Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium ACFE CFE-Investigation Dumps Questions Answers

Certified Fraud Examiner (CFE) - Investigation Questions and Answers

Question 1

Management at Oak Company has asked Arthur, an internal auditor, to implement a data analysis program to search for warning signs of potential fraud within the company. Which of the following steps should Arthur conduct first to MOST effectively use data analysis techniques for such an initiative?

Options:

A.

Analyze the data.

B.

Cleanse and normalize the data

C.

Build a profile of potential frauds.

D.

Obtain the data.

Buy Now
Question 2

Shannon, a Certified Fraud Examiner (CFE), is conducting a fraud examination for Sand Corp. Shannon is going to perform a textual analysis on unstructured data, such as emails and instant messages. Why would Shannon perform such an analysis?

Options:

A.

The analysis will determine whether someone is lying or telling the truth based on clues within the data.

B.

The analysis will uncover an admission of fraud in an email or other communication that can be presented in court.

C.

The analysis will produce a visual representation of the data collected to track the movement of money.

D.

The analysis will categorize data to reveal patterns, sentiments, and relationships that are indicative of fraud.

Question 3

Which of the following is the MOST ACCURATE statement concerning the volatility of digital evidence?

Options:

A.

Digital evidence is more volatile than tangible evidence because digital evidence is subject to claims of spoliation, whereas tangible evidence is not.

B.

Digital evidence is more volatile than tangible evidence because the rules of admissibility for digital evidence are stricter than such rules for tangible evidence.

C.

If the integrity of digital evidence is violated, it can often be restored through a digital cleansing process

D.

The failure to preserve the integrity of digital evidence could result in evidence being deemed inadmissible in a legal proceeding

Question 4

Which of the following is a unique challenge of cloud forensics that is not encountered in traditional forensic practices?

Options:

A.

Lack of corroborating evidence

B.

Lack of data control

C.

Lack of trust from cloud providers

D.

Lack of relevant data

Question 5

Talia has been hired by SBS Inc. to implement a new data analysis program to search for warning signs of potential fraud within the company. Which of the following steps should Talia conduct first to MOST EFFECTIVELY use data analysis techniques for such an initiative?

Options:

A.

Build a profile of potential frauds.

B.

Monitor the data.

C.

Cleanse and normalize the data.

D.

Identify the relevant data

Question 6

Assuming that a jurisdiction has prohibited pretexting with financial institutes, which of the following actions would constitute illegal pretexting?

Options:

A.

Withdrawing another person's funds using a stolen bank account number and PIN

B.

Digging through a person's trash to obtain their bank account information

C.

Making purchases with a credit card account under a fictitious identity

D.

Falsely claiming to be the spouse of an account holder to access bank records

Question 7

Elizabeth, a Certified Fraud Examiner (CFE), is conducting an admission-seeking interview with Shannon, a fraud suspect. Shannon is seated approximately five feet away from Elizabeth in an empty room The room has several pictures and posters on the wall, and the door is closed According to admission-seeking interview best practices, what change should Elizabeth make to the interview environment to increase the chances of the interview's success?

Options:

A.

Move the interview to a room without pictures or wall hangings to prevent distractions

B.

Open the door so that Shannon feels free to leave at any time

C.

Place a table between her and Shannon to create a psychological barrier

D.

All of the above

Question 8

Which of the following terms refers to a process of resolving allegations of fraud from inception to disposition?

Options:

A.

Forensic methodology

B.

Fraud theory

C.

Fraud assessment

D.

Fraud examination

Question 9

Sarah is conducting an admission-seeking interview of a suspect. Throughout the interview, the suspect makes little eye contact with Sarah. Based on this information atone, can Sarah conclude that the suspect is being deceptive?

Options:

A.

Yes, because it is safe to assume that suspects who avoid eye contact are most likely being deceptive.

B.

Yes, because avoiding eye contact is a sign of deceptive.

C.

No, because this is not enough information to conclude that the suspect is being deceptive

D.

No, because avoiding eye contact is not directly linked to deception.

Question 10

Which of the following is NOT a best practice for obtaining a signed statement?

Options:

A.

Add subsequent facts to the statement as an addendum.

B.

Have the suspect write out the entire statement in their own handwriting

C.

Prepare separate statements for unrelated offenses

D.

Have two individuals witness the signing of the document when possible.

Question 11

Which of the following is FALSE regarding link analysis?

Options:

A.

Link analysis is a poor tool to use for investigating a money laundering scheme

B.

Link analysis can be used to map connections between entities that share an address

C.

Link analysis helps identify indirect relationships with several degrees of separation

D.

Link analysis is an effective tool for demonstrating complex networks

Question 12

Martin is a fraud examiner. He contacts Dianne for the purpose of conducting a routine, information-gathering interview. Dianne says that she wants her coworker. Sheila, whom Martin also plans to interview, to be present during the interview. Martin should:

Options:

A.

Interview Dianne and Sheila separately

B.

Allow Sheila to be present but only if she does not speak

C.

Interview Dianne and Sheila together by himself

D.

Interview Dianne and Sheila together, but bring in a second interviewer

Question 13

Which of the following BEST describes the data analytics approach known as predictive analytics?

Options:

A.

The configuration of a business program to emulate and Integrate the actions of a human to execute certain business processes, thus increasing efficiency and automating repetitive manual tasks

B.

The use of historical data, along with analyses, statistics, and machine learning components, to build a mathematical model that captures important trends and creates a quantitative forecast

C.

The employment of computer systems to perform human-like tasks such as visual perception and decision-making

D.

The use of layered artificial neural networks to accommodate more data and more sophisticated algorithms to identify complex patterns

Question 14

Which of the following is an important factor that fraud examiners should consider when determining whether evidence should be disposed of after a fraud examination has concluded?

Options:

A.

Whether the evidence is digital or tangible

B.

Whether further litigation related to the case is likely to occur in the future

C.

Whether a summary of the evidence was included in a fraud examination report

D.

Whether the evidence is direct or circumstantial

Question 15

Assuming that a jurisdiction has prohibited pretexting against financial institutions, which of the following actions would constitute illegal pretexting?

Options:

A.

Intentionally making false statements on loan applications

B.

Stealing a person's mail lo obtain the person's bank account number

C.

Impersonating an account holder to access their bank records

D.

Setting up a bank account in an assumed name

Question 16

Which of the following is a recommended strategy when conducting admission-seeking interviews?

Options:

A.

Increase sympathy while downplaying implications of wrongdoing.

B.

Ensure that accusations are made in the presence of a third party to avoid potential liability

C.

Emphasize a lack of morality in the subject's actions to induce them into confessing.

D.

Use time constraints as a means to pressure the subject into making a confession.

Question 17

Which of the following sources of information is usually considered to be the MOST IMPORTANT in tracing a subject's assets?

Options:

A.

Credit card statements

B.

PaystuDs

C.

Surveillance footage

D.

Financial institution records

Question 18

Which of the following is TRUE of a follow-up/recommendations section in a written fraud examination report?

Options:

A.

A follow-up/recommendations section is not a required part of every written fraud examination report

B.

A follow-up/recommendations section calculates the amount of loss caused by any misconduct identified during the investigation

C.

A follow-up/recommendations section must include a list of organizational failings that contnbuted to the fraud

D.

All of the above

Question 19

Gilbert is preparing to conduct a covert investigation. Before acting, he wants to wnte a memorandum documenting his plan. Which of the following pieces of information should he include in this memorandum?

Options:

A.

The information expected to be gained from the operation

B.

The identities of any confidential sources to be used in the operation

C.

His first impression regarding the subject's culpability

D.

All of the above

Question 20

Due to risks of illicit transactions, most jurisdictions require financial institutions to obtain information about which of the following from an institution with which they have a foreign correspondent relationship?

Options:

A.

The institution's ownership details

B.

The institution's investment portfolio

C.

The institution's client loan profiles

D.

The institution's tax statements

Question 21

If the following statements were included in a fraud examination report of a qualified expert, which of them would be IMPROPER?

Options:

A.

"When asked a second time about the amount of funds missing, the suspect contradicted their previous testimony."

B.

"The evidence shows that between S1 million and S1.5 million in assets were transferred to an offshore account."

C.

"The organization must address the inadequate separation of accounting duties to prevent such an event from happening again."

D.

"In light of all the evidence, the suspect is most likely guilty of fraud against the organization."

Question 22

Steve, a Certified Fraud Examiner (CFE). was interviewing Michelle, a fraud suspect. Dunng the first part of the interview. Michelle was attentive. However, when he asked her more direct questions about the fraud, she suddenly seemed unconcerned, alternately chewing on her pen cap and picking at a loose piece of fabric on the arm of her chair. From this conduct. Steve is likely to conclude that Michelle

Options:

A.

Is feeling bored by the interview process

B.

Is being deceptive

C.

Does not know the answers to Steve's questions

D.

Is telling the truth

Question 23

Which of the following statements about fraud response plans is FALSE?

Options:

A.

A fraud response plan outlines the actions an organization will take when suspicions of fraud have arisen.

B.

A fraud response plan should create an environment to minimize risk and maximize the potential for success

C.

A fraud response plan must be simple to understand and administer

D.

A fraud response plan should specify how every fraud examination should be conducted regardless of the type of fraud

Question 24

Vishal, a Certified Fraud Examiner (CFE). has just initiated an interview with Steve, a fraud suspect. After a short introduction. Vishal jokes about the fact that he and Steve are wearing the same tie and then proceeds to ask Steve about the previous night's major sporting event Vishal is attempting to

Options:

A.

Establish the interview theme

B.

Condition the witness.

C.

Establish rapport

D.

Exhibit passive listening.

Question 25

Which of the following is considered a best practice for preserving the confidentiality of a fraud investigation?

Options:

A.

Suspend all employees involved in the investigation pending the investigation's outcome.

B.

Ensure that the investigation is conducted at the direction of, or under the supervision of. a government official

C.

Avoid using email or other electronic means to transmit confidential case information

D.

Implement a blanket policy prohibiting all employees from discussing anything related to employee investigations

Question 26

Which of the following is NOT true about observing the reactions of interview subjects?

Options:

A.

The interpretation of an interview subject's reactions requires specific skills on the part of the interviewer.

B.

The observation of a subjects body language is often just as important as the observation of the words used by the subject.

C.

Emotive words should be used early in the interview to observe the respondents emotional reaction.

D.

To effectively observe reactions, an interviewer should move from less sensitive to more sensitive questions as the interview progresses.

Question 27

Shane, a Certified Fraud Examiner (CFE). is investigating Larsen. who is active on various social networking sites. Shane wants to search and extract information from Larson's social media postings so that it can be used in court as evidence Which of the following is the MOST ACCURATE statement regarding what Shane should do when conducting a social media investigation of Larsen?

Options:

A.

Shane should conduct a forensic shutdown of his computer to preserve the metadata in the social networking sites.

B.

Shane should preserve the information from the social networking sites so that it can be established as authentic if used in court.

C.

Shane should email himself the links of the postings so that he can retrieve them later.

D.

Shane should preserve the information by saving the links of the postings in his 'bookmarks"

Question 28

A fraud examiner contacts a witness regarding an interview. If the respondent says. ‘I’m too busy." how should the fraud examiner react?

Options:

A.

Explain that the respondent will be subject to discipline if they do not participate

B.

Stress that the interview will be short.

C.

Caution the witness that avoidance of the interview will be considered suspicious.

D.

Inquire about a more convenient time

Question 29

Christopher, a fraud examiner, is conducting an admission-seeking interview with Jennifer, an employee suspected of stealing cash. Which of the following is the LEAST EFFECTIVE phrasing for Christopher to use when posing an admission-seeking question to Jennifer?

Options:

A.

"Did you steal the money?"

B.

'What did you do with the money?"

C.

"Why did you take the money?"

D.

"How much of the money do you have left?"

Question 30

Which of the following questions would be most effective when starting the calibration process during an interview?

Options:

A.

"Did you commit any misconduct against the company?"

B.

"Do you know what the punishment is for violations like this'5"

C.

"Do you know who might have defrauded the company?"

D.

"How many jobs have you had before this one?’

Question 31

Jackson, a digital forensic examiner for a government agency, is conducting a criminal investigation into the alleged embezzlement of funds from the government's Welfare Department (WD). Ginny. a WD employee, is the prime suspect. Jackson obtains a court order authorizing him to seize Ginny's personal computer for forensic examination. Which of the following is the MOST ACCURATE statement?

Options:

A.

If Ginny's computer is running. Jackson should perform a graceful shutdown by turning it off using the normal shutdown process

B.

If Ginny’s computer is off and Jackson needs evidence that exists only in the form of volatile data, he should turn the computer on and retrieve data directly via the computer's normal interface.

C.

If Ginny's computer is off. Jackson should not turn it on unless he plans to use an encryption device that can guarantee that the system's hard drive will not be accessed during startup.

D.

If Ginny's computer is running. Jackson may retrieve data from the computer directly via its normal interface if the evidence that he needs exists only in the form of volatile data

Question 32

Which of the following is a best practice for obtaining a signed statement?

Options:

A.

Make sure that everything is included in the signed statement and that no addendum are made

B.

Have the suspect write out the entire statement in their own handwriting

C.

Have two individuals witness the signing of the document when possible.

D.

Include all of the subject's offenses, whether related or not, in a angle document.

Question 33

Which of the following should be done to prepare an organization for a formal fraud investigation?

Options:

A.

Inform the subject that they are under investigation.

B.

Issue an organization-wide communication that notifies all employees about the investigation

C.

Notify all managers about the investigation, explaining why it is happening and who is involved.

D.

Prepare the managers of the employees who will be involved in the investigation

Question 34

Mila. a Certified Fraud Examiner (CFE). needs to obtain court records and wants to be as sure as possible that the records are accurate In most countries, the most reliable way lo obtain these documents is to obtain them directly from the court authorities.

Options:

A.

True

B.

False

Question 35

When reporting the results of a fraud examination, it is BEST to include copies (not originals) of important documents in the formal report.

Options:

A.

True

B.

False

Question 36

Allison, a Certified Fraud Examiner (CFE). is investigating a potential procurement fraud scheme. While interviewing a subject, she asks. "Why did you choose to do business with that vendor?" This can BEST be described as a(n):

Options:

A.

Open question

B.

Complex question

C.

Leading question

D.

Closed question

Question 37

Which of the following types of files is the most difficult to recover during a digital forensic examination?

Options:

A.

Overwritten files

B.

Deleted until

C.

Deleted link (shortcut) files

D.

Hidden files

Question 38

Jackson, a Certified Fraud Examiner (CFE). is analyzing Elm Company's accounts payable data to identify anomalies that might indicate fraud. Which of the following is the MOST EFFECTIVE data analysis function that Jackson could use to look for potential fraud in accounts payable?

Options:

A.

Compare book and tax depreciation and indicate variances

B.

Identify paychecks with amounts over a certain limit

C.

Summarize large invoices by amount and vendor

D.

All of the above

Question 39

Which of the following statements is MOST ACCURATE regarding how a fraud examiner should prepare for an interview with a subject from a different jurisdiction?

Options:

A.

Failing to observe cultural norms is not a concern if the interviewer is from a different country than the interviewee.

B.

Consulting with legal counsel is only necessary when an investigation spans multiple

C.

A fraud examiner should find out whether the interviewee can insist upon the presence of a legal representative

D.

A fraud examiner does not need to research cultural considerations such as appropriate greetings and eye contact.

Question 40

Which of the following statements is MOST ACCURATE regarding covert operations?

Options:

A.

Fraud examiners should conduct coven operations only after attempting conventional methods of evidence-gathering

B.

Mistakes in covert operations generally do not cause damage to their associated investigations

C.

Covert operations rarely prove beneficial to investigations even when planned properly.

D.

Most jurisdictions provide protections for investigators conducting covert operations that shield them from reputational, financial, and legal consequences.

Question 41

Anita is interviewing her client's employee, whom she suspects committed check fraud. During the interview. Anita asks if she can obtain account records from the suspect's bank If the suspect only gives Anita oral consent, the suspect's bank is required to allow Anita access to the suspect's account records.

Options:

A.

True

B.

False

Question 42

Leslie, a fraud examiner for ACME Corporation, suspects that a salesperson for another company has defrauded ACME. Leslie wants to obtain a copy of the suspect individual's credit report and personal data from a third-party information broker If Leslie works in a jurisdiction that regulates the distribution of personal credit information, she generally can obtain the information if she has the consent of the individual.

Options:

A.

True

B.

False

Question 43

When documenting interviews, it is best practice for the interviewer to.

Options:

A.

Covertly record all interviews with potential suspects.

B.

Note impressions regarding the subject's guilt or innocence.

C.

Err on the side of taking too few notes rather than too many.

D.

Write down verbatim all the information that the subject provides

Question 44

Which of the following can be obtained from a wire transfer record?

Options:

A.

The amount of the transfer in question

B.

The type of money order used to make the transfer

C.

The location of the customs port of entry for the transfer

D.

The recipient's government identification number

Question 45

Which of the following situations would MOST LIKELY require access to nonpublic records to develop evidence?

Options:

A.

Finding out where a person lives

B.

Reviewing an individual's personal mobile phone records

C.

Obtaining a company's business filings

D.

Determining who owns a piece of real estate

Question 46

Which of the following is NOT true with regard to tracing the disposition of loan proceeds?

Options:

A.

Tracing loan proceeds can reveal previous civil offenses committed by the subject

B.

Tracing loan proceeds can determine if the proceeds were deposited into hidden accounts

C.

Tracing loan proceeds can uncover previously unknown witnesses

D.

Tracing loan proceeds can determine if hidden accounts were used for loan payments.

Question 47

Which of the following is the MOST IMPORTANT question for a fraud examiner to ask before commencing a legal action to recover assets?

Options:

A.

"Is there a relevant statute of limitations9"

B.

"Does the suspect already have a criminal record?"

C.

"Is the suspect guilty of the fraudulent act?''

D.

"Are nonlegal recovery methods or remedies available?''

Question 48

Naveed, a fraud suspect, has decided to make an admission to Omar, a Certified Fraud Examiner (CFE). Which of the following items of information should Omar obtain from Naveed during the verbal admission?

Options:

A.

A general estimate of the amount of money involved in the fraud

B.

Facts about the fraud known to co-conspirators and witnesses

C.

A statement from Naveed indicating that his conduct was an accident

D.

Controls that would have prevented Naveed from committing the fraud

Question 49

Lisa, a fraud examiner at a private company, receives an anonymous call from a potential whistleblower. The whistleblower is hesitant to reveal their identity but will do so if it can be Kept fully confidential. Which of the following statements is MOST ACCURATE?

Options:

A.

Lisa may offer the whistleblower full confidentiality because they are not a suspect

B.

Lisa should explain that she will try her best to keep the whistleblower"s identity confidential.

C.

Lisa should state that she will not be able to keep the whistleblower's identity confidential because all information must be disclosed to management

D.

Lisa may promise the whistleblower full confidentiality, even if she knows her statement is untrue, because the lie is ultimately beneficial to her employer.

Question 50

Due to risks of illicit transactions, most jurisdictions require financial institutions to obtain information about which of the following from an institution with which they have a foreign correspondent relationship?

Options:

A.

The institution's branch addresses

B.

The institution's licenses or certifications

C.

The institution's tax statements

D.

The institution's client loan profiles

Question 51

Scarlett, a Certified Fraud Examiner (CFE). is assigned to the internal audit department of the ABC Company. She is getting ready to conduct an interview with another company employee who might be involved in a fraud. Which of the following is the MOST APPROPRIATE introduction for Scarlett to use with the employee?

Options:

A.

"Hello, my name is Scarlett, and I'm with the ABC Company."

B.

"Hello, my name is Scarlett. I'm an auditor with the ABC Company."

C.

"Hello, my name is Scarlett. I'm a Certified Fraud Examiner and an auditor with the ABC Company."

D.

"Hello, my name is Scarlett. I'm a Certified Fraud Examiner with the ABC Company."

Question 52

A fraud examiner is based in Mexico, a non-European Union (EU) country, and is collecting personal information from their company's human resources (HR) files about an employee based in Germany, an EU country. Based on these facts, the fraud examiner would need to comply with the EU"s General Data Protection Regulation (GDPR) when conducting their internal investigation.

Options:

A.

True

B.

False

Question 53

When planning for the interview phase of an investigation, which of the following steps should NOT be taken by the fraud examiner?

Options:

A.

Consider what the interview is intended to accomplish and state an objective.

B.

Review the case file to ensure that important information has not been overlooked

C.

Prepare a detailed list of questions to ask the subject during the interview.

D.

Ensure that the interview is held in a venue where the subject will feel Uncomfortable

Question 54

Which of the following is NOT a step a fraud examiner must take before seizing evidence in a digital forensic investigation?

Options:

A.

Obtain and become familiar with any legal orders that apply to the investigation

B.

Assemble an investigation team comprised only of outside digital forensic experts

C.

Ensure that only trained professionals employ any software used in a forensic capacity

D.

Determine whether there are privacy issues related to the item(s) to be searched.