Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

CFE-Investigation Questions and Answers

Question # 6

Which of the following is considered a best practice for preserving the confidentiality of a fraud investigation?

A.

Suspend all employees involved in the investigation pending the investigation's outcome.

B.

Ensure that the investigation is conducted at the direction of, or under the supervision of. a government official

C.

Avoid using email or other electronic means to transmit confidential case information

D.

Implement a blanket policy prohibiting all employees from discussing anything related to employee investigations

Full Access
Question # 7

Which of the following types of information would LEAST LIKELY be found when searching external sources without the subject's consent or a legal order?

A.

A witness's address

B.

Assets owned by a subject

C.

A subject's employee personnel file

D.

A competitor's ownership information

Full Access
Question # 8

Mila. a Certified Fraud Examiner (CFE). needs to obtain court records and wants to be as sure as possible that the records are accurate In most countries, the most reliable way lo obtain these documents is to obtain them directly from the court authorities.

A.

True

B.

False

Full Access
Question # 9

Marcus is trying to locate the financial statements of Acme Airlines, a multinational publicly traded corporation. Which of the following sources would be MOST EFFECTIVE for finding this information?

A.

Commercial filings

B.

Civil litigation records

C.

Organizational filings

D.

Regulatory securities records

Full Access
Question # 10

If you are seizing a computer for forensic analysis, why is it generally necessary to seize any copiers connected to it?

A.

Many copiers connect via parallel cables, which store and transmit copy job data.

B.

Most copiers store, process, and transmit data m a cloud environment

C.

Many copiers have internal hard drives that might contain information relevant to a fraud examination

D.

Most copiers today are nonimpact copiers, meaning that they store copied images indefinitely.

Full Access
Question # 11

Which of the following is TRUE of a follow-up/recommendations section in a written fraud examination report?

A.

A follow-up recommendations section is a required part of every written fraud examination report

B.

A follow-up/recommendations section calculates the amount of fraud-related loss sustained by the organization

C.

A follow-up/recommendations section should state remedial measures for the organization to undertake

D.

All of the above

Full Access
Question # 12

Tyson, a fraud examiner, is planning an interview with Brianna. the girlfriend of the central suspect in Tyson's investigation. Previous interviews with others have revealed that Brianna tends to be very protective of her boyfriend How should Tyson approach the interview with Brianna?

A.

Avoid interviewing Brianna if possible due to Brianna's potential volatility.

B.

Conduct the interview with as little notice as possible so Brianna will be unprepared

C.

Provide Brianna with advance notice prior to the interview to inhibit resentment.

D.

Ask Brianna when she would prefer to be interviewed in an effort to provoke cooperation.

Full Access
Question # 13

If your suspect is spending suspected illicit funds on consumables (e.g.. travel and entertainment) and you need to prove their illicit income circumstantially, which of the following methods of tracing assets would yield the BEST result?

A.

expenditures method

B.

The consumables method

C.

The income method

D.

The asset method

Full Access
Question # 14

Management at Oak Company has asked Arthur, an internal auditor, to implement a data analysis program to search for warning signs of potential fraud within the company. Which of the following steps should Arthur conduct first to MOST effectively use data analysis techniques for such an initiative?

A.

Analyze the data.

B.

Cleanse and normalize the data

C.

Build a profile of potential frauds.

D.

Obtain the data.

Full Access
Question # 15

Talia has been hired by SBS Inc. to implement a new data analysis program to search for warning signs of potential fraud within the company. Which of the following steps should Talia conduct first to MOST EFFECTIVELY use data analysis techniques for such an initiative?

A.

Build a profile of potential frauds.

B.

Monitor the data.

C.

Cleanse and normalize the data.

D.

Identify the relevant data

Full Access
Question # 16

Janet suspects that a local restaurant is being used as a front business for a criminal operation. Which of the following types of records would be the MOST LIKELY to help Janet discover who owns the restaurant building?

A.

Commercial filings

B.

Building permit records

C.

Local court records

D.

Voter registration records

Full Access
Question # 17

Which of the following statements is MOST ACCURATE regarding how a fraud examiner should prepare for an interview with a subject from a different jurisdiction?

A.

Failing to observe cultural norms is not a concern if the interviewer is from a different country than the interviewee.

B.

Consulting with legal counsel is only necessary when an investigation spans multiple

C.

A fraud examiner should find out whether the interviewee can insist upon the presence of a legal representative

D.

A fraud examiner does not need to research cultural considerations such as appropriate greetings and eye contact.

Full Access
Question # 18

Which of the following statements about the process of obtaining a verbal confession is NOT true?

A.

The transition from the accusation to the confession should occur when the accused supplies the first detailed information about the offense.

B.

Fraudsters tend to overestimate the amount of funds involved in the offense to relieve themselves of the guilt of their dishonest actions.

C.

If the subject lies about an aspect of the offense in the process of confessing, it is best to proceed initially as if the falsehood has been accepted as truth.

D.

The three general approaches to obtaining a verbal confession are chronologically, by transaction, or by event.

Full Access
Question # 19

Beta, a Certified Fraud Examiner (CFE). is conducting an admission-seeking interview of Delta, a fraudsuspect. In establishing a rationalization. Beta says to Delta. "I know you didn't do this for yourself: it was for your family." This technique seeks to establish rationalization by:

A.

Reducing Delta's stress about possibly being fired

B.

Claiming Delta's action was for altruistic reasons

C.

Reducing Delta's perception of the legal seriousness of the matter

D.

Establishing that Delta's family was being treated unfairly

Full Access
Question # 20

Which of the following is NOT a best practice for obtaining a signed statement?

A.

Add subsequent facts to the statement as an addendum.

B.

Have the suspect write out the entire statement in their own handwriting

C.

Prepare separate statements for unrelated offenses

D.

Have two individuals witness the signing of the document when possible.

Full Access
Question # 21

Nobles, a digital forensic examiner for a government agency, is conducting a criminal investigation of Lucas, a construction company executive, for alleged bribery of foreign officials Nobles obtains a court order authorizing him to seize Lucas's personal computer for forensic examination. Which of the following is the MOST ACCURATE statement?

A.

If Lucas's computer is running. Nobles may retrieve data from the computer directly via its normal interface 4 the evidence that he needs exists only in the form of volatile data

B.

If Lucas's computer is off and Nobles needs evidence that exists only in the form of volatile data, he should turn the computer on and retrieve data directly via the computer's normal interlace.

C.

If Lucas's computer is off. Nobles should not turn it on unless he plans to use an encryption device that can guarantee that the system's hard drive will not be accessed during startup.

D.

If Lucas's computer is running. Nobles should perform a graceful shutdown by turning it off using the normal shutdown process

Full Access
Question # 22

Sylvia, a novice interviewer, asks Adam, the respondent, the following question: "Didn't you know that something wasn't right?" This kind of question is called a_____________question.

A.

Double-negative

B.

Free narrative

C.

Controlled answer

D.

Complex

Full Access
Question # 23

Which of the following questions is MOST HELPFUL for fraud examiners to ask themselves when determining the legality of electronically recording a conversation?

A.

"Can the recording include both audio and video?

B.

"Will the recording equipment produce a digital file?"

C.

"Will the recorded conversation take place before or after work?"

D.

"How long is the anticipated recording expected to last?"

Full Access
Question # 24

Tonya, a suspect in a kickback scheme, is being interviewed by Carlos, a fraud examiner. As the interview progresses. Carlos notices that Tonya is exhibiting signs of stress, such as repeatedly touching her face, crossing and uncrossing her legs, and darting her eyes around the room Carlos should conclude that Tonya's behavior is the result of deception

A.

True

B.

False

Full Access
Question # 25

Martin is a fraud examiner. He contacts Dianne for the purpose of conducting a routine, information-gathering interview. Dianne says that she wants her coworker. Sheila, whom Martin also plans to interview, to be present during the interview. Martin should:

A.

Interview Dianne and Sheila separately

B.

Allow Sheila to be present but only if she does not speak

C.

Interview Dianne and Sheila together by himself

D.

Interview Dianne and Sheila together, but bring in a second interviewer

Full Access
Question # 26

When documenting interviews, it is best practice for the interviewer to.

A.

Covertly record all interviews with potential suspects.

B.

Note impressions regarding the subject's guilt or innocence.

C.

Err on the side of taking too few notes rather than too many.

D.

Write down verbatim all the information that the subject provides

Full Access
Question # 27

Which of the following is the MOST ACCURATE statement regarding a fraud examiner's ability to trace cryptocurrency transactions?

A.

Each Blockchain transaction contains a user's cryptographic address, which can help identify patterns that might link the user to criminal activity.

B.

Most jurisdictions do not require digital wallet providers to record any personal information about cryptocurrency users

C.

Cryptocurrency ownership cannot be determined through an analysis of details on a subject's bank statements.

D.

Most cryptocurrencies rely on private block chains, which allow users' transactions to be completely anonymous and therefore difficult to trace.

Full Access
Question # 28

Which of the following is the MOST IMPORTANT question for a fraud examiner to ask before commencing a legal action to recover assets?

A.

"Has the defendant been previously arrested for allegedly committing a white-collar crime?"

B.

"Does the defendant have sufficient property or money to satisfy a money judgment?"

C.

"Is there a relevant statute of limitations?"

D.

"Is the suspect guilty of the fraudulent act?"

Full Access
Question # 29

Marilyn, a Certified Fraud Examiner (CFE). is reasonably sure that Shelly, her primary suspect, committed the fraud in question Before scheduling an admission-seeking interview with Shelly. Marilyn should be reasonably sure of all of the following EXCEPT:

A.

That all reasonable investigative steps have been taken

B.

That the interview's time and location can be controlled

C.

That no other person was involved in the fraud in question

D.

That the interview's subject matter can be controlled

Full Access
Question # 30

Nathaniel, a Certified Fraud Examiner (CFE). is investigating an alleged inventory theft scheme. While interviewing a subject, he asks, "When were you promoted to manager of the department?" This can BEST be described as a(n):

A.

Leading question

B.

Open question

C.

Complex question

D.

Closed question

Full Access
Question # 31

Which of the following is TRUE of a well-written fraud examination report?

A.

The details of witness interviews should be reported in a separate memorandum.

B.

The report should discuss only the evidence that substantiates the fraud allegation

C.

All information provided by witnesses, regardless of relevance, should be included in the report.

D.

Technical terms should be included whenever possible to convey professionalism.

Full Access
Question # 32

Anne used Will as a confidential informant in her investigation Anne listed information provided by Will in her final report, referring to him using his initials. She paid Will in cash and obtained a receipt for the transaction. Which of Anne's methods was NOT considered a best practice when using informants?

A.

Referring to Will using his initials

B.

Obtaining a receipt from Will

C.

Using information provided by Will in her report

D.

Using cash to pay Will

Full Access
Question # 33

Sam needs to obtain the most accurate court records possible in a particular jurisdiction concerning a fraud suspect. The BEST place for Sam to look is a global database that compiles court cases from various jurisdictions

A.

True

B.

False

Full Access
Question # 34

Scarlett, a Certified Fraud Examiner (CFE). is assigned to the internal audit department of the ABC Company. She is getting ready to conduct an interview with another company employee who might be involved in a fraud. Which of the following is the MOST APPROPRIATE introduction for Scarlett to use with the employee?

A.

"Hello, my name is Scarlett, and I'm with the ABC Company."

B.

"Hello, my name is Scarlett. I'm an auditor with the ABC Company."

C.

"Hello, my name is Scarlett. I'm a Certified Fraud Examiner and an auditor with the ABC Company."

D.

"Hello, my name is Scarlett. I'm a Certified Fraud Examiner with the ABC Company."

Full Access
Question # 35

Bobbie, a fraud examiner, is preparing to interview Craig, a close friend and coworker of the primary suspect in the case. Craig has been described by others as "easily angered" and "intense" How should Bobbie approach her interview of Craig?

A.

Provide Craig with plenty of notice prior to the interview to not provoke resentment

B.

Conduct the interview with as little notice as possible so Craig will be unprepared

C.

Ask Craig when ho would prefer to be interviewed in an effort to engender cooperation

D.

Avoid interviewing Craig if possible due to Craig's potential volatility

Full Access
Question # 36

Charles, a fraud examiner, accuses George of fraud during an admission-seeking interview. George immediately denies the charge How should Charles respond to George's denial?

A.

Counter the denial by arguing with George until further denials are futile

B.

Use a delaying tactic to interrupt the denial

C.

Remind George he has to tell the truth or face perjury.

D.

Allow George to continue denying the charge.

Full Access
Question # 37

Which of the following is a common method that fraudsters use to hide their ill-gotten gains?

A.

Purchasing a used vehicle

B.

Creating a will to allocate assets at death

C.

Placing assets in probate

D.

Transferring assets into foreign trusts

Full Access
Question # 38

In response to an accusation made during an admission-seeking interview, the subject begins to voice a denial to the charge. How should the interviewer react to the first indication of a subject's denial?

A.

Allow the subject 1o continue denying the charge

B.

Argue the point directly with the subject until a confession is obtained

C.

Remind the subject of the laws against perjury.

D.

Interrupt the denial by using a delaying tactic.

Full Access
Question # 39

Which of the following is INCORRECT with regard to locating individuals using online records?

A.

Before engaging in a search the fraud examine' should know the mod powerful and useful '>Des of searches

B.

If an individual has moved, obtaining a past address is usually of no help

C.

Online records are very useful in locating subjects whose whereabouts are unknown

D.

Obtaining a past address of the subject should be the first step in trying to locate a subject using online records.

Full Access
Question # 40

When documenting interviews, it is BEST practice for the interviewer to:

A.

Document notes for each interview separately, nduding those for electronic recordings.

B.

Write down verbatim all of (he information that the subject provides during the interview

C.

Err on the side of taking too many notes rather than too few.

D.

Note impressions regarding the subject's guilt or innocence.

Full Access
Question # 41

Which of the following is a factor that fraud examiners should consider when determining whether to dispose of evidence following the conclusion of a fraud examination?

A.

Whether the information was presented by a lay witness or an expert witness

B.

Whether the evidence is documentary or testimonial

C.

Whether the evidence is direct or circumstantial

D.

Whether the organization has a general document retention policy in place

Full Access
Question # 42

Jana. the controller of XYZ Company, notices that the company's hotel expenses increased substantially from the prior year She wants to check to see if this increase is reasonable by comparing hotel expenses from both years to the number of days XYZ"s employees traveled. Which of the following data analysis functions would be the MOST USEFUL in helping Jana analyze these two variables?

A.

Correlation analysis

B.

Duplicate testing

C.

Verifying multiples of a number

D.

Ben ford’s Law analysis

Full Access
Question # 43

Naveed, a fraud suspect, has decided to confess to Omar, a Certified Fraud Examiner (CFE). In obtaining a verbal confession from Naveed. Omar should obtain all of the following items of information EXCEPT:

A.

A general estimate of the amount of money involved

B.

The approximate number of instances

C.

The location of any residual assets

D.

A statement from Naveed that his conduct was an accident

Full Access
Question # 44

Which of the following is NOT true about observing the reactions of interview subjects?

A.

The interpretation of an interview subject's reactions requires specific skills on the part of the interviewer.

B.

The observation of a subjects body language is often just as important as the observation of the words used by the subject.

C.

Emotive words should be used early in the interview to observe the respondents emotional reaction.

D.

To effectively observe reactions, an interviewer should move from less sensitive to more sensitive questions as the interview progresses.

Full Access
Question # 45

Which of the following statements is MOST ACCURATE regarding covert operations?

A.

Fraud examiners should conduct coven operations only after attempting conventional methods of evidence-gathering

B.

Mistakes in covert operations generally do not cause damage to their associated investigations

C.

Covert operations rarely prove beneficial to investigations even when planned properly.

D.

Most jurisdictions provide protections for investigators conducting covert operations that shield them from reputational, financial, and legal consequences.

Full Access
Question # 46

Christopher, a fraud examiner, is conducting an admission-seeking interview with Jennifer, an employee suspected of stealing cash. Which of the following is the LEAST EFFECTIVE phrasing for Christopher to use when posing an admission-seeking question to Jennifer?

A.

"Did you steal the money?"

B.

'What did you do with the money?"

C.

"Why did you take the money?"

D.

"How much of the money do you have left?"

Full Access
Question # 47

Which of the following statements would be IMPROPER if included in the fraud examination report of a Certified Fraud Examiner (CFE» who is also qualified as an accounting expert?

A.

"The company's internal controls were wholly inadequate to prevent this type of violation and should be remediated at the earliest possible time."

B.

"The evidence shows that expenses in excess of $5 million were omitted from the company's financial statements "

C.

"Based on statements the suspect made to me. it is my assessment that the suspect has a dishonest disposition."

D.

"From my examination, it appears that the company's financial statements were not presented in accordance with generally accepted accounting principles "

Full Access
Question # 48

Jason is an investigator who is conducting an interview with Dina. a fraud suspect. After introducing himself. Jason attempts to be amiable by asking about Dina's favorite sports team and complimenting her eyeglass frames. Jason is attempting to:

A.

Establish the interview theme.

B.

Establish rapport.

C.

Calibrate the witness.

D.

Exhibit passive listening

Full Access
Question # 49

Which of the following BEST describes the data analytics approach known as predictive analytics?

A.

The employment of a learning algorithm that identifies similarities, patterns, or anomalies within a data set on its own, without human involvement

B.

The configuration of a business program to emulate and integrate the actions of a human to execute certain business processes thus increasing efficiency and automating repetitive manual tasks

C.

The use of historical data, along with analyses, statistics, and machine learning components, to build a mathematical model that captures important trends and creates a quantitative forecast

D.

The use of layered artificial neural networks to accommodate more data and more sophisticated algorithms to identify complex patterns

Full Access
Question # 50

Jackson, a digital forensic examiner for a government agency, is conducting a criminal investigation into the alleged embezzlement of funds from the government's Welfare Department (WD). Ginny. a WD employee, is the prime suspect. Jackson obtains a court order authorizing him to seize Ginny's personal computer for forensic examination. Which of the following is the MOST ACCURATE statement?

A.

If Ginny's computer is running. Jackson should perform a graceful shutdown by turning it off using the normal shutdown process

B.

If Ginny’s computer is off and Jackson needs evidence that exists only in the form of volatile data, he should turn the computer on and retrieve data directly via the computer's normal interface.

C.

If Ginny's computer is off. Jackson should not turn it on unless he plans to use an encryption device that can guarantee that the system's hard drive will not be accessed during startup.

D.

If Ginny's computer is running. Jackson may retrieve data from the computer directly via its normal interface if the evidence that he needs exists only in the form of volatile data

Full Access
Question # 51

If an important witness becomes hostile and argumentative during an interview, the interviewer should generally.

A.

Avoid reacting to the witness.

B.

Refute the witness's arguments

C.

Try to reason with the witness

D.

Terminate the interview.

Full Access