New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

CFE-Investigation Questions and Answers

Question # 6

Tonya, a suspect in a kickback scheme, is being interviewed by Carlos, a fraud examiner. As the interview progresses. Carlos notices that Tonya is exhibiting signs of stress, such as repeatedly touching her face, crossing and uncrossing her legs, and darting her eyes around the room Carlos should conclude that Tonya's behavior is the result of deception

A.

True

B.

False

Full Access
Question # 7

Beta, a Certified Fraud Examiner (CFE). is conducting an admission-seeking interview of Gamma, a fraud suspect. After Beta gave Gamma an appropriate rationalization for his conduct, Gamma continued his denials, giving various alibis. These alibis can usually be diffused by all of the following techniques EXCEPT:

A.

Discussing the testimony of witnesses

B.

Displaying physical evidence

C.

Discussing Gamma's prior deceptions

D.

Downplaying the strength of the evidence

Full Access
Question # 8

Which of the following is TRUE of a follow-up/recommendations section in a written fraud examination report?

A.

A follow-up/recommendations section is not a required part of every written fraud examination report

B.

A follow-up/recommendations section calculates the amount of loss caused by any misconduct identified during the investigation

C.

A follow-up/recommendations section must include a list of organizational failings that contnbuted to the fraud

D.

All of the above

Full Access
Question # 9

Which of the following statements is MOST ACCURATE regarding how a fraud examiner should prepare for an interview with a subject from a different jurisdiction?

A.

A fraud examiner does not need to research cultural considerations such as personal space and eye contact.

B.

A fraud examiner should find out whether there are limitations on the use of information obtained during an interview

C.

Failing to observe cultural norms is not a concern if the interviewer is from a different country than the interviewee

D.

Consulting with legal counsel is only necessary when an investigation spans multiple junsdictions

Full Access
Question # 10

Jason is an investigator who is conducting an interview with Dina. a fraud suspect. After introducing himself. Jason attempts to be amiable by asking about Dina's favorite sports team and complimenting her eyeglass frames. Jason is attempting to:

A.

Establish the interview theme.

B.

Establish rapport.

C.

Calibrate the witness.

D.

Exhibit passive listening

Full Access
Question # 11

When planning for the interview phase of an investigation, which of the following steps should NOT be taken by the fraud examiner?

A.

Consider what the interview is intended to accomplish and state an objective.

B.

Review the case file to ensure that important information has not been overlooked

C.

Prepare a detailed list of questions to ask the subject during the interview.

D.

Ensure that the interview is held in a venue where the subject will feel Uncomfortable

Full Access
Question # 12

Which of the following statements is MOST ACCURATE regarding covert operations?

A.

Fraud examiners should conduct coven operations only after attempting conventional methods of evidence-gathering

B.

Mistakes in covert operations generally do not cause damage to their associated investigations

C.

Covert operations rarely prove beneficial to investigations even when planned properly.

D.

Most jurisdictions provide protections for investigators conducting covert operations that shield them from reputational, financial, and legal consequences.

Full Access
Question # 13

Barnes, a Certified Fraud Examiner (CFE). is using data analysis to identify anomalies that might indicate fraud in XYZ Company's accounts payable transactions. Which of the following is the MOST EFFECTIVE data analysis function that Barnes could use to look for potential fraud in accounts payable?

A.

Compare book and tax depreciation and indicate variances

B.

Identify paycheck amounts over a certain limit

C.

Review recurring monthly expenses and compare to posted/paid invoices

D.

All of the above

Full Access
Question # 14

Leslie, a fraud examiner for ACME Corporation, suspects that a salesperson for another company has defrauded ACME. Leslie wants to obtain a copy of the suspect individual's credit report and personal data from a third-party information broker If Leslie works in a jurisdiction that regulates the distribution of personal credit information, she generally can obtain the information if she has the consent of the individual.

A.

True

B.

False

Full Access
Question # 15

Which of the following is NOT a function of a fraud examination report?

A.

To convey all the evidence necessary for other parties to thoroughly evaluate the case

B.

To add credibility to the fraud examiner's work

C.

To corroborate previously known facts

D.

To communicate the fraud examiner's qualifications for providing opinions about the case

Full Access
Question # 16

If the following statements were included in a fraud examination report of a qualified expert, which of them would be IMPROPER?

A.

"When asked a second time about the amount of funds missing, the suspect contradicted their previous testimony."

B.

"The evidence shows that between S1 million and S1.5 million in assets were transferred to an offshore account."

C.

"The organization must address the inadequate separation of accounting duties to prevent such an event from happening again."

D.

"In light of all the evidence, the suspect is most likely guilty of fraud against the organization."

Full Access
Question # 17

Which of the following should be done to prepare an organization for a formal fraud investigation?

A.

Inform the subject that they are under investigation.

B.

Issue an organization-wide communication that notifies all employees about the investigation

C.

Notify all managers about the investigation, explaining why it is happening and who is involved.

D.

Prepare the managers of the employees who will be involved in the investigation

Full Access
Question # 18

Allison, a Certified Fraud Examiner (CFE). is investigating a potential procurement fraud scheme. While interviewing a subject, she asks. "Why did you choose to do business with that vendor?" This can BEST be described as a(n):

A.

Open question

B.

Complex question

C.

Leading question

D.

Closed question

Full Access
Question # 19

Which of the following is NOT one of the main limitations of conducting a search for public records using online databases?

A.

Online public records searches are limited in the jurisdictions they cover.

B.

Public records database companies are difficult to find.

C.

Online coverage of public records varies widely from jurisdiction to jurisdiction

D.

The timeliness and accuracy of information in online databases must be validated

Full Access
Question # 20

Which of the following types of information would LEAST LIKELY be found when searching external sources without the subject's consent or a legal order?

A.

A witness's address

B.

Assets owned by a subject

C.

A subject's employee personnel file

D.

A competitor's ownership information

Full Access
Question # 21

Boyd, a Certified Fraud Examiner (CFE). was hired to trace Lottie's financial transactions. During his investigation. Boyd obtains records of electronic payments that Lottie made during the past five years. Which of the following are these records MOST LIKELY to reveal?

A.

The market value of any real property Lottie owns

B.

The assets that Lottie has purchased

C.

The division and distribution of Lottie's assets

D.

If Lottie is skimming her employer's funds

Full Access
Question # 22

Which of the following data is the MOST DIFFICULT to recover during a digital forensic examination?

A.

Time and date information about files

B.

Websites visited

C.

Files that have been overwritten

D.

Communications sent via instant messenger

Full Access
Question # 23

Which of the following is a reason why a subject's credit card records are useful in tracing investigations?

A.

Credit card statements show source of the funds used to pay a credit card bill

B.

Credit card records show the movements and habits of the subject

C.

Credit card records provide insight into the subject's litigation history

D.

Credit card records contain information about the division and distribution of the subject's assets

Full Access
Question # 24

In response to an accusation made during an admission-seeking interview, the subject begins to voice a denial to the charge. How should the interviewer react to the first indication of a subject's denial?

A.

Allow the subject 1o continue denying the charge

B.

Argue the point directly with the subject until a confession is obtained

C.

Remind the subject of the laws against perjury.

D.

Interrupt the denial by using a delaying tactic.

Full Access
Question # 25

Shane, a Certified Fraud Examiner (CFE). is investigating Larsen. who is active on various social networking sites. Shane wants to search and extract information from Larson's social media postings so that it can be used in court as evidence Which of the following is the MOST ACCURATE statement regarding what Shane should do when conducting a social media investigation of Larsen?

A.

Shane should conduct a forensic shutdown of his computer to preserve the metadata in the social networking sites.

B.

Shane should preserve the information from the social networking sites so that it can be established as authentic if used in court.

C.

Shane should email himself the links of the postings so that he can retrieve them later.

D.

Shane should preserve the information by saving the links of the postings in his 'bookmarks"

Full Access