CFE-Investigation Certified Fraud Examiner (CFE) - Investigation Questions and Answers
Rachel, a fraud suspect, has decided to confess to Linda, a Certified Fraud Examiner (CFE). In obtaining a verbal confession from Rachel. Linda should obtain all of the following items of information EXCEPT:
Which of the following is the MOST ACCURATE statement regarding a fraud examiner's ability to trace cryptocurrency transactions?
Mila. a Certified Fraud Examiner (CFE). needs to obtain court records and wants to be as sure as possible that the records are accurate In most countries, the most reliable way lo obtain these documents is to obtain them directly from the court authorities.
If you are seizing a computer for forensic analysis, why is it generally necessary to seize any copiers connected to it?
Louis, a Certified Fraud Examiner (CFE). is investigating a potential internal fraud case originating from a whistteblower tip about embezzlement. He discovers that the organization purportedly affected by the embezzlement recorded the tip in a memorandum. Which type of evidence would the memorandum be considered?
Smith, a Certified Fraud Examiner (CFE) for the Ajax Co.. observes Jones, an accounts payable clerk, driving an expensive sports car to work. Smith also has knowledge that Jones recently had extensive remodeling done on her residence. Smith has sufficient predication to:
Which of the following is the MOST APPROPRIATE way to document information obtained from social media sites?
Fraud examination reports should be written with which of the following audiences in mind?
Which of the following is NOT an advantage to using link analysis in a fraud investigation?
Why is it necessary to image a seized computer's hard drive for forensic analysis?
Which of the following is the MOST ACCURATE statement concerning the volatility of digital evidence?
If an important witness becomes hostile and argumentative during an interview, the interviewer should generally.
Beta, a Certified Fraud Examiner (CFE). is conducting an admission-seeking interview of Delta, a fraud suspect. In establishing a rationalization. Beta says to Delta. "I know you didn't do this for yourself: it was for your family." This technique seeks to establish rationalization by:
June, a fraud examiner, is preparing to interview a subject who is from a different jurisdiction. Before conducting the interview, June should:
Which of the following is NOT a step a fraud examiner must take before seizing evidence in a digital forensic investigation?
Which of the following is the MOST ACCURATE statement about how fraud examiners shook! approach fraud examinations?
Which of the following statements about the limitations of using online databases for public record searches is MOST ACCURATE?
Naveed, a fraud suspect, has decided to confess to Omar, a Certified Fraud Examiner (CFE). In obtaining a verbal confession from Naveed. Omar should obtain all of the following items of information EXCEPT:
Quincy, a Certified Fraud Examiner (CFE), is investigating a payroll fraud scheme. While interviewing a subject in the case, Quincy asks, “What year did you start working in the accounting department?” This can MOST ACCURATELY be described as a(n) ______ question.
Which of the following would be most useful in determining when a specific document file was created?
Baker, a Certified Fraud Examiner (CFE). contacts Dierdre for the purpose of conducting a routine, information-gathering interview Dierdre expresses a desire that her coworker. Matthew, whom Baker also plans to interview, be interviewed at the same time Baker should:
Anita is interviewing her client's employee, whom she suspects committed check fraud. During the interview. Anita asks if she can obtain account records from the suspect's bank If the suspect only gives Anita oral consent, the suspect's bank is required to allow Anita access to the suspect's account records.
Which of the following is a unique challenge of cloud forensics that is not encountered in traditional forensic practices?
Assuming that a jurisdiction has prohibited pretexting with financial institutes, which of the following actions would constitute illegal pretexting?
Tyson, a fraud examiner, is planning an interview with Brianna. the girlfriend of the central suspect in Tyson's investigation. Previous interviews with others have revealed that Brianna tends to be very protective of her boyfriend How should Tyson approach the interview with Brianna?
Barnes, a Certified Fraud Examiner (CFE). is using data analysis to identify anomalies that might indicate fraud in XYZ Company's accounts payable transactions. Which of the following is the MOST EFFECTIVE data analysis function that Barnes could use to look for potential fraud in accounts payable?
Jana. the controller of XYZ Company, notices that the company's hotel expenses increased substantially from the prior year She wants to check to see if this increase is reasonable by comparing hotel expenses from both years to the number of days XYZ"s employees traveled. Which of the following data analysis functions would be the MOST USEFUL in helping Jana analyze these two variables?
Which of the following statements is MOST ACCURATE regarding how a fraud examiner should prepare for an interview with a subject from a different jurisdiction?
Scarlett, a Certified Fraud Examiner (CFE). is assigned to the internal audit department of the ABC Company. She is getting ready to conduct an interview with another company employee who might be involved in a fraud. Which of the following is the MOST APPROPRIATE introduction for Scarlett to use with the employee?
Beta, a Certified Fraud Examiner (CFE). is conducting an admission-seeking interview of Gamma, a fraud suspect. After Beta gave Gamma an appropriate rationalization for his conduct, Gamma continued his denials, giving various alibis. These alibis can usually be diffused by all of the following techniques EXCEPT:
Which of the following would be MOST USEFUL m determining who created a specrfic document file?
Leslie, a fraud examiner for ACME Corporation, suspects that a salesperson for another company has defrauded ACME. Leslie wants to obtain a copy of the suspect individual's credit report and personal data from a third-party information broker If Leslie works in a jurisdiction that regulates the distribution of personal credit information, she generally can obtain the information if she has the consent of the individual.
After completing all necessary investigative steps. Erica, a Certified Fraud Examiner (CFE), is reasonably sure that Justine, her primary suspect, committed the fraud in question. Before scheduling an admission-seeking interview with Justine, what else should Erica be reasonably sure of?
When planning for the interview phase of an investigation, which of the following steps should NOT be taken by the fraud examiner?
Which of the following is a measure that can help avoid alerting suspected perpetrators who are under investigation?
Which of the following is usually considered the most useful source of financial information available to fraud examiners in tracing a subject's assets?
Which of the following situations would probably NOT require access to nonpublic records to develop evidence?
Jason is an investigator who is conducting an interview with Dina. a fraud suspect. After introducing himself. Jason attempts to be amiable by asking about Dina's favorite sports team and complimenting her eyeglass frames. Jason is attempting to:
Martin, a fraud examiner, is conducting an interview of Stephanie, a fraud suspect. Although Stephanie heard all of the questions during the introductory part of the interview, she began asking Martin to repeat almost every question when they became more focused If Stephanie is being deceptive, which of the choices below is MOST LIKELY the cause of Stephanie's behavior?
When a fraud examiner is conducting an examination and is in the process of collecting documents, the fraud examiner should:
Sarah is conducting an admission-seeking interview of a suspect. Throughout the interview, the suspect makes little eye contact with Sarah. Based on this information atone, can Sarah conclude that the suspect is being deceptive?
Shannon, a Certified Fraud Examiner (CFE), is conducting a fraud examination for Sand Corp. Shannon is going to perform a textual analysis on unstructured data, such as emails and instant messages. Why would Shannon perform such an analysis?
If your suspect is spending suspected illicit funds on consumables (e.g.. travel and entertainment) and you need to prove their illicit income circumstantially, which of the following methods of tracing assets would yield the BEST result?
Which of the following sets of numbers could a fraud examiner MOST LIKELY benefit from running a Benford’s Law analysis on?
Susan, a Certified Fraud Examiner (CFE). is conducting an ad mission-seeking interview of Beth, a fraud suspect. After Susan gave Beth a suitable rationalization for her conduct. Beth continued her denials, giving various alibis. Which of the following would be the LEAST EFFECTIVE technique for Susan to use in this situation?
Which of the following is NOT true about observing the reactions of interview subjects?