Which of the following data is the MOST DIFFICULT to recover during a digital forensic examination?
The term_____________refers to a process of resolving allegations of fraud from inception to disposition.
Arnold, a Certified Fraud Examiner (CFE) for Integra Wealth, learns that Elizabeth, an accounts payable clerk, recently purchased an expensive ski boat Arnold also knows that Elizabeth recently purchased a vacation home on a nearby lake Arnold has sufficient predication to:
Which of the following is a reason why a subject's credit card records are useful in tracing investigations?
Leslie, a fraud examiner for ACME Corporation, suspects that a salesperson for another company has defrauded ACME. Leslie wants to obtain a copy of the suspect individual's credit report and personal data from a third-party information broker If Leslie works in a jurisdiction that regulates the distribution of personal credit information, she generally can obtain the information if she has the consent of the individual.
Louis, a Certified Fraud Examiner (CFE). is investigating a potential internal fraud case originating from a whistteblower tip about embezzlement. He discovers that the organization purportedly affected by the embezzlement recorded the tip in a memorandum. Which type of evidence would the memorandum be considered?
Which of the following is the MOST ACCURATE statement about imaging suspect computers' hard drives?
Smith, a Certified Fraud Examiner (CFE) for the Ajax Co.. observes Jones, an accounts payable clerk, driving an expensive sports car to work. Smith also has knowledge that Jones recently had extensive remodeling done on her residence. Smith has sufficient predication to:
Which of the following is NOT one of the main limitations of conducting a search for public records using online databases?
Which of the following statements is MOST ACCURATE regarding how a fraud examiner should prepare for an interview with a subject from a different jurisdiction?
Thea is conducting a fraud examination for a company and suspects one of the company's vendors (a one-person operation) of fraudulent billing. Thea wants to obtain a copy of the suspect individual's credit report and personal data from a third-party information broker. If Thea works in a jurisdiction that regulates the distribution of personal credit information, she cannot obtain the suspect's personal credit data under any circumstances.
Which of the following situations would probably NOT require access to nonpublic records to develop evidence?
Which of the following is the MOST IMPORTANT question for a fraud examiner to ask before commencing a legal action to recover assets?
Which of the following statements concerning a well-written fraud examination report is MOST ACCURATE?
Which of the following is the MOST APPROPRIATE measure when seeking to avoid alerting suspected perpetrators who are under investigation?
Which of the following would be most useful in determining when a specific document file was created?
Which of the following statements would be IMPROPER if included in the fraud examination report of a Certified Fraud Examiner (CFE» who is also qualified as an accounting expert?
Which of the following types of data is BEST suited for a BenfordTs Law analysis?
When planning for the interview phase of an investigation, which of the following steps should NOT be taken by the fraud examiner?
Which of the following can be obtained from a wire transfer record?
A fraud examiner believes that a suspect might have used illicit funds to construct a commercial building to fit a restaurant. Which of the following records would be the MOST helpful in confirming the owner of the building?
Management at First Choice Inc. suspects that Nathan, its chief financial officer (CFO), has been embezzling funds. It hires Reina. a Certified Fraud Examiner (CFE), to investigate the matter When conducting the fraud examination. Reina should proceed as though;
Which of the following BEST describes the data analytics approach known as predictive analytics?
Which of the following questions would be MOST EFFECTIVE when establishing a baseline during an interview?
Which of the following sources of information is usually considered to be the MOST IMPORTANT in tracing a subject's assets?
Which of the following is a common method that fraudsters use to hide their ill-gotten gains?
If you are seizing a computer for forensic analysis, why is it generally necessary to seize any copiers connected to it?
Rachel, a fraud suspect, has decided to confess to Linda, a Certified Fraud Examiner (CFE). In obtaining a verbal confession from Rachel. Linda should obtain all of the following items of information EXCEPT:
Tonya, a suspect in a kickback scheme, is being interviewed by Carlos, a fraud examiner. As the interview progresses. Carlos notices that Tonya is exhibiting signs of stress, such as repeatedly touching her face, crossing and uncrossing her legs, and darting her eyes around the room Carlos should conclude that Tonya's behavior is the result of deception
John, a fraud investigator, is interviewing Mary, who he suspects has been embezzling company funds. Which of the following is the recommended approach John should use to ask Mary questions?
Vishal, a Certified Fraud Examiner (CFE). has just initiated an interview with Steve, a fraud suspect. After a short introduction. Vishal jokes about the fact that he and Steve are wearing the same tie and then proceeds to ask Steve about the previous night's major sporting event Vishal is attempting to
Which of the following statements about how fraud examiners should approach fraud examinations is FALSE?
Management at Oak Company has asked Arthur, an internal auditor, to implement a data analysis program to search for warning signs of potential fraud within the company. Which of the following steps should Arthur conduct first to MOST effectively use data analysis techniques for such an initiative?
Butler, a Certified Fraud Examiner (CFE), needs to obtain a copy of a statement that the chief executive officer (CEO) of Accord Investments, a venture capital firm, posted on the firm's website sometime last year. Unfortunately, the quote has been removed from the website. Which of the following resources would be the BEST choice for Butler to consult to find an earlier version of the web page that he needs?
Pedro, a Certified Fraud Examiner (CFE). is conducting an admission-seeking interview of Manuel, a fraud suspect. After Pedro diffused Manuel's alibis. Manuel became withdrawn and stowty began to slouch m his chair, bowing his head and beginning to cry. What should Pedro do now?
Shane, a Certified Fraud Examiner (CFE). is investigating Larsen. who is active on various social networking sites. Shane wants to search and extract information from Larson's social media postings so that it can be used in court as evidence Which of the following is the MOST ACCURATE statement regarding what Shane should do when conducting a social media investigation of Larsen?
Andrew wants to use a confidential informant in his investigation. He plans to compensate the informant with cash and obtain a receipt. He also plans to identify his source in a memorandum and his final report using only the informant's initials. Which of Andrew's plans is NOT considered a best practice when using an informant?
Which of the following questions would be most effective when starting the calibration process during an interview?
Which of the following statements about fraud response plans is FALSE?
A fraud examiner contacts a witness regarding an interview. If the respondent says. ‘I’m too busy." how should the fraud examiner react?
Which of the following is the MOST ACCURATE statement regarding a fraud examiner's ability to trace cryptocurrency transactions?
Which of the following types of files is the most difficult to recover during a digital forensic examination?
A fraud examiner is based in Mexico, a non-European Union (EU) country, and is collecting personal information from their company's human resources (HR) files about an employee based in Germany, an EU country. Based on these facts, the fraud examiner would need to comply with the EU"s General Data Protection Regulation (GDPR) when conducting their internal investigation.
Which of the following statements concerning access to nonpublic records is FALSE?
Sarah is conducting an admission-seeking interview of a suspect. Throughout the interview, the suspect makes little eye contact with Sarah. Based on this information atone, can Sarah conclude that the suspect is being deceptive?
Jana. the controller of XYZ Company, notices that the company's hotel expenses increased substantially from the prior year She wants to check to see if this increase is reasonable by comparing hotel expenses from both years to the number of days XYZ"s employees traveled. Which of the following data analysis functions would be the MOST USEFUL in helping Jana analyze these two variables?
Which of the following is a factor that fraud examiners should consider when determining whether to dispose of evidence following the conclusion of a fraud examination?
Barnes, a Certified Fraud Examiner (CFE). is using data analysis to identify anomalies that might indicate fraud in XYZ Company's accounts payable transactions. Which of the following is the MOST EFFECTIVE data analysis function that Barnes could use to look for potential fraud in accounts payable?