Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

ACFE CFE-Investigation Certified Fraud Examiner (CFE) - Investigation Exam Practice Test

Demo: 48 questions
Total 170 questions

Certified Fraud Examiner (CFE) - Investigation Questions and Answers

Question 1

Which of the following data is the MOST DIFFICULT to recover during a digital forensic examination?

Options:

A.

Time and date information about files

B.

Websites visited

C.

Files that have been overwritten

D.

Communications sent via instant messenger

Question 2

The term_____________refers to a process of resolving allegations of fraud from inception to disposition.

Options:

A.

Fraud theory

B.

Forensic investigation

C.

Fraud management

D.

Fraud examination

Question 3

Arnold, a Certified Fraud Examiner (CFE) for Integra Wealth, learns that Elizabeth, an accounts payable clerk, recently purchased an expensive ski boat Arnold also knows that Elizabeth recently purchased a vacation home on a nearby lake Arnold has sufficient predication to:

Options:

A.

Notify management of the possibility that Elizabeth has committed fraudulent acts

B.

Search Elizabeth's mobile phone for evidence of misconduct.

C.

Accuse Elizabeth directly of having committed fraud

D.

Conduct discreet inquiries into Elizabeth's responsibilities as an accounts payable clerk

Question 4

Which of the following is a reason why a subject's credit card records are useful in tracing investigations?

Options:

A.

Credit card statements show source of the funds used to pay a credit card bill

B.

Credit card records show the movements and habits of the subject

C.

Credit card records provide insight into the subject's litigation history

D.

Credit card records contain information about the division and distribution of the subject's assets

Question 5

Leslie, a fraud examiner for ACME Corporation, suspects that a salesperson for another company has defrauded ACME. Leslie wants to obtain a copy of the suspect individual's credit report and personal data from a third-party information broker If Leslie works in a jurisdiction that regulates the distribution of personal credit information, she generally can obtain the information if she has the consent of the individual.

Options:

A.

True

B.

False

Question 6

Louis, a Certified Fraud Examiner (CFE). is investigating a potential internal fraud case originating from a whistteblower tip about embezzlement. He discovers that the organization purportedly affected by the embezzlement recorded the tip in a memorandum. Which type of evidence would the memorandum be considered?

Options:

A.

Testimonial evidence

B.

Incriminating evidence

C.

Documentary evidence

D.

Verbal evidence

Question 7

Which of the following is the MOST ACCURATE statement about imaging suspect computers' hard drives?

Options:

A.

Imaging enables the retrieval of data from the suspect computer directly via its operating system.

B.

Imaging prohibits access to the suspect computer's hard drive by individuals not professionally trained in forensic analysis

C.

Imaging creates pictures of the suspect computer system and its wires and cables

D.

Imaging allows for the analysis of data from a suspect computer without altering or damaging the original data in any way

Question 8

Smith, a Certified Fraud Examiner (CFE) for the Ajax Co.. observes Jones, an accounts payable clerk, driving an expensive sports car to work. Smith also has knowledge that Jones recently had extensive remodeling done on her residence. Smith has sufficient predication to:

Options:

A.

Conduct discreet inquiries into Jones's responsibilities as an accounts payable clerk

B.

Notify management of the possibility that Jones has committed fraudulent acts.

C.

Search Jones's mobile phone for evidence of misconduct

D.

Accuse Jones directly of having committed fraud.

Question 9

Which of the following is NOT one of the main limitations of conducting a search for public records using online databases?

Options:

A.

Online public records searches are limited in the jurisdictions they cover.

B.

Public records database companies are difficult to find.

C.

Online coverage of public records varies widely from jurisdiction to jurisdiction

D.

The timeliness and accuracy of information in online databases must be validated

Question 10

Which of the following statements is MOST ACCURATE regarding how a fraud examiner should prepare for an interview with a subject from a different jurisdiction?

Options:

A.

Failing to observe cultural norms is not a concern if the interviewer is from a different country than the interviewee.

B.

Consulting with legal counsel is only necessary when an investigation spans multiple

C.

A fraud examiner should find out whether the interviewee can insist upon the presence of a legal representative

D.

A fraud examiner does not need to research cultural considerations such as appropriate greetings and eye contact.

Question 11

Thea is conducting a fraud examination for a company and suspects one of the company's vendors (a one-person operation) of fraudulent billing. Thea wants to obtain a copy of the suspect individual's credit report and personal data from a third-party information broker. If Thea works in a jurisdiction that regulates the distribution of personal credit information, she cannot obtain the suspect's personal credit data under any circumstances.

Options:

A.

True

B.

False

Question 12

Which of the following situations would probably NOT require access to nonpublic records to develop evidence?

Options:

A.

Obtaining personal health care records

B.

Accessing banking records to trace assets

C.

Reviewing a company's business filings

D.

Analyzing an individual's personal mobile phone records

Question 13

Which of the following is the MOST IMPORTANT question for a fraud examiner to ask before commencing a legal action to recover assets?

Options:

A.

"Is there a relevant statute of limitations9"

B.

"Does the suspect already have a criminal record?"

C.

"Is the suspect guilty of the fraudulent act?''

D.

"Are nonlegal recovery methods or remedies available?''

Question 14

Which of the following statements concerning a well-written fraud examination report is MOST ACCURATE?

Options:

A.

The report should convey all Information provided by witnesses

B.

Only relevant facts that support the fraud allegation should be included in the report

C.

The report writer should avoid technical jargon where possible

D.

Signed copies of the fraud examiner's interview notes should be used to report interview details

Question 15

Which of the following is the MOST APPROPRIATE measure when seeking to avoid alerting suspected perpetrators who are under investigation?

Options:

A.

Terminate the suspected employee.

B.

Delay taking any action.

C.

Investigate during nonbusiness hours.

D.

Disclose the investigation to all employees

Question 16

Which of the following would be most useful in determining when a specific document file was created?

Options:

A.

The document's metadata

B.

Internet activity data

C.

The system tog

D.

Operating system partition

Question 17

Which of the following statements would be IMPROPER if included in the fraud examination report of a Certified Fraud Examiner (CFE» who is also qualified as an accounting expert?

Options:

A.

"The company's internal controls were wholly inadequate to prevent this type of violation and should be remediated at the earliest possible time."

B.

"The evidence shows that expenses in excess of $5 million were omitted from the company's financial statements "

C.

"Based on statements the suspect made to me. it is my assessment that the suspect has a dishonest disposition."

D.

"From my examination, it appears that the company's financial statements were not presented in accordance with generally accepted accounting principles "

Question 18

Which of the following types of data is BEST suited for a BenfordTs Law analysis?

Options:

A.

Employee identification numbers

B.

Telephone numbers

C.

A listing of payment amounts

D.

Vendor addresses

Question 19

When planning for the interview phase of an investigation, which of the following steps should NOT be taken by the fraud examiner?

Options:

A.

Consider what the interview is intended to accomplish and state an objective.

B.

Review the case file to ensure that important information has not been overlooked

C.

Prepare a detailed list of questions to ask the subject during the interview.

D.

Ensure that the interview is held in a venue where the subject will feel Uncomfortable

Question 20

Which of the following can be obtained from a wire transfer record?

Options:

A.

The name of the receiving institution's registered agent

B.

The recipient's government identification number

C.

The name of the sender or originator

D.

The sending institution's accreditation type

Question 21

A fraud examiner believes that a suspect might have used illicit funds to construct a commercial building to fit a restaurant. Which of the following records would be the MOST helpful in confirming the owner of the building?

Options:

A.

Local court records

B.

Commercial filings

C.

Building permit records

D.

Voter registration records

Question 22

Management at First Choice Inc. suspects that Nathan, its chief financial officer (CFO), has been embezzling funds. It hires Reina. a Certified Fraud Examiner (CFE), to investigate the matter When conducting the fraud examination. Reina should proceed as though;

Options:

A.

After Nathan is terminated, the case will end

B.

The case will end in litigation.

C.

Nathan is guilty

D.

The matter will be resolved completely internally.

Question 23

Which of the following BEST describes the data analytics approach known as predictive analytics?

Options:

A.

The employment of a learning algorithm that identifies similarities, patterns, or anomalies within a data set on its own, without human involvement

B.

The configuration of a business program to emulate and integrate the actions of a human to execute certain business processes thus increasing efficiency and automating repetitive manual tasks

C.

The use of historical data, along with analyses, statistics, and machine learning components, to build a mathematical model that captures important trends and creates a quantitative forecast

D.

The use of layered artificial neural networks to accommodate more data and more sophisticated algorithms to identify complex patterns

Question 24

Which of the following questions would be MOST EFFECTIVE when establishing a baseline during an interview?

Options:

A.

"Do you know who had access to the file?"

B.

"Are you familiar with the company's policies regarding ethics?"

C.

"Have you committed any misconduct against the company?"

D.

"How long have you been in this department?"

Question 25

Which of the following sources of information is usually considered to be the MOST IMPORTANT in tracing a subject's assets?

Options:

A.

Credit card statements

B.

PaystuDs

C.

Surveillance footage

D.

Financial institution records

Question 26

Which of the following is a common method that fraudsters use to hide their ill-gotten gains?

Options:

A.

Purchasing a used vehicle

B.

Creating a will to allocate assets at death

C.

Placing assets in probate

D.

Transferring assets into foreign trusts

Question 27

If you are seizing a computer for forensic analysis, why is it generally necessary to seize any copiers connected to it?

Options:

A.

Many copiers connect via parallel cables, which store and transmit copy job data.

B.

Most copiers store, process, and transmit data m a cloud environment

C.

Many copiers have internal hard drives that might contain information relevant to a fraud examination

D.

Most copiers today are nonimpact copiers, meaning that they store copied images indefinitely.

Question 28

Rachel, a fraud suspect, has decided to confess to Linda, a Certified Fraud Examiner (CFE). In obtaining a verbal confession from Rachel. Linda should obtain all of the following items of information EXCEPT:

Options:

A.

The approximate beginning and end dates of the fraud

B.

A statement from Rachel that her conduct was an accident

C.

A general estimate of the amount of money involved

D.

Rachel's motive for the offense

Question 29

Tonya, a suspect in a kickback scheme, is being interviewed by Carlos, a fraud examiner. As the interview progresses. Carlos notices that Tonya is exhibiting signs of stress, such as repeatedly touching her face, crossing and uncrossing her legs, and darting her eyes around the room Carlos should conclude that Tonya's behavior is the result of deception

Options:

A.

True

B.

False

Question 30

John, a fraud investigator, is interviewing Mary, who he suspects has been embezzling company funds. Which of the following is the recommended approach John should use to ask Mary questions?

Options:

A.

Start with questions about unknown information and work toward known information

B.

Ask questions in random order to keep Mary from guessing the next question

C.

Start with specific questions and move toward general questions

D.

Seek general information before seeking specific details

Question 31

Vishal, a Certified Fraud Examiner (CFE). has just initiated an interview with Steve, a fraud suspect. After a short introduction. Vishal jokes about the fact that he and Steve are wearing the same tie and then proceeds to ask Steve about the previous night's major sporting event Vishal is attempting to

Options:

A.

Establish the interview theme

B.

Condition the witness.

C.

Establish rapport

D.

Exhibit passive listening.

Question 32

Which of the following statements about how fraud examiners should approach fraud examinations is FALSE?

Options:

A.

In most examinations, fraud examiners should start interviewing the least involved candidates and proceed toward those who are potentially more involved.

B.

When conducting fraud examinations, fraud examiners should start with specific details and move toward more general information.

C.

When conducting fraud examinations, fraud examiners should adhere to the fraud theory approach.

D.

When conducting fraud examinations, fraud examiners should begin with general information that is known and then move to the more specific details.

Question 33

Management at Oak Company has asked Arthur, an internal auditor, to implement a data analysis program to search for warning signs of potential fraud within the company. Which of the following steps should Arthur conduct first to MOST effectively use data analysis techniques for such an initiative?

Options:

A.

Analyze the data.

B.

Cleanse and normalize the data

C.

Build a profile of potential frauds.

D.

Obtain the data.

Question 34

Butler, a Certified Fraud Examiner (CFE), needs to obtain a copy of a statement that the chief executive officer (CEO) of Accord Investments, a venture capital firm, posted on the firm's website sometime last year. Unfortunately, the quote has been removed from the website. Which of the following resources would be the BEST choice for Butler to consult to find an earlier version of the web page that he needs?

Options:

A.

The invisible archives

B.

The free web

C.

The internet archives

D.

The deep web

Question 35

Pedro, a Certified Fraud Examiner (CFE). is conducting an admission-seeking interview of Manuel, a fraud suspect. After Pedro diffused Manuel's alibis. Manuel became withdrawn and stowty began to slouch m his chair, bowing his head and beginning to cry. What should Pedro do now?

Options:

A.

Leave the room for a short lime

B.

Ask Manuel to sit up straight

C.

Demand that Manuel stop crying.

D.

Present an alternative question.

Question 36

Shane, a Certified Fraud Examiner (CFE). is investigating Larsen. who is active on various social networking sites. Shane wants to search and extract information from Larson's social media postings so that it can be used in court as evidence Which of the following is the MOST ACCURATE statement regarding what Shane should do when conducting a social media investigation of Larsen?

Options:

A.

Shane should conduct a forensic shutdown of his computer to preserve the metadata in the social networking sites.

B.

Shane should preserve the information from the social networking sites so that it can be established as authentic if used in court.

C.

Shane should email himself the links of the postings so that he can retrieve them later.

D.

Shane should preserve the information by saving the links of the postings in his 'bookmarks"

Question 37

Andrew wants to use a confidential informant in his investigation. He plans to compensate the informant with cash and obtain a receipt. He also plans to identify his source in a memorandum and his final report using only the informant's initials. Which of Andrew's plans is NOT considered a best practice when using an informant?

Options:

A.

Referring to the informant in the memorandum using the informant's initials

B.

Using information from the informant in his final report

C.

Creating a receipt regarding the cash payment

D.

Compensating the informant with cash

Question 38

Which of the following questions would be most effective when starting the calibration process during an interview?

Options:

A.

"Did you commit any misconduct against the company?"

B.

"Do you know what the punishment is for violations like this'5"

C.

"Do you know who might have defrauded the company?"

D.

"How many jobs have you had before this one?’

Question 39

Which of the following statements about fraud response plans is FALSE?

Options:

A.

A fraud response plan outlines the actions an organization will take when suspicions of fraud have arisen.

B.

A fraud response plan should create an environment to minimize risk and maximize the potential for success

C.

A fraud response plan must be simple to understand and administer

D.

A fraud response plan should specify how every fraud examination should be conducted regardless of the type of fraud

Question 40

A fraud examiner contacts a witness regarding an interview. If the respondent says. ‘I’m too busy." how should the fraud examiner react?

Options:

A.

Explain that the respondent will be subject to discipline if they do not participate

B.

Stress that the interview will be short.

C.

Caution the witness that avoidance of the interview will be considered suspicious.

D.

Inquire about a more convenient time

Question 41

Which of the following is the MOST ACCURATE statement regarding a fraud examiner's ability to trace cryptocurrency transactions?

Options:

A.

Each Blockchain transaction contains a user's cryptographic address, which can help identify patterns that might link the user to criminal activity.

B.

Most jurisdictions do not require digital wallet providers to record any personal information about cryptocurrency users

C.

Cryptocurrency ownership cannot be determined through an analysis of details on a subject's bank statements.

D.

Most cryptocurrencies rely on private block chains, which allow users' transactions to be completely anonymous and therefore difficult to trace.

Question 42

Which of the following types of files is the most difficult to recover during a digital forensic examination?

Options:

A.

Overwritten files

B.

Deleted until

C.

Deleted link (shortcut) files

D.

Hidden files

Question 43

A fraud examiner is based in Mexico, a non-European Union (EU) country, and is collecting personal information from their company's human resources (HR) files about an employee based in Germany, an EU country. Based on these facts, the fraud examiner would need to comply with the EU"s General Data Protection Regulation (GDPR) when conducting their internal investigation.

Options:

A.

True

B.

False

Question 44

Which of the following statements concerning access to nonpublic records is FALSE?

Options:

A.

When civil litigation has commenced, a party often may obtain a subpoena or legal order for an individual's relevant bank records.

B.

A fraud examiner can request a business's bank records even if the business is not legally obligated to comply.

C.

An audit clause can be designed to allow a party to inspect the books of a business partner or vendor.

D.

During the government's criminal investigation, a fraud examiner not employed by the government has a right to access relevant documents that the government has obtained.

Question 45

Sarah is conducting an admission-seeking interview of a suspect. Throughout the interview, the suspect makes little eye contact with Sarah. Based on this information atone, can Sarah conclude that the suspect is being deceptive?

Options:

A.

Yes, because it is safe to assume that suspects who avoid eye contact are most likely being deceptive.

B.

Yes, because avoiding eye contact is a sign of deceptive.

C.

No, because this is not enough information to conclude that the suspect is being deceptive

D.

No, because avoiding eye contact is not directly linked to deception.

Question 46

Jana. the controller of XYZ Company, notices that the company's hotel expenses increased substantially from the prior year She wants to check to see if this increase is reasonable by comparing hotel expenses from both years to the number of days XYZ"s employees traveled. Which of the following data analysis functions would be the MOST USEFUL in helping Jana analyze these two variables?

Options:

A.

Correlation analysis

B.

Duplicate testing

C.

Verifying multiples of a number

D.

Ben ford’s Law analysis

Question 47

Which of the following is a factor that fraud examiners should consider when determining whether to dispose of evidence following the conclusion of a fraud examination?

Options:

A.

Whether the information was presented by a lay witness or an expert witness

B.

Whether the evidence is documentary or testimonial

C.

Whether the evidence is direct or circumstantial

D.

Whether the organization has a general document retention policy in place

Question 48

Barnes, a Certified Fraud Examiner (CFE). is using data analysis to identify anomalies that might indicate fraud in XYZ Company's accounts payable transactions. Which of the following is the MOST EFFECTIVE data analysis function that Barnes could use to look for potential fraud in accounts payable?

Options:

A.

Compare book and tax depreciation and indicate variances

B.

Identify paycheck amounts over a certain limit

C.

Review recurring monthly expenses and compare to posted/paid invoices

D.

All of the above

Demo: 48 questions
Total 170 questions