Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CFE-Investigation Exam Dumps - Certified Fraud Examiner - Investigation Exam

Question # 4

Which of the following terms refers to a process of resolving allegations of fraud from inception to disposition?

A.

Forensic methodology

B.

Fraud theory

C.

Fraud assessment

D.

Fraud examination

Full Access
Question # 5

Which of the following is NOT a step a fraud examiner must take before seizing evidence in a digital forensic investigation?

A.

Obtain and become familiar with any legal orders that apply to the investigation

B.

Assemble an investigation team comprised only of outside digital forensic experts

C.

Ensure that only trained professionals employ any software used in a forensic capacity

D.

Determine whether there are privacy issues related to the item(s) to be searched.

Full Access
Question # 6

If the following statements were included in a fraud examination report of a qualified expert, which of them would be IMPROPER?

A.

"When asked a second time about the amount of funds missing, the suspect contradicted their previous testimony."

B.

"The evidence shows that between S1 million and S1.5 million in assets were transferred to an offshore account."

C.

"The organization must address the inadequate separation of accounting duties to prevent such an event from happening again."

D.

"In light of all the evidence, the suspect is most likely guilty of fraud against the organization."

Full Access
Question # 7

Which of the following is the MOST ACCURATE statement regarding a fraud examiner's ability to trace cryptocurrency transactions?

A.

Each Blockchain transaction contains a user's cryptographic address, which can help identify patterns that might link the user to criminal activity.

B.

Most jurisdictions do not require digital wallet providers to record any personal information about cryptocurrency users

C.

Cryptocurrency ownership cannot be determined through an analysis of details on a subject's bank statements.

D.

Most cryptocurrencies rely on private block chains, which allow users' transactions to be completely anonymous and therefore difficult to trace.

Full Access
Question # 8

Assuming that a jurisdiction has prohibited pretexting against financial institutions, which of the following actions would constitute illegal pretexting?

A.

Intentionally making false statements on loan applications

B.

Stealing a person's mail lo obtain the person's bank account number

C.

Impersonating an account holder to access their bank records

D.

Setting up a bank account in an assumed name

Full Access
Question # 9

John, a fraud investigator, is interviewing Mary, who he suspects has been embezzling company funds. Which of the following is the recommended approach John should use to ask Mary questions?

A.

Start with questions about unknown information and work toward known information

B.

Ask questions in random order to keep Mary from guessing the next question

C.

Start with specific questions and move toward general questions

D.

Seek general information before seeking specific details

Full Access
Question # 10

Jana. the controller of XYZ Company, notices that the company's hotel expenses increased substantially from the prior year She wants to check to see if this increase is reasonable by comparing hotel expenses from both years to the number of days XYZ"s employees traveled. Which of the following data analysis functions would be the MOST USEFUL in helping Jana analyze these two variables?

A.

Correlation analysis

B.

Duplicate testing

C.

Verifying multiples of a number

D.

Ben ford’s Law analysis

Full Access
Question # 11

Jade, a Certrfied Fraud Examiner (CFE). is conducting an internal investigation in which an employee is suspected of stealing inventory and selling it through a possible shell company called Hidden Finds. LLC. When Jade tries to check Hidden Finds' website, a message appears that redirects customers to a web address that ends with onion To view the website's content. Jade will need to install a specialized web browser that enables her to access which of the following?

A.

The deep archives

B.

The free web

C.

The dark web

D.

The internet archives

Full Access
Question # 12

Which of the following is the MOST ACCURATE statement about trying to locate a subject using online records?

A.

Most public records services do not maintain a list of past addresses

B.

Obtaining a past address of the subject should be the first step in trying to locate a subject using online records

C.

The first step in locating someone using online records is to obtain a list of past employers

D.

Online records are generally not useful in locating subjects whose address is unknown

Full Access
Question # 13

Susan, a Certified Fraud Examiner (CFE). is conducting an ad mission-seeking interview of Beth, a fraud suspect. After Susan gave Beth a suitable rationalization for her conduct. Beth continued her denials, giving various alibis. Which of the following would be the LEAST EFFECTIVE technique for Susan to use in this situation?

A.

Displaying evidence that specifically contradicts Beth's alibis

B.

Discussing some of Beth's prior deceptions

C.

Discussing the testimony of other witnesses

D.

Displaying all the evidence she has against Beth at once

Full Access
Question # 14

Which of the following data is the MOST DIFFICULT to recover during a digital forensic examination?

A.

Time and date information about files

B.

Websites visited

C.

Files that have been overwritten

D.

Communications sent via instant messenger

Full Access
Question # 15

Amanda needs to know the location of the principal office and the date of incorporation of a company she is investigating. Which of the following would be the BEST source of this information?

A.

The organizational filing with the government of the jurisdiction in which the company is incorporated

B.

The company's income tax filings

C.

The contractual records of any real property owned by the corporation

D.

The comprehensive litigation file in the local court in the jurisdiction in which the company is headquartered

Full Access
Question # 16

Allison, a Certified Fraud Examiner (CFE). is investigating a potential procurement fraud scheme. While interviewing a subject, she asks. "Why did you choose to do business with that vendor?" This can BEST be described as a(n):

A.

Open question

B.

Complex question

C.

Leading question

D.

Closed question

Full Access
Question # 17

Which of the following is the MOST IMPORTANT question for a fraud examiner to ask before commencing a legal action to recover assets?

A.

"Has the defendant been previously arrested for allegedly committing a white-collar crime?"

B.

"Does the defendant have sufficient property or money to satisfy a money judgment?"

C.

"Is there a relevant statute of limitations?"

D.

"Is the suspect guilty of the fraudulent act?"

Full Access
Question # 18

Which of the following is considered a best practice for preserving the confidentiality of a fraud investigation?

A.

Suspend all employees involved in the investigation pending the investigation's outcome.

B.

Ensure that the investigation is conducted at the direction of, or under the supervision of. a government official

C.

Avoid using email or other electronic means to transmit confidential case information

D.

Implement a blanket policy prohibiting all employees from discussing anything related to employee investigations

Full Access
Question # 19

Steve, a Certified Fraud Examiner (CFE). was interviewing Michelle, a fraud suspect. Dunng the first part of the interview. Michelle was attentive. However, when he asked her more direct questions about the fraud, she suddenly seemed unconcerned, alternately chewing on her pen cap and picking at a loose piece of fabric on the arm of her chair. From this conduct. Steve is likely to conclude that Michelle

A.

Is feeling bored by the interview process

B.

Is being deceptive

C.

Does not know the answers to Steve's questions

D.

Is telling the truth

Full Access
Question # 20

Tonya, a suspect in a kickback scheme, is being interviewed by Carlos, a fraud examiner. As the interview progresses. Carlos notices that Tonya is exhibiting signs of stress, such as repeatedly touching her face, crossing and uncrossing her legs, and darting her eyes around the room Carlos should conclude that Tonya's behavior is the result of deception

A.

True

B.

False

Full Access
Question # 21

Why do fraud examiners perform analysis on unstructured, or textual, data?

A.

To determine whether the footnotes to the financial statements are fairly presented

B.

To find an admission of fraud m an email or other communication that can be presented in court

C.

To categorize data to reveal patterns, sentiments, and relationships indicative of fraud

D.

To figure out whether someone is lying or telling the truth based on context duet

Full Access
Question # 22

Which of the following is TRUE of a well-written fraud examination report?

A.

The details of witness interviews should be reported in a separate memorandum.

B.

The report should discuss only the evidence that substantiates the fraud allegation

C.

All information provided by witnesses, regardless of relevance, should be included in the report.

D.

Technical terms should be included whenever possible to convey professionalism.

Full Access
Question # 23

Which of the following is a reason why a person or organization might engage a fraud examiner to trace illicit transactions?

A.

A victim of fraud wants to facilitate the recovery of criminal proceeds.

B.

An employer wants to know if an employee is falsifying regulatory reports

C.

An attorney wants to evaluate an expert's financial report

D.

An entity needs to find hidden relationships in big data that otherwise would not be discovered.

Full Access
Question # 24

Which of the following is a measure that can help avoid alerting suspected perpetrators who are under investigation?

A.

Terminate the suspected employee.

B.

Notify everyone in the affected department

C.

Delay taking any action.

D.

Inform only those who need to know.

Full Access
Question # 25

Which of the following would be MOST USEFUL m determining who created a specrfic document file?

A.

Operating system partition

B.

Internet activity data

C.

The system log

D.

The document's metadata

Full Access