Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

CFE-Investigation Certified Fraud Examiner (CFE) - Investigation Questions and Answers

Questions 4

Rachel, a fraud suspect, has decided to confess to Linda, a Certified Fraud Examiner (CFE). In obtaining a verbal confession from Rachel. Linda should obtain all of the following items of information EXCEPT:

Options:

A.

The approximate beginning and end dates of the fraud

B.

A statement from Rachel that her conduct was an accident

C.

A general estimate of the amount of money involved

D.

Rachel's motive for the offense

Buy Now
Questions 5

Which of the following is the MOST ACCURATE statement regarding a fraud examiner's ability to trace cryptocurrency transactions?

Options:

A.

Each Blockchain transaction contains a user's cryptographic address, which can help identify patterns that might link the user to criminal activity.

B.

Most jurisdictions do not require digital wallet providers to record any personal information about cryptocurrency users

C.

Cryptocurrency ownership cannot be determined through an analysis of details on a subject's bank statements.

D.

Most cryptocurrencies rely on private block chains, which allow users' transactions to be completely anonymous and therefore difficult to trace.

Buy Now
Questions 6

Mila. a Certified Fraud Examiner (CFE). needs to obtain court records and wants to be as sure as possible that the records are accurate In most countries, the most reliable way lo obtain these documents is to obtain them directly from the court authorities.

Options:

A.

True

B.

False

Buy Now
Questions 7

If you are seizing a computer for forensic analysis, why is it generally necessary to seize any copiers connected to it?

Options:

A.

Many copiers connect via parallel cables, which store and transmit copy job data.

B.

Most copiers store, process, and transmit data m a cloud environment

C.

Many copiers have internal hard drives that might contain information relevant to a fraud examination

D.

Most copiers today are nonimpact copiers, meaning that they store copied images indefinitely.

Buy Now
Questions 8

Louis, a Certified Fraud Examiner (CFE). is investigating a potential internal fraud case originating from a whistteblower tip about embezzlement. He discovers that the organization purportedly affected by the embezzlement recorded the tip in a memorandum. Which type of evidence would the memorandum be considered?

Options:

A.

Testimonial evidence

B.

Incriminating evidence

C.

Documentary evidence

D.

Verbal evidence

Buy Now
Questions 9

Smith, a Certified Fraud Examiner (CFE) for the Ajax Co.. observes Jones, an accounts payable clerk, driving an expensive sports car to work. Smith also has knowledge that Jones recently had extensive remodeling done on her residence. Smith has sufficient predication to:

Options:

A.

Conduct discreet inquiries into Jones's responsibilities as an accounts payable clerk

B.

Notify management of the possibility that Jones has committed fraudulent acts.

C.

Search Jones's mobile phone for evidence of misconduct

D.

Accuse Jones directly of having committed fraud.

Buy Now
Questions 10

Which of the following is the MOST APPROPRIATE way to document information obtained from social media sites?

Options:

A.

Save links of the social media postings and pages in a web browser.

B.

Request a copy of the information from the social media platforms.

C.

Conduct a forensic shutdown of a computer to preserve the metadata from the social media sites and profiles visited.

D.

Download and preserve the information from the social media sites so that it can be established as authentic if used in court.

Buy Now
Questions 11

Fraud examination reports should be written with which of the following audiences in mind?

Options:

A.

The media

B.

Opposing legal counsel

C.

Investors and owners

D.

All of the above

Buy Now
Questions 12

Which of the following is NOT an advantage to using link analysis in a fraud investigation?

Options:

A.

Link analysis visually displays financial ratio analysis

B.

Link analysis is an affective tool to demonstrate complex networks

C.

Link analysis helps identify indirect relationships with several degrees of separation.

D.

Link analysis allows the investigator to discover patterns in data.

Buy Now
Questions 13

Why is it necessary to image a seized computer's hard drive for forensic analysis?

Options:

A.

To prohibit access to the suspect computer's hard drive by individuals not professionally trained in forensic analysis

B.

To allow for the analysis of data from a suspect computer without altering or damaging the original data in any way

C.

To create pictures of the suspect computer system and its wires and cables

D.

To enable the retrieval of data from the suspect computer directly via its operating system

Buy Now
Questions 14

Which of the following is the MOST ACCURATE statement concerning the volatility of digital evidence?

Options:

A.

Digital evidence is more volatile than tangible evidence because digital evidence is subject to claims of spoliation, whereas tangible evidence is not.

B.

Digital evidence is more volatile than tangible evidence because the rules of admissibility for digital evidence are stricter than such rules for tangible evidence.

C.

If the integrity of digital evidence is violated, it can often be restored through a digital cleansing process

D.

The failure to preserve the integrity of digital evidence could result in evidence being deemed inadmissible in a legal proceeding

Buy Now
Questions 15

If an important witness becomes hostile and argumentative during an interview, the interviewer should generally.

Options:

A.

Avoid reacting to the witness.

B.

Refute the witness's arguments

C.

Try to reason with the witness

D.

Terminate the interview.

Buy Now
Questions 16

Beta, a Certified Fraud Examiner (CFE). is conducting an admission-seeking interview of Delta, a fraud suspect. In establishing a rationalization. Beta says to Delta. "I know you didn't do this for yourself: it was for your family." This technique seeks to establish rationalization by:

Options:

A.

Reducing Delta's stress about possibly being fired

B.

Claiming Delta's action was for altruistic reasons

C.

Reducing Delta's perception of the legal seriousness of the matter

D.

Establishing that Delta's family was being treated unfairly

Buy Now
Questions 17

June, a fraud examiner, is preparing to interview a subject who is from a different jurisdiction. Before conducting the interview, June should:

Options:

A.

Familiarize the subject with the cultural practices common in June’s jurisdiction so there are no surprises.

B.

Research the cultural norms common in the subject’s jurisdiction so they can be avoided to make the subject less comfortable.

C.

Consult with legal counsel in advance only if the investigation is likely to involve a third jurisdiction.

D.

Verify whether the subject’s jurisdiction has any rules in place that would prevent June from compelling the subject to cooperate with her.

Buy Now
Questions 18

Which of the following is NOT a step a fraud examiner must take before seizing evidence in a digital forensic investigation?

Options:

A.

Obtain and become familiar with any legal orders that apply to the investigation

B.

Assemble an investigation team comprised only of outside digital forensic experts

C.

Ensure that only trained professionals employ any software used in a forensic capacity

D.

Determine whether there are privacy issues related to the item(s) to be searched.

Buy Now
Questions 19

Which of the following is TRUE of a well-written fraud examination report?

Options:

A.

The details of witness interviews should be reported in a separate memorandum.

B.

The report should discuss only the evidence that substantiates the fraud allegation

C.

All information provided by witnesses, regardless of relevance, should be included in the report.

D.

Technical terms should be included whenever possible to convey professionalism.

Buy Now
Questions 20

Why do fraud examiners perform analysis on unstructured, or textual, data?

Options:

A.

To determine whether the footnotes to the financial statements are fairly presented

B.

To find an admission of fraud m an email or other communication that can be presented in court

C.

To categorize data to reveal patterns, sentiments, and relationships indicative of fraud

D.

To figure out whether someone is lying or telling the truth based on context duet

Buy Now
Questions 21

Which of the following is the MOST ACCURATE statement about how fraud examiners shook! approach fraud examinations?

Options:

A.

Fraud examinations should begin with general information that is known, starting at the periphery, and then move to the more specific details.

B.

When conducting fraud examinations, fraud examiners should adhere to the means-and-ends approach

C.

When conducting fraud examinations, fraud examiners should operate under the assumption that the subjects are guilty

D.

In most examinations, fraud examiners should interview those who are more involved in the matters at issue before interviewing those who are less involved.

Buy Now
Questions 22

Which of the following statements about the limitations of using online databases for public record searches is MOST ACCURATE?

Options:

A.

Public records featured in electronic formats include too much detail to be efficiently analyzed.

B.

Availability of public records through online databases varies widely across jurisdictions.

C.

The public records produced by online database searches rarely contain correct information.

D.

It is very difficult to find a legitimate online database for accessing public records.

Buy Now
Questions 23

Naveed, a fraud suspect, has decided to confess to Omar, a Certified Fraud Examiner (CFE). In obtaining a verbal confession from Naveed. Omar should obtain all of the following items of information EXCEPT:

Options:

A.

A general estimate of the amount of money involved

B.

The approximate number of instances

C.

The location of any residual assets

D.

A statement from Naveed that his conduct was an accident

Buy Now
Questions 24

Quincy, a Certified Fraud Examiner (CFE), is investigating a payroll fraud scheme. While interviewing a subject in the case, Quincy asks, “What year did you start working in the accounting department?” This can MOST ACCURATELY be described as a(n) ______ question.

Options:

A.

Complex

B.

Open

C.

Leading

D.

Closed

Buy Now
Questions 25

When documenting interviews, it is BEST practice for the interviewer to:

Options:

A.

Document notes for each interview separately, nduding those for electronic recordings.

B.

Write down verbatim all of (he information that the subject provides during the interview

C.

Err on the side of taking too many notes rather than too few.

D.

Note impressions regarding the subject's guilt or innocence.

Buy Now
Questions 26

Which of the following would be most useful in determining when a specific document file was created?

Options:

A.

The document's metadata

B.

Internet activity data

C.

The system tog

D.

Operating system partition

Buy Now
Questions 27

Baker, a Certified Fraud Examiner (CFE). contacts Dierdre for the purpose of conducting a routine, information-gathering interview Dierdre expresses a desire that her coworker. Matthew, whom Baker also plans to interview, be interviewed at the same time Baker should:

Options:

A.

Interview Dierdre and Matthew separately.

B.

Interview Dierdre and Matthew at the same time, but bring in a second interviewer

C.

Interview Dierdre and Matthew at the same time by himself

D.

Allow Matthew to be present as a silent observer.

Buy Now
Questions 28

Anita is interviewing her client's employee, whom she suspects committed check fraud. During the interview. Anita asks if she can obtain account records from the suspect's bank If the suspect only gives Anita oral consent, the suspect's bank is required to allow Anita access to the suspect's account records.

Options:

A.

True

B.

False

Buy Now
Questions 29

Which of the following is a unique challenge of cloud forensics that is not encountered in traditional forensic practices?

Options:

A.

Lack of corroborating evidence

B.

Lack of data control

C.

Lack of trust from cloud providers

D.

Lack of relevant data

Buy Now
Questions 30

Assuming that a jurisdiction has prohibited pretexting with financial institutes, which of the following actions would constitute illegal pretexting?

Options:

A.

Withdrawing another person's funds using a stolen bank account number and PIN

B.

Digging through a person's trash to obtain their bank account information

C.

Making purchases with a credit card account under a fictitious identity

D.

Falsely claiming to be the spouse of an account holder to access bank records

Buy Now
Questions 31

Tyson, a fraud examiner, is planning an interview with Brianna. the girlfriend of the central suspect in Tyson's investigation. Previous interviews with others have revealed that Brianna tends to be very protective of her boyfriend How should Tyson approach the interview with Brianna?

Options:

A.

Avoid interviewing Brianna if possible due to Brianna's potential volatility.

B.

Conduct the interview with as little notice as possible so Brianna will be unprepared

C.

Provide Brianna with advance notice prior to the interview to inhibit resentment.

D.

Ask Brianna when she would prefer to be interviewed in an effort to provoke cooperation.

Buy Now
Questions 32

Barnes, a Certified Fraud Examiner (CFE). is using data analysis to identify anomalies that might indicate fraud in XYZ Company's accounts payable transactions. Which of the following is the MOST EFFECTIVE data analysis function that Barnes could use to look for potential fraud in accounts payable?

Options:

A.

Compare book and tax depreciation and indicate variances

B.

Identify paycheck amounts over a certain limit

C.

Review recurring monthly expenses and compare to posted/paid invoices

D.

All of the above

Buy Now
Questions 33

Jana. the controller of XYZ Company, notices that the company's hotel expenses increased substantially from the prior year She wants to check to see if this increase is reasonable by comparing hotel expenses from both years to the number of days XYZ"s employees traveled. Which of the following data analysis functions would be the MOST USEFUL in helping Jana analyze these two variables?

Options:

A.

Correlation analysis

B.

Duplicate testing

C.

Verifying multiples of a number

D.

Ben ford’s Law analysis

Buy Now
Questions 34

Which of the following statements is MOST ACCURATE regarding how a fraud examiner should prepare for an interview with a subject from a different jurisdiction?

Options:

A.

Failing to observe cultural norms is not a concern if the interviewer is from a different country than the interviewee.

B.

Consulting with legal counsel is only necessary when an investigation spans multiple

C.

A fraud examiner should find out whether the interviewee can insist upon the presence of a legal representative

D.

A fraud examiner does not need to research cultural considerations such as appropriate greetings and eye contact.

Buy Now
Questions 35

Scarlett, a Certified Fraud Examiner (CFE). is assigned to the internal audit department of the ABC Company. She is getting ready to conduct an interview with another company employee who might be involved in a fraud. Which of the following is the MOST APPROPRIATE introduction for Scarlett to use with the employee?

Options:

A.

"Hello, my name is Scarlett, and I'm with the ABC Company."

B.

"Hello, my name is Scarlett. I'm an auditor with the ABC Company."

C.

"Hello, my name is Scarlett. I'm a Certified Fraud Examiner and an auditor with the ABC Company."

D.

"Hello, my name is Scarlett. I'm a Certified Fraud Examiner with the ABC Company."

Buy Now
Questions 36

Beta, a Certified Fraud Examiner (CFE). is conducting an admission-seeking interview of Gamma, a fraud suspect. After Beta gave Gamma an appropriate rationalization for his conduct, Gamma continued his denials, giving various alibis. These alibis can usually be diffused by all of the following techniques EXCEPT:

Options:

A.

Discussing the testimony of witnesses

B.

Displaying physical evidence

C.

Discussing Gamma's prior deceptions

D.

Downplaying the strength of the evidence

Buy Now
Questions 37

Which of the following would be MOST USEFUL m determining who created a specrfic document file?

Options:

A.

Operating system partition

B.

Internet activity data

C.

The system log

D.

The document's metadata

Buy Now
Questions 38

Leslie, a fraud examiner for ACME Corporation, suspects that a salesperson for another company has defrauded ACME. Leslie wants to obtain a copy of the suspect individual's credit report and personal data from a third-party information broker If Leslie works in a jurisdiction that regulates the distribution of personal credit information, she generally can obtain the information if she has the consent of the individual.

Options:

A.

True

B.

False

Buy Now
Questions 39

After completing all necessary investigative steps. Erica, a Certified Fraud Examiner (CFE), is reasonably sure that Justine, her primary suspect, committed the fraud in question. Before scheduling an admission-seeking interview with Justine, what else should Erica be reasonably sure of?

Options:

A.

That Justine will confess to the accusation when prompted

B.

That Justine's employer will take disciplinary action against Justine if she confesses

C.

That the interview's time, place, and content can De controlled

D.

That no other person was involved in the fraud n question

Buy Now
Questions 40

When planning for the interview phase of an investigation, which of the following steps should NOT be taken by the fraud examiner?

Options:

A.

Consider what the interview is intended to accomplish and state an objective.

B.

Review the case file to ensure that important information has not been overlooked

C.

Prepare a detailed list of questions to ask the subject during the interview.

D.

Ensure that the interview is held in a venue where the subject will feel Uncomfortable

Buy Now
Questions 41

Which of the following is a measure that can help avoid alerting suspected perpetrators who are under investigation?

Options:

A.

Terminate the suspected employee.

B.

Notify everyone in the affected department

C.

Delay taking any action.

D.

Inform only those who need to know.

Buy Now
Questions 42

Which of the following is usually considered the most useful source of financial information available to fraud examiners in tracing a subject's assets?

Options:

A.

Financial institution records

B.

Service bills

C.

Paystubs

D.

Credit card statements

Buy Now
Questions 43

Which of the following situations would probably NOT require access to nonpublic records to develop evidence?

Options:

A.

Obtaining personal health care records

B.

Accessing banking records to trace assets

C.

Reviewing a company's business filings

D.

Analyzing an individual's personal mobile phone records

Buy Now
Questions 44

Which of the following can be obtained from a wire transfer record?

Options:

A.

The name of the receiving institution's registered agent

B.

The recipient's government identification number

C.

The name of the sender or originator

D.

The sending institution's accreditation type

Buy Now
Questions 45

Jason is an investigator who is conducting an interview with Dina. a fraud suspect. After introducing himself. Jason attempts to be amiable by asking about Dina's favorite sports team and complimenting her eyeglass frames. Jason is attempting to:

Options:

A.

Establish the interview theme.

B.

Establish rapport.

C.

Calibrate the witness.

D.

Exhibit passive listening

Buy Now
Questions 46

Which of the following is a purpose of an admission-seeking interview?

Options:

A.

To establish that the confessor regrets committing the act

B.

To obtain a valid confession from a culpable individual

C.

To verify that the accused mistakenly committed the act

D.

To determine whether the subject's responses are credible

Buy Now
Questions 47

Martin, a fraud examiner, is conducting an interview of Stephanie, a fraud suspect. Although Stephanie heard all of the questions during the introductory part of the interview, she began asking Martin to repeat almost every question when they became more focused If Stephanie is being deceptive, which of the choices below is MOST LIKELY the cause of Stephanie's behavior?

Options:

A.

Stephanie is testing Martin to determine whether he is able to ask consistent questions

B.

Stephanie is trying to make sure she understands the question so that she will not make a misstatement.

C.

Stephanie is delaying the answer so that she has more time to think of what to say.

D.

Stephanie is having trouble recalling the events or details related to Martin's questions.

Buy Now
Questions 48

When a fraud examiner is conducting an examination and is in the process of collecting documents, the fraud examiner should:

Options:

A.

Dust all physical key documents for fingerprints

B.

Establish a document database early in the investigation

C.

Make copies of originals and leave the originals where they were found

D.

Organize all the documents obtained in chronological order

Buy Now
Questions 49

Sarah is conducting an admission-seeking interview of a suspect. Throughout the interview, the suspect makes little eye contact with Sarah. Based on this information atone, can Sarah conclude that the suspect is being deceptive?

Options:

A.

Yes, because it is safe to assume that suspects who avoid eye contact are most likely being deceptive.

B.

Yes, because avoiding eye contact is a sign of deceptive.

C.

No, because this is not enough information to conclude that the suspect is being deceptive

D.

No, because avoiding eye contact is not directly linked to deception.

Buy Now
Questions 50

Shannon, a Certified Fraud Examiner (CFE), is conducting a fraud examination for Sand Corp. Shannon is going to perform a textual analysis on unstructured data, such as emails and instant messages. Why would Shannon perform such an analysis?

Options:

A.

The analysis will determine whether someone is lying or telling the truth based on clues within the data.

B.

The analysis will uncover an admission of fraud in an email or other communication that can be presented in court.

C.

The analysis will produce a visual representation of the data collected to track the movement of money.

D.

The analysis will categorize data to reveal patterns, sentiments, and relationships that are indicative of fraud.

Buy Now
Questions 51

If your suspect is spending suspected illicit funds on consumables (e.g.. travel and entertainment) and you need to prove their illicit income circumstantially, which of the following methods of tracing assets would yield the BEST result?

Options:

A.

expenditures method

B.

The consumables method

C.

The income method

D.

The asset method

Buy Now
Questions 52

Which of the following sets of numbers could a fraud examiner MOST LIKELY benefit from running a Benford’s Law analysis on?

Options:

A.

Telephone numbers

B.

Vendor invoice amounts

C.

Employee identification numbers

D.

Bank account numbers

Buy Now
Questions 53

Susan, a Certified Fraud Examiner (CFE). is conducting an ad mission-seeking interview of Beth, a fraud suspect. After Susan gave Beth a suitable rationalization for her conduct. Beth continued her denials, giving various alibis. Which of the following would be the LEAST EFFECTIVE technique for Susan to use in this situation?

Options:

A.

Displaying evidence that specifically contradicts Beth's alibis

B.

Discussing some of Beth's prior deceptions

C.

Discussing the testimony of other witnesses

D.

Displaying all the evidence she has against Beth at once

Buy Now
Questions 54

Which of the following is NOT true about observing the reactions of interview subjects?

Options:

A.

The interpretation of an interview subject's reactions requires specific skills on the part of the interviewer.

B.

The observation of a subjects body language is often just as important as the observation of the words used by the subject.

C.

Emotive words should be used early in the interview to observe the respondents emotional reaction.

D.

To effectively observe reactions, an interviewer should move from less sensitive to more sensitive questions as the interview progresses.

Buy Now
Exam Code: CFE-Investigation
Exam Name: Certified Fraud Examiner (CFE) - Investigation
Last Update: Mar 13, 2026
Questions: 181

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99