Halloween Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CFE-Investigation Exam Dumps - Certified Fraud Examiner (CFE) - Investigation

Searching for workable clues to ace the ACFE CFE-Investigation Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CFE-Investigation PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 41

Which of the following sets of numbers could a fraud examiner MOST LIKELY benefit from running a Benford’s Law analysis on?

A.

Telephone numbers

B.

Vendor invoice amounts

C.

Employee identification numbers

D.

Bank account numbers

Full Access
Question # 42

Beta, a Certified Fraud Examiner (CFE). is conducting an admission-seeking interview of Gamma, a fraud suspect. After Beta gave Gamma an appropriate rationalization for his conduct, Gamma continued his denials, giving various alibis. These alibis can usually be diffused by all of the following techniques EXCEPT:

A.

Discussing the testimony of witnesses

B.

Displaying physical evidence

C.

Discussing Gamma's prior deceptions

D.

Downplaying the strength of the evidence

Full Access
Question # 43

Elizabeth, a Certified Fraud Examiner (CFE), is conducting an admission-seeking interview with Shannon, a fraud suspect. Shannon is seated approximately five feet away from Elizabeth in an empty room The room has several pictures and posters on the wall, and the door is closed According to admission-seeking interview best practices, what change should Elizabeth make to the interview environment to increase the chances of the interview's success?

A.

Move the interview to a room without pictures or wall hangings to prevent distractions

B.

Open the door so that Shannon feels free to leave at any time

C.

Place a table between her and Shannon to create a psychological barrier

D.

All of the above

Full Access
Question # 44

After completing all necessary investigative steps. Erica, a Certified Fraud Examiner (CFE), is reasonably sure that Justine, her primary suspect, committed the fraud in question. Before scheduling an admission-seeking interview with Justine, what else should Erica be reasonably sure of?

A.

That Justine will confess to the accusation when prompted

B.

That Justine's employer will take disciplinary action against Justine if she confesses

C.

That the interview's time, place, and content can De controlled

D.

That no other person was involved in the fraud n question

Full Access
Question # 45

Which of the following is NOT a best practice for obtaining a signed statement?

A.

Add subsequent facts to the statement as an addendum.

B.

Have the suspect write out the entire statement in their own handwriting

C.

Prepare separate statements for unrelated offenses

D.

Have two individuals witness the signing of the document when possible.

Full Access
Question # 46

Shane, a Certified Fraud Examiner (CFE). is investigating Larsen. who is active on various social networking sites. Shane wants to search and extract information from Larson's social media postings so that it can be used in court as evidence Which of the following is the MOST ACCURATE statement regarding what Shane should do when conducting a social media investigation of Larsen?

A.

Shane should conduct a forensic shutdown of his computer to preserve the metadata in the social networking sites.

B.

Shane should preserve the information from the social networking sites so that it can be established as authentic if used in court.

C.

Shane should email himself the links of the postings so that he can retrieve them later.

D.

Shane should preserve the information by saving the links of the postings in his 'bookmarks"

Full Access
Question # 47

Which of the following is the MOST ACCURATE statement regarding the analysis phase in digital forensic investigations?

A.

The analysis phase of digital forensic investigations should not commence unless it is verified that the suspect devices do not contain relevant data.

B.

During the analysis phase, it is best to use a combination of the various forensic tools that can assist h identifying, extracting, and collecting digital evidence

C.

When analyzing data for evidence, fraud examiners should look for exculpatory evidence but not exculpatory evidence

D.

The primary concern when analyzing digital evidence is to protect the collected information from seizure

Full Access
Question # 48

Which of the following is the MOST IMPORTANT question for a fraud examiner to ask before commencing a legal action to recover assets?

A.

"Is there a relevant statute of limitations9"

B.

"Does the suspect already have a criminal record?"

C.

"Is the suspect guilty of the fraudulent act?''

D.

"Are nonlegal recovery methods or remedies available?''

Full Access
Go to page: