Big Halloween Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Vce CFE-Investigation Questions Latest

Certified Fraud Examiner (CFE) - Investigation Questions and Answers

Question 5

Which of the following is NOT a common use of public sources of information?

Options:

A.

Searching an individual's income tax filings

B.

Obtaining background information on individuals

C.

Locating people and their assets

D.

Corroborating or refuting witness statements

Question 6

Assuming that a jurisdiction has prohibited pretexting with financial institutes, which of the following actions would constitute illegal pretexting?

Options:

A.

Withdrawing another person's funds using a stolen bank account number and PIN

B.

Digging through a person's trash to obtain their bank account information

C.

Making purchases with a credit card account under a fictitious identity

D.

Falsely claiming to be the spouse of an account holder to access bank records

Question 7

Which of the following is the MOST ACCURATE statement regarding the analysis phase in digital forensic investigations?

Options:

A.

The analysis phase of digital forensic investigations should not commence unless it is verified that the suspect devices do not contain relevant data.

B.

During the analysis phase, it is best to use a combination of the various forensic tools that can assist h identifying, extracting, and collecting digital evidence

C.

When analyzing data for evidence, fraud examiners should look for exculpatory evidence but not exculpatory evidence

D.

The primary concern when analyzing digital evidence is to protect the collected information from seizure

Question 8

Which of the following would be most useful in determining when a specific document file was created?

Options:

A.

The document's metadata

B.

Internet activity data

C.

The system tog

D.

Operating system partition