisdiction has prohibited pretexting with financial institutes, which of the following actions would constitute illegal pretexting?
Which of the following situations would probably NOT require access to nonpublic records to develop evidence?
Fraud examination reports should be written with which of the following audiences in mind?
Marcus is trying to locate the financial statements of Acme Airlines, a multinational publicly traded corporation. Which of the following sources would be MOST EFFECTIVE for finding this information?
Andrew wants to use a confidential informant in his investigation. He plans to compensate the informant with cash and obtain a receipt. He also plans to identify his source in a memorandum and his final report using only the informant's initials. Which of Andrew's plans is NOT considered a best practice when using an informant?
Which of the following is a best practice for obtaining a signed statement?
Which of the following is TRUE of a follow-up/recommendations section in a written fraud examination report?
Gamma, a Certified Fraud Examiner (CFE>, was conducting an admission-seeking interview of Delta, a fraud suspect. Gamma tells Delta, "It isn't like you took something from a friend or neighbor I can see how you could say. 'Well, this would be okay as long as it is the company and not my coworkers.' Isn't that right?" This technique seeks to establish rationalization by:
Which of the following statements concerning access to nonpublic records is MOST ACCURATE?
Which of the following is NOT a step a fraud examiner must take before seizing evidence in a digital forensic investigation?
Delta, an interviewer with little experience, asks Sigma, the respondent, the following question: "Were you aware that the signature was forged, and why didn't you tell anyone earlier?" This kind of question is called a_____________question
Which of the following is NOT a recommended strategy when conducting admission-seeking interviews?
Which of the following is one of the purposes of closing questions in a routine interview?
Eugene is conducting an admission-seeking interview of a suspect. During the interview, the suspect frequently looks away from Eugene while responding to questions. Eugene can safely conclude that the suspect is dishonest due to his failure to maintain eye contact.
Which of the following is NOT one of the main limitations of conducting a search for public records using online databases?
Which of the following is NOT an advantage to using link analysis in a fraud investigation?
Steve, a Certified Fraud Examiner (CFE). was interviewing Michelle, a fraud suspect. Dunng the first part of the interview. Michelle was attentive. However, when he asked her more direct questions about the fraud, she suddenly seemed unconcerned, alternately chewing on her pen cap and picking at a loose piece of fabric on the arm of her chair. From this conduct. Steve is likely to conclude that Michelle