Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

CFE-Investigation PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

CFE-Investigation PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Certified Fraud Examiner (CFE) - Investigation
  • Last Update: May 3, 2024
  • Questions and Answers: 170
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

CFE-Investigation Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

CFE-Investigation Practice Exam Questions with Answers Certified Fraud Examiner (CFE) - Investigation Certification

Question # 6

Which of the following situations would MOST LIKELY require access to nonpublic records to develop evidence?

A.

Finding out where a person lives

B.

Reviewing an individual's personal mobile phone records

C.

Obtaining a company's business filings

D.

Determining who owns a piece of real estate

Full Access
Question # 7

Which of the following is the MOST ACCURATE statement regarding a fraud examiner's ability to trace cryptocurrency transactions?

A.

Each Blockchain transaction contains a user's cryptographic address, which can help identify patterns that might link the user to criminal activity.

B.

Most jurisdictions do not require digital wallet providers to record any personal information about cryptocurrency users

C.

Cryptocurrency ownership cannot be determined through an analysis of details on a subject's bank statements.

D.

Most cryptocurrencies rely on private block chains, which allow users' transactions to be completely anonymous and therefore difficult to trace.

Full Access
Question # 8

Shane, a Certified Fraud Examiner (CFE). is investigating Larsen. who is active on various social networking sites. Shane wants to search and extract information from Larson's social media postings so that it can be used in court as evidence Which of the following is the MOST ACCURATE statement regarding what Shane should do when conducting a social media investigation of Larsen?

A.

Shane should conduct a forensic shutdown of his computer to preserve the metadata in the social networking sites.

B.

Shane should preserve the information from the social networking sites so that it can be established as authentic if used in court.

C.

Shane should email himself the links of the postings so that he can retrieve them later.

D.

Shane should preserve the information by saving the links of the postings in his 'bookmarks"

Full Access
Question # 9

Which of the following is usually considered the most useful source of financial information available to fraud examiners in tracing a subject's assets?

A.

Financial institution records

B.

Service bills

C.

Paystubs

D.

Credit card statements

Full Access
Question # 10

Which of the following situations would probably NOT require access to nonpublic records to develop evidence?

A.

Obtaining personal health care records

B.

Accessing banking records to trace assets

C.

Reviewing a company's business filings

D.

Analyzing an individual's personal mobile phone records

Full Access
Question # 11

Which of the following statements is MOST ACCURATE regarding how a fraud examiner should prepare for an interview with a subject from a different jurisdiction?

A.

Failing to observe cultural norms is not a concern if the interviewer is from a different country than the interviewee.

B.

Consulting with legal counsel is only necessary when an investigation spans multiple

C.

A fraud examiner should find out whether the interviewee can insist upon the presence of a legal representative

D.

A fraud examiner does not need to research cultural considerations such as appropriate greetings and eye contact.

Full Access
Question # 12

Steve, a Certified Fraud Examiner (CFE). was interviewing Michelle, a fraud suspect. Dunng the first part of the interview. Michelle was attentive. However, when he asked her more direct questions about the fraud, she suddenly seemed unconcerned, alternately chewing on her pen cap and picking at a loose piece of fabric on the arm of her chair. From this conduct. Steve is likely to conclude that Michelle

A.

Is feeling bored by the interview process

B.

Is being deceptive

C.

Does not know the answers to Steve's questions

D.

Is telling the truth

Full Access
Question # 13

Which of the following is the LEAST ACCURATE statement about seizing a computer for examination?

A.

When taking a computer for examination, if the computer is off. it should remain off when it is removed.

B.

When seizing a computer that is running, it is acceptable for a fraud examiner to review the files contained on the machine prior to seizing it.

C.

Before removing a computer system from a scene for further analysis, it is important to document the system's setup with photographs or diagrams.

D.

When seizing a computer for examination, the seizing party should took around the area for passwords because many people leave passwords near their computers

Full Access
Question # 14

Barnes, a Certified Fraud Examiner (CFE). is using data analysis to identify anomalies that might indicate fraud in XYZ Company's accounts payable transactions. Which of the following is the MOST EFFECTIVE data analysis function that Barnes could use to look for potential fraud in accounts payable?

A.

Compare book and tax depreciation and indicate variances

B.

Identify paycheck amounts over a certain limit

C.

Review recurring monthly expenses and compare to posted/paid invoices

D.

All of the above

Full Access
Question # 15

Marcus is trying to locate the financial statements of Acme Airlines, a multinational publicly traded corporation. Which of the following sources would be MOST EFFECTIVE for finding this information?

A.

Commercial filings

B.

Civil litigation records

C.

Organizational filings

D.

Regulatory securities records

Full Access
Question # 16

A fraud examiner believes that a suspect might have used illicit funds to construct a commercial building to fit a restaurant. Which of the following records would be the MOST helpful in confirming the owner of the building?

A.

Local court records

B.

Commercial filings

C.

Building permit records

D.

Voter registration records

Full Access
Question # 17

Allison, a Certified Fraud Examiner (CFE). is investigating a potential procurement fraud scheme. While interviewing a subject, she asks. "Why did you choose to do business with that vendor?" This can BEST be described as a(n):

A.

Open question

B.

Complex question

C.

Leading question

D.

Closed question

Full Access
Question # 18

When planning for the interview phase of an investigation, which of the following steps should NOT be taken by the fraud examiner?

A.

Consider what the interview is intended to accomplish and state an objective.

B.

Review the case file to ensure that important information has not been overlooked

C.

Prepare a detailed list of questions to ask the subject during the interview.

D.

Ensure that the interview is held in a venue where the subject will feel Uncomfortable

Full Access
Question # 19

Which of the following terms refers to a process of resolving allegations of fraud from inception to disposition?

A.

Forensic methodology

B.

Fraud theory

C.

Fraud assessment

D.

Fraud examination

Full Access
Question # 20

Anita is interviewing her client's employee, whom she suspects committed check fraud. During the interview. Anita asks if she can obtain account records from the suspect's bank If the suspect only gives Anita oral consent, the suspect's bank is required to allow Anita access to the suspect's account records.

A.

True

B.

False

Full Access
Question # 21

Lisa, a fraud examiner at a private company, receives an anonymous call from a potential whistleblower. The whistleblower is hesitant to reveal their identity but will do so if it can be Kept fully confidential. Which of the following statements is MOST ACCURATE?

A.

Lisa may offer the whistleblower full confidentiality because they are not a suspect

B.

Lisa should explain that she will try her best to keep the whistleblower"s identity confidential.

C.

Lisa should state that she will not be able to keep the whistleblower's identity confidential because all information must be disclosed to management

D.

Lisa may promise the whistleblower full confidentiality, even if she knows her statement is untrue, because the lie is ultimately beneficial to her employer.

Full Access
Question # 22

The term_____________refers to a process of resolving allegations of fraud from inception to disposition.

A.

Fraud theory

B.

Forensic investigation

C.

Fraud management

D.

Fraud examination

Full Access
Question # 23

When reporting the results of a fraud examination, it is BEST to include copies (not originals) of important documents in the formal report.

A.

True

B.

False

Full Access
Question # 24

Which of the following types of information would LEAST LIKELY be found when searching external sources without the subject's consent or a legal order?

A.

A witness's address

B.

Assets owned by a subject

C.

A subject's employee personnel file

D.

A competitor's ownership information

Full Access
Question # 25

Due to risks of illicit transactions, most jurisdictions require financial institutions to obtain information about which of the following from an institution with which they have a foreign correspondent relationship?

A.

The institution's ownership details

B.

The institution's investment portfolio

C.

The institution's client loan profiles

D.

The institution's tax statements

Full Access