Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CFE-Investigation Exam Dumps - Certified Fraud Examiner (CFE) - Investigation

Searching for workable clues to ace the ACFE CFE-Investigation Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CFE-Investigation PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 4

During an interview, Alex asked a fraud suspect if he could retrieve the suspect's account records from her bank. The suspect said, "yes." but she did not provide consent in writing Although the suspect orally consented, the suspect's bank is NOT required to allow Alex to access the suspect's account records at this point.

A.

True

B.

False

Full Access
Question # 5

Which of the following is NOT a step a fraud examiner must take before seizing evidence in a digital forensic investigation?

A.

Obtain and become familiar with any legal orders that apply to the investigation

B.

Assemble an investigation team comprised only of outside digital forensic experts

C.

Ensure that only trained professionals employ any software used in a forensic capacity

D.

Determine whether there are privacy issues related to the item(s) to be searched.

Full Access
Question # 6

Tara. a Certified Fraud Examiner (CFE). is searching social media sites for evidence in a fraud investigation. Which of the following is the MOST ACCURATE statement regarding what Tara should do when mining social media sites for evidence of fraud?

A.

Tara should preserve the information by saving the links of the postings as bookmarks in her browser.

B.

Tara should preserve the metadata by printing out the web pages of each of the postings.

C.

Tara should conduct a forensic shutdown of the computer to preserve the metadata m the social networking sites.

D.

Tara should preserve the information from the sites so that it can be established as authentic if used in court.

Full Access
Question # 7

Assuming that a jurisdiction has prohibited pretexting against financial institutions, which of the following actions would constitute illegal pretexting?

A.

Intentionally making false statements on loan applications

B.

Stealing a person's mail lo obtain the person's bank account number

C.

Impersonating an account holder to access their bank records

D.

Setting up a bank account in an assumed name

Full Access
Question # 8

Which of the following is a common method that fraudsters use to hide their ill-gotten gains?

A.

Purchasing a used vehicle

B.

Creating a will to allocate assets at death

C.

Placing assets in probate

D.

Transferring assets into foreign trusts

Full Access
Go to page: