New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

CFE-Investigation Reviews Questions

Certified Fraud Examiner (CFE) - Investigation Questions and Answers

Question 17

Which of the following statements about the process of obtaining a verbal confession is TRUE?

Options:

A.

The only acceptable approaches to obtaining a verbal confession are chronologically or by transaction

B.

The transition from the accusation to the confession should occur when the accused supplies the first detailed information about the offense.

C.

If the subject lies about an aspect of the offense in the process of confessing, it is best to correct the records immediately before proceeding

D.

Fraudsters tend to overestimate the amount of funds involved in the offense to relieve themselves of the guilt of their dishonest actions.

Question 18

Al needs to know the location of the principal office and the initial shareholders of a company he is investigating. Which of the following would be the BEST source of this reformation?

Options:

A.

The organizational filings with the government of the jurisdiction in which the company is incorporated

B.

The contractual documents regarding real properly owned by the corporation

C.

The utility records in the municipality where the corporation has its principal office

D.

The shareholder data form filed with the World Bank

Question 19

Caroline, a fraud examiner, is conducting an admission-seeking interview with John, an employee suspected of stealing cash. Which of the following is the MOST effective phrasing for Caroline to use when posing an admission-seeking question to John?

Options:

A.

"Why did you take the money?"

B.

"What do you know about the stolen money?"

C.

"Do you know who took the money''"

D.

"Did you steal the money?"

Question 20

Which of the following types of files is the most difficult to recover during a digital forensic examination?

Options:

A.

Overwritten files

B.

Deleted until

C.

Deleted link (shortcut) files

D.

Hidden files