Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

ACFE CFE-Investigation Dumps

Certified Fraud Examiner (CFE) - Investigation Questions and Answers

Question 1

An investigator is preparing to administer what is likely to be an intense and extended interview with a fraud suspect. To organize their thoughts prior to the interview, the fraud examiner should:

Options:

A.

Provide the suspect with a list of questions to ensure detailed responses-

B.

Make a list of key points to go over with the respondent.

C.

Develop a list of questions ranked in order of importance.

D.

Memorize a detailed list of questions, but avoid taking a written list to the interview

Question 2

Which of the following would be most useful in determining when a specific document file was created?

Options:

A.

The document's metadata

B.

Internet activity data

C.

The system tog

D.

Operating system partition

Question 3

Beta, a Certified Fraud Examiner (CFE). is conducting an admission-seeking interview of Delta, a fraud suspect. In establishing a rationalization. Beta says to Delta. "I know you didn't do this for yourself: it was for your family." This technique seeks to establish rationalization by:

Options:

A.

Reducing Delta's stress about possibly being fired

B.

Claiming Delta's action was for altruistic reasons

C.

Reducing Delta's perception of the legal seriousness of the matter

D.

Establishing that Delta's family was being treated unfairly

Question 4

Why do fraud examiners perform analysis on unstructured, or textual, data?

Options:

A.

To determine whether the footnotes to the financial statements are fairly presented

B.

To find an admission of fraud m an email or other communication that can be presented in court

C.

To categorize data to reveal patterns, sentiments, and relationships indicative of fraud

D.

To figure out whether someone is lying or telling the truth based on context duet

Question 5

Boyd, a Certified Fraud Examiner (CFE). was hired to trace Lottie's financial transactions. During his investigation. Boyd obtains records of electronic payments that Lottie made during the past five years. Which of the following are these records MOST LIKELY to reveal?

Options:

A.

The market value of any real property Lottie owns

B.

The assets that Lottie has purchased

C.

The division and distribution of Lottie's assets

D.

If Lottie is skimming her employer's funds

Question 6

When reporting the results of a fraud examination, it is BEST to include copies (not originals) of important documents in the formal report.

Options:

A.

True

B.

False

Question 7

Which of the following is TRUE of a follow-up/recommendations section in a written fraud examination report?

Options:

A.

A follow-up/recommendations section is not a required part of every written fraud examination report

B.

A follow-up/recommendations section calculates the amount of loss caused by any misconduct identified during the investigation

C.

A follow-up/recommendations section must include a list of organizational failings that contnbuted to the fraud

D.

All of the above

Question 8

Lmdsey, a Certified Fraud Examiner (CFE). has been retained to investigate allegations of bribery and kickbacks allegedly committed by a member of an organization's procurement department. Lindsey conducts an interview during which one of the accused's colleagues states that they overheard the accused discussing a free tnp received from one of the organization's vendors. Which type of evidence would the interviewee's statement be considered?

Options:

A.

Documentary evidence

B.

Testimonial evidence

C.

Verbal evidence

D.

Inconclusive evidence

Question 9

If an important witness becomes hostile and argumentative during an interview, the interviewer should generally.

Options:

A.

Avoid reacting to the witness.

B.

Refute the witness's arguments

C.

Try to reason with the witness

D.

Terminate the interview.

Question 10

Which of the following is considered a best practice for preserving the confidentiality of a fraud investigation?

Options:

A.

Suspend all employees involved in the investigation pending the investigation's outcome.

B.

Ensure that the investigation is conducted at the direction of, or under the supervision of. a government official

C.

Avoid using email or other electronic means to transmit confidential case information

D.

Implement a blanket policy prohibiting all employees from discussing anything related to employee investigations

Question 11

Which of the following is a unique challenge of cloud forensics that is not encountered in traditional forensic practices?

Options:

A.

Lack of corroborating evidence

B.

Lack of data control

C.

Lack of trust from cloud providers

D.

Lack of relevant data

Question 12

The term_____________refers to a process of resolving allegations of fraud from inception to disposition.

Options:

A.

Fraud theory

B.

Forensic investigation

C.

Fraud management

D.

Fraud examination

Question 13

Thea is conducting a fraud examination for a company and suspects one of the company's vendors (a one-person operation) of fraudulent billing. Thea wants to obtain a copy of the suspect individual's credit report and personal data from a third-party information broker. If Thea works in a jurisdiction that regulates the distribution of personal credit information, she cannot obtain the suspect's personal credit data under any circumstances.

Options:

A.

True

B.

False

Question 14

Due to risks of illicit transactions, most jurisdictions require financial institutions to obtain information about which of the following from an institution with which they have a foreign correspondent relationship?

Options:

A.

The institution's branch addresses

B.

The institution's licenses or certifications

C.

The institution's tax statements

D.

The institution's client loan profiles

Question 15

Louis, a Certified Fraud Examiner (CFE). is investigating a potential internal fraud case originating from a whistteblower tip about embezzlement. He discovers that the organization purportedly affected by the embezzlement recorded the tip in a memorandum. Which type of evidence would the memorandum be considered?

Options:

A.

Testimonial evidence

B.

Incriminating evidence

C.

Documentary evidence

D.

Verbal evidence

Question 16

Which of the following would be MOST USEFUL m determining who created a specrfic document file?

Options:

A.

Operating system partition

B.

Internet activity data

C.

The system log

D.

The document's metadata

Question 17

Which of the following data is the MOST DIFFICULT to recover during a digital forensic examination?

Options:

A.

Time and date information about files

B.

Websites visited

C.

Files that have been overwritten

D.

Communications sent via instant messenger

Question 18

Sylvia, a novice interviewer, asks Adam, the respondent, the following question: "Didn't you know that something wasn't right?" This kind of question is called a_____________question.

Options:

A.

Double-negative

B.

Free narrative

C.

Controlled answer

D.

Complex

Question 19

Which of the following terms refers to a process of resolving allegations of fraud from inception to disposition?

Options:

A.

Forensic methodology

B.

Fraud theory

C.

Fraud assessment

D.

Fraud examination

Question 20

Which of the following types of files is the most difficult to recover during a digital forensic examination?

Options:

A.

Overwritten files

B.

Deleted until

C.

Deleted link (shortcut) files

D.

Hidden files

Question 21

Eugene is conducting an admission-seeking interview of a suspect. During the interview, the suspect frequently looks away from Eugene while responding to questions. Eugene can safely conclude that the suspect is dishonest due to his failure to maintain eye contact.

Options:

A.

True

B.

False

Question 22

Which of the following is a common characteristic that asset hiders look for in the financial vehicles they use to conceal their assets?

Options:

A.

Accessibility

B.

Transparency

C.

Exclusivity

D.

Traceability

Question 23

Gilbert is preparing to conduct a covert investigation. Before acting, he wants to wnte a memorandum documenting his plan. Which of the following pieces of information should he include in this memorandum?

Options:

A.

The information expected to be gained from the operation

B.

The identities of any confidential sources to be used in the operation

C.

His first impression regarding the subject's culpability

D.

All of the above

Question 24

If the following statements were included in a fraud examination report of a qualified expert, which of them would be IMPROPER?

Options:

A.

"When asked a second time about the amount of funds missing, the suspect contradicted their previous testimony."

B.

"The evidence shows that between S1 million and S1.5 million in assets were transferred to an offshore account."

C.

"The organization must address the inadequate separation of accounting duties to prevent such an event from happening again."

D.

"In light of all the evidence, the suspect is most likely guilty of fraud against the organization."

Question 25

Assuming that a jurisdiction has prohibited pretexting with financial institutes, which of the following actions would constitute illegal pretexting?

Options:

A.

Withdrawing another person's funds using a stolen bank account number and PIN

B.

Digging through a person's trash to obtain their bank account information

C.

Making purchases with a credit card account under a fictitious identity

D.

Falsely claiming to be the spouse of an account holder to access bank records

Page: 1 / 17
Total 170 questions