Which of the following terms refers to a process of resolving allegations of fraud from inception to disposition?
Which of the following is NOT a step a fraud examiner must take before seizing evidence in a digital forensic investigation?
If the following statements were included in a fraud examination report of a qualified expert, which of them would be IMPROPER?
Which of the following is the MOST ACCURATE statement regarding a fraud examiner's ability to trace cryptocurrency transactions?
Assuming that a jurisdiction has prohibited pretexting against financial institutions, which of the following actions would constitute illegal pretexting?
John, a fraud investigator, is interviewing Mary, who he suspects has been embezzling company funds. Which of the following is the recommended approach John should use to ask Mary questions?
Jana. the controller of XYZ Company, notices that the company's hotel expenses increased substantially from the prior year She wants to check to see if this increase is reasonable by comparing hotel expenses from both years to the number of days XYZ"s employees traveled. Which of the following data analysis functions would be the MOST USEFUL in helping Jana analyze these two variables?
Jade, a Certrfied Fraud Examiner (CFE). is conducting an internal investigation in which an employee is suspected of stealing inventory and selling it through a possible shell company called Hidden Finds. LLC. When Jade tries to check Hidden Finds' website, a message appears that redirects customers to a web address that ends with onion To view the website's content. Jade will need to install a specialized web browser that enables her to access which of the following?
Which of the following is the MOST ACCURATE statement about trying to locate a subject using online records?
Susan, a Certified Fraud Examiner (CFE). is conducting an ad mission-seeking interview of Beth, a fraud suspect. After Susan gave Beth a suitable rationalization for her conduct. Beth continued her denials, giving various alibis. Which of the following would be the LEAST EFFECTIVE technique for Susan to use in this situation?
Which of the following data is the MOST DIFFICULT to recover during a digital forensic examination?
Amanda needs to know the location of the principal office and the date of incorporation of a company she is investigating. Which of the following would be the BEST source of this information?
Allison, a Certified Fraud Examiner (CFE). is investigating a potential procurement fraud scheme. While interviewing a subject, she asks. "Why did you choose to do business with that vendor?" This can BEST be described as a(n):
Which of the following is the MOST IMPORTANT question for a fraud examiner to ask before commencing a legal action to recover assets?
Which of the following is considered a best practice for preserving the confidentiality of a fraud investigation?
Steve, a Certified Fraud Examiner (CFE). was interviewing Michelle, a fraud suspect. Dunng the first part of the interview. Michelle was attentive. However, when he asked her more direct questions about the fraud, she suddenly seemed unconcerned, alternately chewing on her pen cap and picking at a loose piece of fabric on the arm of her chair. From this conduct. Steve is likely to conclude that Michelle
Tonya, a suspect in a kickback scheme, is being interviewed by Carlos, a fraud examiner. As the interview progresses. Carlos notices that Tonya is exhibiting signs of stress, such as repeatedly touching her face, crossing and uncrossing her legs, and darting her eyes around the room Carlos should conclude that Tonya's behavior is the result of deception
Why do fraud examiners perform analysis on unstructured, or textual, data?
Which of the following is TRUE of a well-written fraud examination report?
Which of the following is a reason why a person or organization might engage a fraud examiner to trace illicit transactions?
Which of the following is a measure that can help avoid alerting suspected perpetrators who are under investigation?
Which of the following would be MOST USEFUL m determining who created a specrfic document file?