Halloween Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CFE-Investigation Exam Dumps - Certified Fraud Examiner (CFE) - Investigation

Searching for workable clues to ace the ACFE CFE-Investigation Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CFE-Investigation PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 33

Boyd, a Certified Fraud Examiner (CFE). was hired to trace Lottie's financial transactions. During his investigation. Boyd obtains records of electronic payments that Lottie made during the past five years. Which of the following are these records MOST LIKELY to reveal?

A.

The market value of any real property Lottie owns

B.

The assets that Lottie has purchased

C.

The division and distribution of Lottie's assets

D.

If Lottie is skimming her employer's funds

Full Access
Question # 34

Jason is an investigator who is conducting an interview with Dina. a fraud suspect. After introducing himself. Jason attempts to be amiable by asking about Dina's favorite sports team and complimenting her eyeglass frames. Jason is attempting to:

A.

Establish the interview theme.

B.

Establish rapport.

C.

Calibrate the witness.

D.

Exhibit passive listening

Full Access
Question # 35

Sarah is conducting an admission-seeking interview of a suspect. Throughout the interview, the suspect makes little eye contact with Sarah. Based on this information atone, can Sarah conclude that the suspect is being deceptive?

A.

Yes, because it is safe to assume that suspects who avoid eye contact are most likely being deceptive.

B.

Yes, because avoiding eye contact is a sign of deceptive.

C.

No, because this is not enough information to conclude that the suspect is being deceptive

D.

No, because avoiding eye contact is not directly linked to deception.

Full Access
Question # 36

Which of the following questions would be most effective when starting the calibration process during an interview?

A.

"Did you commit any misconduct against the company?"

B.

"Do you know what the punishment is for violations like this'5"

C.

"Do you know who might have defrauded the company?"

D.

"How many jobs have you had before this one?’

Full Access
Question # 37

Which of the following is NOT one of the main limitations of conducting a search for public records using online databases?

A.

Online public records searches are limited in the jurisdictions they cover.

B.

Public records database companies are difficult to find.

C.

Online coverage of public records varies widely from jurisdiction to jurisdiction

D.

The timeliness and accuracy of information in online databases must be validated

Full Access
Question # 38

A fraud examiner believes that a suspect might have used illicit funds to construct a commercial building to fit a restaurant. Which of the following records would be the MOST helpful in confirming the owner of the building?

A.

Local court records

B.

Commercial filings

C.

Building permit records

D.

Voter registration records

Full Access
Question # 39

Misty, a fraud investigator, is interviewing Larry, who she suspects has been embezzling company funds. Which of the following is NOT a recommended sequence in which Misty should ask Lam/ questions?

A.

Ask questions in random order to prevent Larry from knowing what question comes next.

B.

Start with questions about known information and work toward unknown information

C.

Start with general questions and move toward specific questions

D.

Ask questions seeking general information before seeking details

Full Access
Question # 40

Which of the following is the MOST ACCURATE statement about imaging suspect computers' hard drives?

A.

Imaging enables the retrieval of data from the suspect computer directly via its operating system.

B.

Imaging prohibits access to the suspect computer's hard drive by individuals not professionally trained in forensic analysis

C.

Imaging creates pictures of the suspect computer system and its wires and cables

D.

Imaging allows for the analysis of data from a suspect computer without altering or damaging the original data in any way

Full Access
Go to page: