Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

CFE-Investigation Certified Fraud Examiner (CFE) - Investigation Questions and Answers

Questions 4

Baker, a Certified Fraud Examiner (CFE). is getting prepared to conduct a lengthy and complex interview. To prepare himself. Baker should:

Options:

A.

Writs down a detailed list of questions in advance

B.

Avoid bringing any notes with him to the interview

C.

Write down key points to go over with the respondent

D.

Take only the documents he wishes to go over

Buy Now
Questions 5

Which of the following statements about fraud response plans is FALSE?

Options:

A.

A fraud response plan outlines the actions an organization will take when suspicions of fraud have arisen.

B.

A fraud response plan should create an environment to minimize risk and maximize the potential for success

C.

A fraud response plan must be simple to understand and administer

D.

A fraud response plan should specify how every fraud examination should be conducted regardless of the type of fraud

Buy Now
Questions 6

Which of the following is NOT true with regard to tracing the disposition of loan proceeds?

Options:

A.

Tracing loan proceeds can determine if the proceeds were deposited into hidden accounts.

B.

Tracing loan proceeds can uncover previously hidden assets

C.

Tracing loan proceeds can determine if hidden accounts were used for loan payments

D.

Tracing loan proceeds can identify the presence of internal control weaknesses.

Buy Now
Questions 7

Butler, a Certified Fraud Examiner (CFE), needs to obtain a copy of a statement that the chief executive officer (CEO) of Accord Investments, a venture capital firm, posted on the firm's website sometime last year. Unfortunately, the quote has been removed from the website. Which of the following resources would be the BEST choice for Butler to consult to find an earlier version of the web page that he needs?

Options:

A.

The invisible archives

B.

The free web

C.

The internet archives

D.

The deep web

Buy Now
Questions 8

Marcus is trying to locate the financial statements of Acme Airlines, a multinational publicly traded corporation. Which of the following sources would be MOST EFFECTIVE for finding this information?

Options:

A.

Commercial filings

B.

Civil litigation records

C.

Organizational filings

D.

Regulatory securities records

Buy Now
Questions 9

Tyson, a fraud examiner, is planning an interview with Brianna. the girlfriend of the central suspect in Tyson's investigation. Previous interviews with others have revealed that Brianna tends to be very protective of her boyfriend How should Tyson approach the interview with Brianna?

Options:

A.

Avoid interviewing Brianna if possible due to Brianna's potential volatility.

B.

Conduct the interview with as little notice as possible so Brianna will be unprepared

C.

Provide Brianna with advance notice prior to the interview to inhibit resentment.

D.

Ask Brianna when she would prefer to be interviewed in an effort to provoke cooperation.

Buy Now
Questions 10

Which of the following is the MOST ACCURATE statement about the privacy of information shared through social media?

Options:

A.

To access any user-posted information on social media sites, fraud examiners must obtain some type of legal order from the jurisdiction in which the user resides.

B.

A fraud examiner cannot be held liable for violating a user's privacy rights if they hack or break into areas of a social networking site designated as private because all social media information is public.

C.

The Privacy of Social Networks Treaty is a binding international treaty that makes it illegal for law enforcement to seek social media log-in credentials from users.

D.

Hacking or breaking into information on social media sites that is restricted as private could result in liability for fraud examiners due to violation of users' privacy rights.

Buy Now
Questions 11

Which of the following is a recommended strategy when conducting admission-seeking interviews?

Options:

A.

Increase sympathy while downplaying implications of wrongdoing.

B.

Ensure that accusations are made in the presence of a third party to avoid potential liability

C.

Emphasize a lack of morality in the subject's actions to induce them into confessing.

D.

Use time constraints as a means to pressure the subject into making a confession.

Buy Now
Questions 12

Which of the following is a reason why a person or organization might engage a fraud examiner to trace illicit transactions?

Options:

A.

A victim of fraud wants to facilitate the recovery of criminal proceeds.

B.

An employer wants to know if an employee is falsifying regulatory reports

C.

An attorney wants to evaluate an expert's financial report

D.

An entity needs to find hidden relationships in big data that otherwise would not be discovered.

Buy Now
Questions 13

Jackson, a digital forensic examiner for a government agency, is conducting a criminal investigation into the alleged embezzlement of funds from the government's Welfare Department (WD). Ginny. a WD employee, is the prime suspect. Jackson obtains a court order authorizing him to seize Ginny's personal computer for forensic examination. Which of the following is the MOST ACCURATE statement?

Options:

A.

If Ginny's computer is running. Jackson should perform a graceful shutdown by turning it off using the normal shutdown process

B.

If Ginny’s computer is off and Jackson needs evidence that exists only in the form of volatile data, he should turn the computer on and retrieve data directly via the computer's normal interface.

C.

If Ginny's computer is off. Jackson should not turn it on unless he plans to use an encryption device that can guarantee that the system's hard drive will not be accessed during startup.

D.

If Ginny's computer is running. Jackson may retrieve data from the computer directly via its normal interface if the evidence that he needs exists only in the form of volatile data

Buy Now
Questions 14

Management at Oak Company has asked Arthur, an internal auditor, to implement a data analysis program to search for warning signs of potential fraud within the company. Which of the following steps should Arthur conduct first to MOST effectively use data analysis techniques for such an initiative?

Options:

A.

Analyze the data.

B.

Cleanse and normalize the data

C.

Build a profile of potential frauds.

D.

Obtain the data.

Buy Now
Questions 15

Which of the following is a unique challenge of cloud forensics that is not encountered in traditional forensic practices?

Options:

A.

Lack of corroborating evidence

B.

Lack of data control

C.

Lack of trust from cloud providers

D.

Lack of relevant data

Buy Now
Questions 16

Vishal, a Certified Fraud Examiner (CFE). has just initiated an interview with Steve, a fraud suspect. After a short introduction. Vishal jokes about the fact that he and Steve are wearing the same tie and then proceeds to ask Steve about the previous night's major sporting event Vishal is attempting to

Options:

A.

Establish the interview theme

B.

Condition the witness.

C.

Establish rapport

D.

Exhibit passive listening.

Buy Now
Questions 17

After completing all necessary investigative steps. Erica, a Certified Fraud Examiner (CFE), is reasonably sure that Justine, her primary suspect, committed the fraud in question. Before scheduling an admission-seeking interview with Justine, what else should Erica be reasonably sure of?

Options:

A.

That Justine will confess to the accusation when prompted

B.

That Justine's employer will take disciplinary action against Justine if she confesses

C.

That the interview's time, place, and content can De controlled

D.

That no other person was involved in the fraud n question

Buy Now
Questions 18

Which of the following sources of information is usually considered to be the MOST IMPORTANT in tracing a subject's assets?

Options:

A.

Credit card statements

B.

PaystuDs

C.

Surveillance footage

D.

Financial institution records

Buy Now
Questions 19

Antonio is the former boyfriend of Hannah, a fraud suspect. He approaches Ashley, a fraud examiner at Hannah's company, and offers to provide critical information about Hannah's fraud in exchange for full confidentiality. Which of the following is the MOST APPROPRIATE response for Ashley to make?

Options:

A.

Ashley should explain that Antonio may have qualified confidentiality but that she cannot make any absolute assurances

B.

Ashley should promise Antonio unqualified confidentiality over all information provided

C.

Ashley should explain that all information must be disclosed to management so nothing Antonio says will be confidential

D.

Ashley should promise Antonio that his identity will not become known.

Buy Now
Questions 20

Al needs to know the location of the principal office and the initial shareholders of a company he is investigating. Which of the following would be the BEST source of this reformation?

Options:

A.

The organizational filings with the government of the jurisdiction in which the company is incorporated

B.

The contractual documents regarding real properly owned by the corporation

C.

The utility records in the municipality where the corporation has its principal office

D.

The shareholder data form filed with the World Bank

Buy Now
Questions 21

Which of the following is one of the purposes of closing questions in a routine interview?

Options:

A.

To close the interview positively and maintain goodwill

B.

To assess whether the subject is ready to confess

C.

To confirm the credibility of the witness being interviewed

D.

To reduce testimony to a signed, written statement

Buy Now
Questions 22

Martin is a fraud examiner. He contacts Dianne for the purpose of conducting a routine, information-gathering interview. Dianne says that she wants her coworker. Sheila, whom Martin also plans to interview, to be present during the interview. Martin should:

Options:

A.

Interview Dianne and Sheila separately

B.

Allow Sheila to be present but only if she does not speak

C.

Interview Dianne and Sheila together by himself

D.

Interview Dianne and Sheila together, but bring in a second interviewer

Buy Now
Questions 23

The term_____________refers to a process of resolving allegations of fraud from inception to disposition.

Options:

A.

Fraud theory

B.

Forensic investigation

C.

Fraud management

D.

Fraud examination

Buy Now
Questions 24

Which of the following is a factor that fraud examiners should consider when determining whether to dispose of evidence following the conclusion of a fraud examination?

Options:

A.

Whether the information was presented by a lay witness or an expert witness

B.

Whether the evidence is documentary or testimonial

C.

Whether the evidence is direct or circumstantial

D.

Whether the organization has a general document retention policy in place

Buy Now
Questions 25

Marilyn, a Certified Fraud Examiner (CFE). is reasonably sure that Shelly, her primary suspect, committed the fraud in question Before scheduling an admission-seeking interview with Shelly. Marilyn should be reasonably sure of all of the following EXCEPT:

Options:

A.

That all reasonable investigative steps have been taken

B.

That the interview's time and location can be controlled

C.

That no other person was involved in the fraud in question

D.

That the interview's subject matter can be controlled

Buy Now
Exam Code: CFE-Investigation
Exam Name: Certified Fraud Examiner (CFE) - Investigation
Last Update: Nov 28, 2024
Questions: 170

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now CFE-Investigation testing engine

PDF (Q&A)

$36.75  $104.99
buy now CFE-Investigation pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 04 Dec 2024