Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

ACFE CFE-Investigation Certified Fraud Examiner (CFE) - Investigation Exam Practice Test

Demo: 52 questions
Total 181 questions

Certified Fraud Examiner (CFE) - Investigation Questions and Answers

Question 1

Which of the following is a factor that fraud examiners should consider when determining whether to dispose of evidence following the conclusion of a fraud examination?

Options:

A.

Whether the information was presented by a lay witness or an expert witness

B.

Whether the evidence is documentary or testimonial

C.

Whether the evidence is direct or circumstantial

D.

Whether the organization has a general document retention policy in place

Question 2

When documenting interviews, it is BEST practice for the interviewer to:

Options:

A.

Document notes for each interview separately, nduding those for electronic recordings.

B.

Write down verbatim all of (he information that the subject provides during the interview

C.

Err on the side of taking too many notes rather than too few.

D.

Note impressions regarding the subject's guilt or innocence.

Question 3

Gamma, a Certified Fraud Examiner (CFE>, was conducting an admission-seeking interview of Delta, a fraud suspect. Gamma tells Delta, "It isn't like you took something from a friend or neighbor I can see how you could say. 'Well, this would be okay as long as it is the company and not my coworkers.' Isn't that right?" This technique seeks to establish rationalization by:

Options:

A.

Convincing DDU that the incident had suffcinet justification

B.

Reducing Delta's perception of the legal seriousness of the matter

C.

Depersonalizing the victim

D.

Developing revenge as a motive

Question 4

Which of the following is a purpose of an admission-seeking interview?

Options:

A.

To establish that the confessor regrets committing the act

B.

To obtain a valid confession from a culpable individual

C.

To verify that the accused mistakenly committed the act

D.

To determine whether the subject's responses are credible

Question 5

Shannon, a Certified Fraud Examiner (CFE), is conducting a fraud examination for Sand Corp. Shannon is going to perform a textual analysis on unstructured data, such as emails and instant messages. Why would Shannon perform such an analysis?

Options:

A.

The analysis will determine whether someone is lying or telling the truth based on clues within the data.

B.

The analysis will uncover an admission of fraud in an email or other communication that can be presented in court.

C.

The analysis will produce a visual representation of the data collected to track the movement of money.

D.

The analysis will categorize data to reveal patterns, sentiments, and relationships that are indicative of fraud.

Question 6

Susan, a Certified Fraud Examiner (CFE). is conducting an ad mission-seeking interview of Beth, a fraud suspect. After Susan gave Beth a suitable rationalization for her conduct. Beth continued her denials, giving various alibis. Which of the following would be the LEAST EFFECTIVE technique for Susan to use in this situation?

Options:

A.

Displaying evidence that specifically contradicts Beth's alibis

B.

Discussing some of Beth's prior deceptions

C.

Discussing the testimony of other witnesses

D.

Displaying all the evidence she has against Beth at once

Question 7

Orlando is conducting a fraud examination regarding Fast Freight, a large publicly traded corporation, and wants to find the current officers and directors of the company. Which of the following would be the best source of information for this purpose?

Options:

A.

Commercial filings

B.

Real property records

C.

The company's corporate bylaws

D.

Regulatory securities records

Question 8

In response to an accusation made during an admission-seeking interview, the subject begins to voice a denial to the charge. How should the interviewer react to the first indication of a subject's denial?

Options:

A.

Allow the subject 1o continue denying the charge

B.

Argue the point directly with the subject until a confession is obtained

C.

Remind the subject of the laws against perjury.

D.

Interrupt the denial by using a delaying tactic.

Question 9

Lisa, a fraud examiner at a private company, receives an anonymous call from a potential whistleblower. The whistleblower is hesitant to reveal their identity but will do so if it can be Kept fully confidential. Which of the following statements is MOST ACCURATE?

Options:

A.

Lisa may offer the whistleblower full confidentiality because they are not a suspect

B.

Lisa should explain that she will try her best to keep the whistleblower"s identity confidential.

C.

Lisa should state that she will not be able to keep the whistleblower's identity confidential because all information must be disclosed to management

D.

Lisa may promise the whistleblower full confidentiality, even if she knows her statement is untrue, because the lie is ultimately beneficial to her employer.

Question 10

During an interview, Alex asked a fraud suspect if he could retrieve the suspect's account records from her bank. The suspect said, "yes." but she did not provide consent in writing Although the suspect orally consented, the suspect's bank is NOT required to allow Alex to access the suspect's account records at this point.

Options:

A.

True

B.

False

Question 11

Martin is a fraud examiner. He contacts Dianne for the purpose of conducting a routine, information-gathering interview. Dianne says that she wants her coworker. Sheila, whom Martin also plans to interview, to be present during the interview. Martin should:

Options:

A.

Interview Dianne and Sheila separately

B.

Allow Sheila to be present but only if she does not speak

C.

Interview Dianne and Sheila together by himself

D.

Interview Dianne and Sheila together, but bring in a second interviewer

Question 12

During an interview with Alice, a suspect in an embezzlement case, the interviewer observes several signs of stress in Alice's behavior, such as shifting around in her chair, exhibiting shallow breathing, and occasionally stuttering during her replies. The interviewer should conclude that these symptoms are caused by deception.

Options:

A.

True

B.

False

Question 13

Naveed, a fraud suspect, has decided to make an admission to Omar, a Certified Fraud Examiner (CFE). Which of the following items of information should Omar obtain from Naveed during the verbal admission?

Options:

A.

A general estimate of the amount of money involved in the fraud

B.

Facts about the fraud known to co-conspirators and witnesses

C.

A statement from Naveed indicating that his conduct was an accident

D.

Controls that would have prevented Naveed from committing the fraud

Question 14

Anne used Will as a confidential informant in her investigation Anne listed information provided by Will in her final report, referring to him using his initials. She paid Will in cash and obtained a receipt for the transaction. Which of Anne's methods was NOT considered a best practice when using informants?

Options:

A.

Referring to Will using his initials

B.

Obtaining a receipt from Will

C.

Using information provided by Will in her report

D.

Using cash to pay Will

Question 15

Which of the following is INCORRECT with regard to locating individuals using online records?

Options:

A.

Before engaging in a search the fraud examine' should know the mod powerful and useful '>Des of searches

B.

If an individual has moved, obtaining a past address is usually of no help

C.

Online records are very useful in locating subjects whose whereabouts are unknown

D.

Obtaining a past address of the subject should be the first step in trying to locate a subject using online records.

Question 16

If the following statements were included in a fraud examination report of a qualified expert, which of them would be IMPROPER?

Options:

A.

"When asked a second time about the amount of funds missing, the suspect contradicted their previous testimony."

B.

"The evidence shows that between S1 million and S1.5 million in assets were transferred to an offshore account."

C.

"The organization must address the inadequate separation of accounting duties to prevent such an event from happening again."

D.

"In light of all the evidence, the suspect is most likely guilty of fraud against the organization."

Question 17

Which of the following statements about the limitations of using online databases for public record searches is MOST ACCURATE?

Options:

A.

Public records featured in electronic formats include too much detail to be efficiently analyzed.

B.

Availability of public records through online databases varies widely across jurisdictions.

C.

The public records produced by online database searches rarely contain correct information.

D.

It is very difficult to find a legitimate online database for accessing public records.

Question 18

Caroline, a fraud examiner, is conducting an admission-seeking interview with John, an employee suspected of stealing cash. Which of the following is the MOST effective phrasing for Caroline to use when posing an admission-seeking question to John?

Options:

A.

"Why did you take the money?"

B.

"What do you know about the stolen money?"

C.

"Do you know who took the money''"

D.

"Did you steal the money?"

Question 19

Which of the following is a unique challenge of cloud forensics that is not encountered in traditional forensic practices?

Options:

A.

Lack of corroborating evidence

B.

Lack of data control

C.

Lack of trust from cloud providers

D.

Lack of relevant data

Question 20

Jana. the controller of XYZ Company, notices that the company's hotel expenses increased substantially from the prior year She wants to check to see if this increase is reasonable by comparing hotel expenses from both years to the number of days XYZ"s employees traveled. Which of the following data analysis functions would be the MOST USEFUL in helping Jana analyze these two variables?

Options:

A.

Correlation analysis

B.

Duplicate testing

C.

Verifying multiples of a number

D.

Ben ford’s Law analysis

Question 21

Which of the following statements concerning access to nonpublic records is FALSE?

Options:

A.

When civil litigation has commenced, a party often may obtain a subpoena or legal order for an individual's relevant bank records.

B.

A fraud examiner can request a business's bank records even if the business is not legally obligated to comply.

C.

An audit clause can be designed to allow a party to inspect the books of a business partner or vendor.

D.

During the government's criminal investigation, a fraud examiner not employed by the government has a right to access relevant documents that the government has obtained.

Question 22

The term_____________refers to a process of resolving allegations of fraud from inception to disposition.

Options:

A.

Fraud theory

B.

Forensic investigation

C.

Fraud management

D.

Fraud examination

Question 23

Which of the following is the MOST ACCURATE statement regarding a fraud examiner’s ability to trace cryptocurrency transactions?

Options:

A.

Information about cryptocurrency ownership can sometimes be revealed by analyzing a subject’s bank statements.

B.

Each blockchain transaction contains direct identifying information that can be used to find cryptocurrency users.

C.

Most jurisdictions do not require digital wallet providers to record any personal information about cryptocurrency users.

D.

Most cryptocurrencies rely on private blockchains, which require court orders to obtain transaction information.

Question 24

Which of the following is a reason why a person or organization might engage a fraud examiner to trace illicit transactions?

Options:

A.

A victim of fraud wants to facilitate the recovery of criminal proceeds.

B.

An employer wants to know if an employee is falsifying regulatory reports

C.

An attorney wants to evaluate an expert's financial report

D.

An entity needs to find hidden relationships in big data that otherwise would not be discovered.

Question 25

A fraud examiner believes that a suspect might have used illicit funds to construct a commercial building to fit a restaurant. Which of the following records would be the MOST helpful in confirming the owner of the building?

Options:

A.

Local court records

B.

Commercial filings

C.

Building permit records

D.

Voter registration records

Question 26

An investigator is preparing to administer what is likely to be an intense and extended interview with a fraud suspect. To organize their thoughts prior to the interview, the fraud examiner should:

Options:

A.

Provide the suspect with a list of questions to ensure detailed responses-

B.

Make a list of key points to go over with the respondent.

C.

Develop a list of questions ranked in order of importance.

D.

Memorize a detailed list of questions, but avoid taking a written list to the interview

Question 27

Which of the following types of files is the most difficult to recover during a digital forensic examination?

Options:

A.

Overwritten files

B.

Deleted until

C.

Deleted link (shortcut) files

D.

Hidden files

Question 28

Amanda needs to know the location of the principal office and the date of incorporation of a company she is investigating. Which of the following would be the BEST source of this information?

Options:

A.

The organizational filing with the government of the jurisdiction in which the company is incorporated

B.

The company's income tax filings

C.

The contractual records of any real property owned by the corporation

D.

The comprehensive litigation file in the local court in the jurisdiction in which the company is headquartered

Question 29

Which of the following statements concerning access to nonpublic records is MOST ACCURATE?

Options:

A.

Once a criminal case is filed, all records obtained by the government are considered public records

B.

Nonpublic records cannot be obtained by subpoena or legal order in a civil action

C.

In most junsdictions. banks are allowed to turn over a suspect's account information directly to a fraud victim when there is adequate evidence of wrongdoing.

D.

The government usually will not share nonpublic records with a fraud victim during an investigation into the underlying fraud.

Question 30

Which of the following is an important factor that fraud examiners should consider when determining whether evidence should be disposed of after a fraud examination has concluded?

Options:

A.

Whether the evidence is digital or tangible

B.

Whether further litigation related to the case is likely to occur in the future

C.

Whether a summary of the evidence was included in a fraud examination report

D.

Whether the evidence is direct or circumstantial

Question 31

A law enforcement officer receives a reliable tip from an informant that a government employee is soliciting bribes in exchange for awarding contracts to the employee's agency. To investigate, the officer poses as a potential contractor and contacts the suspect employee about the possibility of getting a contract with the agency. During the conversation, the suspect demands a cash payment for the officer to be considered for upcoming contracts. If the suspect claims entrapment at trial, then which of the following is MOST LIKELY to occur?

Options:

A.

The suspect's claim will succeed because the investigator used deceit

B.

The suspect's claim will succeed because the investigator lacked probable cause

C.

The suspect's claim will fail because the investigator had adequate predication

D.

The suspect's claim will fail because the investigator is a law enforcement agent

Question 32

Which of the following is the MOST APPROPRIATE way to document information obtained from social media sites?

Options:

A.

Save links of the social media postings and pages in a web browser.

B.

Request a copy of the information from the social media platforms.

C.

Conduct a forensic shutdown of a computer to preserve the metadata from the social media sites and profiles visited.

D.

Download and preserve the information from the social media sites so that it can be established as authentic if used in court.

Question 33

Which of the following terms refers to a process of resolving allegations of fraud from inception to disposition?

Options:

A.

Forensic methodology

B.

Fraud theory

C.

Fraud assessment

D.

Fraud examination

Question 34

Nobles, a digital forensic examiner for a government agency, is conducting a criminal investigation of Lucas, a construction company executive, for alleged bribery of foreign officials Nobles obtains a court order authorizing him to seize Lucas's personal computer for forensic examination. Which of the following is the MOST ACCURATE statement?

Options:

A.

If Lucas's computer is running. Nobles may retrieve data from the computer directly via its normal interface 4 the evidence that he needs exists only in the form of volatile data

B.

If Lucas's computer is off and Nobles needs evidence that exists only in the form of volatile data, he should turn the computer on and retrieve data directly via the computer's normal interlace.

C.

If Lucas's computer is off. Nobles should not turn it on unless he plans to use an encryption device that can guarantee that the system's hard drive will not be accessed during startup.

D.

If Lucas's computer is running. Nobles should perform a graceful shutdown by turning it off using the normal shutdown process

Question 35

Which of the following is the MOST ACCURATE statement regarding the analysis phase in digital forensic investigations?

Options:

A.

When analyzing data for evidence, fraud examiners should look for exculpatory evidence But not inculpatory evidence

B.

During the analysis phase, it is best to use just one forensic tool for identifying, extracting, and collecting digital evidence

C.

The primary concern when analyzing digital evidence is to maintain the integrity of the data at all times

D.

The analysis phase of digital forensic investigations should not commence unless it is venfied that the suspect devices do not contain relevant data

Question 36

Which of the following is NOT a step a fraud examiner must take before seizing evidence in a digital forensic investigation?

Options:

A.

Obtain and become familiar with any legal orders that apply to the investigation

B.

Assemble an investigation team comprised only of outside digital forensic experts

C.

Ensure that only trained professionals employ any software used in a forensic capacity

D.

Determine whether there are privacy issues related to the item(s) to be searched.

Question 37

Which of the following statements about fraud response plans is FALSE?

Options:

A.

A fraud response plan outlines the actions an organization will take when suspicions of fraud have arisen.

B.

A fraud response plan should create an environment to minimize risk and maximize the potential for success

C.

A fraud response plan must be simple to understand and administer

D.

A fraud response plan should specify how every fraud examination should be conducted regardless of the type of fraud

Question 38

Barnes, a Certified Fraud Examiner (CFE). is using data analysis to identify anomalies that might indicate fraud in XYZ Company's accounts payable transactions. Which of the following is the MOST EFFECTIVE data analysis function that Barnes could use to look for potential fraud in accounts payable?

Options:

A.

Compare book and tax depreciation and indicate variances

B.

Identify paycheck amounts over a certain limit

C.

Review recurring monthly expenses and compare to posted/paid invoices

D.

All of the above

Question 39

Louis, a Certified Fraud Examiner (CFE). is investigating a potential internal fraud case originating from a whistteblower tip about embezzlement. He discovers that the organization purportedly affected by the embezzlement recorded the tip in a memorandum. Which type of evidence would the memorandum be considered?

Options:

A.

Testimonial evidence

B.

Incriminating evidence

C.

Documentary evidence

D.

Verbal evidence

Question 40

Which of the following types of information would LEAST LIKELY be found when searching external sources without the subject's consent or a legal order?

Options:

A.

A witness's address

B.

Assets owned by a subject

C.

A subject's employee personnel file

D.

A competitor's ownership information

Question 41

Which of the following is TRUE of a follow-up/recommendations section in a written fraud examination report?

Options:

A.

A follow-up/recommendations section is not a required part of every written fraud examination report

B.

A follow-up/recommendations section calculates the amount of loss caused by any misconduct identified during the investigation

C.

A follow-up/recommendations section must include a list of organizational failings that contnbuted to the fraud

D.

All of the above

Question 42

A fraud examiner is based m the United States, a non-European Union (EU) country, and is collecting personal information from their company's human resources (HR) files about an employee based in Spain, an EU country Based on these facts, the fraud examiner would need to comply with the EU's General Data Protection Regulation (GDPR) when conducting their internal investigation.

Options:

A.

True

B.

False

Question 43

Janet suspects that a local restaurant is being used as a front business for a criminal operation. Which of the following types of records would be the MOST LIKELY to help Janet discover who owns the restaurant building?

Options:

A.

Commercial filings

B.

Building permit records

C.

Local court records

D.

Voter registration records

Question 44

Which of the following is the MOST ACCURATE statement regarding the analysis phase in digital forensic investigations?

Options:

A.

The analysis phase of digital forensic investigations should not commence unless it is verified that the suspect devices do not contain relevant data.

B.

During the analysis phase, it is best to use a combination of the various forensic tools that can assist h identifying, extracting, and collecting digital evidence

C.

When analyzing data for evidence, fraud examiners should look for exculpatory evidence but not exculpatory evidence

D.

The primary concern when analyzing digital evidence is to protect the collected information from seizure

Question 45

Delta, an interviewer with little experience, asks Sigma, the respondent, the following question: "Were you aware that the signature was forged, and why didn't you tell anyone earlier?" This kind of question is called a_____________question

Options:

A.

Complex

B.

Controlled answer

C.

Free narrative

D.

Double-negative

Question 46

Tonya, a suspect in a kickback scheme, is being interviewed by Carlos, a fraud examiner. As the interview progresses. Carlos notices that Tonya is exhibiting signs of stress, such as repeatedly touching her face, crossing and uncrossing her legs, and darting her eyes around the room Carlos should conclude that Tonya's behavior is the result of deception

Options:

A.

True

B.

False

Question 47

When documenting interviews, it is best practice for the interviewer to.

Options:

A.

Covertly record all interviews with potential suspects.

B.

Note impressions regarding the subject's guilt or innocence.

C.

Err on the side of taking too few notes rather than too many.

D.

Write down verbatim all the information that the subject provides

Question 48

Which of the following is the MOST ACCURATE statement about the privacy of information shared through social media?

Options:

A.

To access any user-posted information on social media sites, fraud examiners must obtain some type of legal order from the jurisdiction in which the user resides.

B.

A fraud examiner cannot be held liable for violating a user's privacy rights if they hack or break into areas of a social networking site designated as private because all social media information is public.

C.

The Privacy of Social Networks Treaty is a binding international treaty that makes it illegal for law enforcement to seek social media log-in credentials from users.

D.

Hacking or breaking into information on social media sites that is restricted as private could result in liability for fraud examiners due to violation of users' privacy rights.

Question 49

Which of the following data is the MOST DIFFICULT to recover during a digital forensic examination?

Options:

A.

Time and date information about files

B.

Websites visited

C.

Files that have been overwritten

D.

Communications sent via instant messenger

Question 50

Which of the following is considered a best practice for preserving the confidentiality of a fraud investigation?

Options:

A.

Suspend all employees involved in the investigation pending the investigation's outcome.

B.

Ensure that the investigation is conducted at the direction of, or under the supervision of. a government official

C.

Avoid using email or other electronic means to transmit confidential case information

D.

Implement a blanket policy prohibiting all employees from discussing anything related to employee investigations

Question 51

Antonio is the former boyfriend of Hannah, a fraud suspect. He approaches Ashley, a fraud examiner at Hannah's company, and offers to provide critical information about Hannah's fraud in exchange for full confidentiality. Which of the following is the MOST APPROPRIATE response for Ashley to make?

Options:

A.

Ashley should explain that Antonio may have qualified confidentiality but that she cannot make any absolute assurances

B.

Ashley should promise Antonio unqualified confidentiality over all information provided

C.

Ashley should explain that all information must be disclosed to management so nothing Antonio says will be confidential

D.

Ashley should promise Antonio that his identity will not become known.

Question 52

Allison, a Certified Fraud Examiner (CFE). is investigating a potential procurement fraud scheme. While interviewing a subject, she asks. "Why did you choose to do business with that vendor?" This can BEST be described as a(n):

Options:

A.

Open question

B.

Complex question

C.

Leading question

D.

Closed question

Demo: 52 questions
Total 181 questions