Halloween Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

CFE-Investigation PDF

$33

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

CFE-Investigation PDF + Testing Engine

$52.8

$175.99

3 Months Free Update

  • Exam Name: Certified Fraud Examiner (CFE) - Investigation
  • Last Update: Oct 31, 2025
  • Questions and Answers: 170
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

CFE-Investigation Engine

$39.6

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

CFE-Investigation Practice Exam Questions with Answers Certified Fraud Examiner (CFE) - Investigation Certification

Question # 6

Al needs to know the location of the principal office and the initial shareholders of a company he is investigating. Which of the following would be the BEST source of this reformation?

A.

The organizational filings with the government of the jurisdiction in which the company is incorporated

B.

The contractual documents regarding real properly owned by the corporation

C.

The utility records in the municipality where the corporation has its principal office

D.

The shareholder data form filed with the World Bank

Full Access
Question # 7

Marcus is trying to locate the financial statements of Acme Airlines, a multinational publicly traded corporation. Which of the following sources would be MOST EFFECTIVE for finding this information?

A.

Commercial filings

B.

Civil litigation records

C.

Organizational filings

D.

Regulatory securities records

Full Access
Question # 8

Why do fraud examiners perform analysis on unstructured, or textual, data?

A.

To determine whether the footnotes to the financial statements are fairly presented

B.

To find an admission of fraud m an email or other communication that can be presented in court

C.

To categorize data to reveal patterns, sentiments, and relationships indicative of fraud

D.

To figure out whether someone is lying or telling the truth based on context duet

Full Access
Question # 9

Naveed, a fraud suspect, has decided to confess to Omar, a Certified Fraud Examiner (CFE). In obtaining a verbal confession from Naveed. Omar should obtain all of the following items of information EXCEPT:

A.

A general estimate of the amount of money involved

B.

The approximate number of instances

C.

The location of any residual assets

D.

A statement from Naveed that his conduct was an accident

Full Access
Question # 10

Nathaniel, a Certified Fraud Examiner (CFE). is investigating an alleged inventory theft scheme. While interviewing a subject, he asks, "When were you promoted to manager of the department?" This can BEST be described as a(n):

A.

Leading question

B.

Open question

C.

Complex question

D.

Closed question

Full Access
Question # 11

Tara. a Certified Fraud Examiner (CFE). is searching social media sites for evidence in a fraud investigation. Which of the following is the MOST ACCURATE statement regarding what Tara should do when mining social media sites for evidence of fraud?

A.

Tara should preserve the information by saving the links of the postings as bookmarks in her browser.

B.

Tara should preserve the metadata by printing out the web pages of each of the postings.

C.

Tara should conduct a forensic shutdown of the computer to preserve the metadata m the social networking sites.

D.

Tara should preserve the information from the sites so that it can be established as authentic if used in court.

Full Access
Question # 12

Boyd, a Certified Fraud Examiner (CFE). was hired to trace Lottie's financial transactions. During his investigation. Boyd obtains records of electronic payments that Lottie made during the past five years. Which of the following are these records MOST LIKELY to reveal?

A.

The market value of any real property Lottie owns

B.

The assets that Lottie has purchased

C.

The division and distribution of Lottie's assets

D.

If Lottie is skimming her employer's funds

Full Access
Question # 13

Sarah is conducting an admission-seeking interview of a suspect. Throughout the interview, the suspect makes little eye contact with Sarah. Based on this information atone, can Sarah conclude that the suspect is being deceptive?

A.

Yes, because it is safe to assume that suspects who avoid eye contact are most likely being deceptive.

B.

Yes, because avoiding eye contact is a sign of deceptive.

C.

No, because this is not enough information to conclude that the suspect is being deceptive

D.

No, because avoiding eye contact is not directly linked to deception.

Full Access
Question # 14

Marilyn, a Certified Fraud Examiner (CFE). is reasonably sure that Shelly, her primary suspect, committed the fraud in question Before scheduling an admission-seeking interview with Shelly. Marilyn should be reasonably sure of all of the following EXCEPT:

A.

That all reasonable investigative steps have been taken

B.

That the interview's time and location can be controlled

C.

That no other person was involved in the fraud in question

D.

That the interview's subject matter can be controlled

Full Access
Question # 15

Which of the following is a best practice for obtaining a signed statement?

A.

Make sure that everything is included in the signed statement and that no addendum are made

B.

Have the suspect write out the entire statement in their own handwriting

C.

Have two individuals witness the signing of the document when possible.

D.

Include all of the subject's offenses, whether related or not, in a angle document.

Full Access
Question # 16

Scarlett, a Certified Fraud Examiner (CFE). is assigned to the internal audit department of the ABC Company. She is getting ready to conduct an interview with another company employee who might be involved in a fraud. Which of the following is the MOST APPROPRIATE introduction for Scarlett to use with the employee?

A.

"Hello, my name is Scarlett, and I'm with the ABC Company."

B.

"Hello, my name is Scarlett. I'm an auditor with the ABC Company."

C.

"Hello, my name is Scarlett. I'm a Certified Fraud Examiner and an auditor with the ABC Company."

D.

"Hello, my name is Scarlett. I'm a Certified Fraud Examiner with the ABC Company."

Full Access
Question # 17

Beta, a Certified Fraud Examiner (CFE). is conducting an admission-seeking interview of Gamma, a fraud suspect. After Beta gave Gamma an appropriate rationalization for his conduct, Gamma continued his denials, giving various alibis. These alibis can usually be diffused by all of the following techniques EXCEPT:

A.

Discussing the testimony of witnesses

B.

Displaying physical evidence

C.

Discussing Gamma's prior deceptions

D.

Downplaying the strength of the evidence

Full Access
Question # 18

Pedro, a Certified Fraud Examiner (CFE). is conducting an admission-seeking interview of Manuel, a fraud suspect. After Pedro diffused Manuel's alibis. Manuel became withdrawn and stowty began to slouch m his chair, bowing his head and beginning to cry. What should Pedro do now?

A.

Leave the room for a short lime

B.

Ask Manuel to sit up straight

C.

Demand that Manuel stop crying.

D.

Present an alternative question.

Full Access
Question # 19

Which of the following statements concerning access to nonpublic records is FALSE?

A.

When civil litigation has commenced, a party often may obtain a subpoena or legal order for an individual's relevant bank records.

B.

A fraud examiner can request a business's bank records even if the business is not legally obligated to comply.

C.

An audit clause can be designed to allow a party to inspect the books of a business partner or vendor.

D.

During the government's criminal investigation, a fraud examiner not employed by the government has a right to access relevant documents that the government has obtained.

Full Access
Question # 20

Which of the following is TRUE of a follow-up/recommendations section in a written fraud examination report?

A.

A follow-up/recommendations section is not a required part of every written fraud examination report

B.

A follow-up/recommendations section calculates the amount of loss caused by any misconduct identified during the investigation

C.

A follow-up/recommendations section must include a list of organizational failings that contnbuted to the fraud

D.

All of the above

Full Access
Question # 21

Which of the following statements about fraud response plans is FALSE?

A.

A fraud response plan outlines the actions an organization will take when suspicions of fraud have arisen.

B.

A fraud response plan should create an environment to minimize risk and maximize the potential for success

C.

A fraud response plan must be simple to understand and administer

D.

A fraud response plan should specify how every fraud examination should be conducted regardless of the type of fraud

Full Access
Question # 22

Which of the following is the MOST ACCURATE statement regarding the analysis phase in digital forensic investigations?

A.

When analyzing data for evidence, fraud examiners should look for exculpatory evidence But not inculpatory evidence

B.

During the analysis phase, it is best to use just one forensic tool for identifying, extracting, and collecting digital evidence

C.

The primary concern when analyzing digital evidence is to maintain the integrity of the data at all times

D.

The analysis phase of digital forensic investigations should not commence unless it is venfied that the suspect devices do not contain relevant data

Full Access
Question # 23

Due to risks of illicit transactions, most jurisdictions require financial institutions to obtain information about which of the following from an institution with which they have a foreign correspondent relationship?

A.

The institution's branch addresses

B.

The institution's licenses or certifications

C.

The institution's tax statements

D.

The institution's client loan profiles

Full Access
Question # 24

Which of the following statements is MOST ACCURATE regarding covert operations?

A.

Fraud examiners should conduct coven operations only after attempting conventional methods of evidence-gathering

B.

Mistakes in covert operations generally do not cause damage to their associated investigations

C.

Covert operations rarely prove beneficial to investigations even when planned properly.

D.

Most jurisdictions provide protections for investigators conducting covert operations that shield them from reputational, financial, and legal consequences.

Full Access
Question # 25

Susan, a Certified Fraud Examiner (CFE). is conducting an ad mission-seeking interview of Beth, a fraud suspect. After Susan gave Beth a suitable rationalization for her conduct. Beth continued her denials, giving various alibis. Which of the following would be the LEAST EFFECTIVE technique for Susan to use in this situation?

A.

Displaying evidence that specifically contradicts Beth's alibis

B.

Discussing some of Beth's prior deceptions

C.

Discussing the testimony of other witnesses

D.

Displaying all the evidence she has against Beth at once

Full Access
Question # 26

Which of the following questions would be MOST EFFECTIVE when establishing a baseline during an interview?

A.

"Do you know who had access to the file?"

B.

"Are you familiar with the company's policies regarding ethics?"

C.

"Have you committed any misconduct against the company?"

D.

"How long have you been in this department?"

Full Access
Question # 27

Which of the following statements is MOST ACCURATE regarding how a fraud examiner should prepare for an interview with a subject from a different jurisdiction?

A.

A fraud examiner does not need to research cultural considerations such as personal space and eye contact.

B.

A fraud examiner should find out whether there are limitations on the use of information obtained during an interview

C.

Failing to observe cultural norms is not a concern if the interviewer is from a different country than the interviewee

D.

Consulting with legal counsel is only necessary when an investigation spans multiple junsdictions

Full Access
Question # 28

Which of the following is the MOST ACCURATE statement about the privacy of information shared through social media?

A.

To access any user-posted information on social media sites, fraud examiners must obtain some type of legal order from the jurisdiction in which the user resides.

B.

A fraud examiner cannot be held liable for violating a user's privacy rights if they hack or break into areas of a social networking site designated as private because all social media information is public.

C.

The Privacy of Social Networks Treaty is a binding international treaty that makes it illegal for law enforcement to seek social media log-in credentials from users.

D.

Hacking or breaking into information on social media sites that is restricted as private could result in liability for fraud examiners due to violation of users' privacy rights.

Full Access
Question # 29

Which of the following is a common characteristic that asset hiders look for in the financial vehicles they use to conceal their assets?

A.

Accessibility

B.

Transparency

C.

Exclusivity

D.

Traceability

Full Access
Question # 30

Shane, a Certified Fraud Examiner (CFE). is investigating Larsen. who is active on various social networking sites. Shane wants to search and extract information from Larson's social media postings so that it can be used in court as evidence Which of the following is the MOST ACCURATE statement regarding what Shane should do when conducting a social media investigation of Larsen?

A.

Shane should conduct a forensic shutdown of his computer to preserve the metadata in the social networking sites.

B.

Shane should preserve the information from the social networking sites so that it can be established as authentic if used in court.

C.

Shane should email himself the links of the postings so that he can retrieve them later.

D.

Shane should preserve the information by saving the links of the postings in his 'bookmarks"

Full Access
Question # 31

The term_____________refers to a process of resolving allegations of fraud from inception to disposition.

A.

Fraud theory

B.

Forensic investigation

C.

Fraud management

D.

Fraud examination

Full Access
Question # 32

Charles, a fraud examiner, accuses George of fraud during an admission-seeking interview. George immediately denies the charge How should Charles respond to George's denial?

A.

Counter the denial by arguing with George until further denials are futile

B.

Use a delaying tactic to interrupt the denial

C.

Remind George he has to tell the truth or face perjury.

D.

Allow George to continue denying the charge.

Full Access
Question # 33

When planning for the interview phase of an investigation, which of the following steps should NOT be taken by the fraud examiner?

A.

Consider what the interview is intended to accomplish and state an objective.

B.

Review the case file to ensure that important information has not been overlooked

C.

Prepare a detailed list of questions to ask the subject during the interview.

D.

Ensure that the interview is held in a venue where the subject will feel Uncomfortable

Full Access
Question # 34

Lmdsey, a Certified Fraud Examiner (CFE). has been retained to investigate allegations of bribery and kickbacks allegedly committed by a member of an organization's procurement department. Lindsey conducts an interview during which one of the accused's colleagues states that they overheard the accused discussing a free tnp received from one of the organization's vendors. Which type of evidence would the interviewee's statement be considered?

A.

Documentary evidence

B.

Testimonial evidence

C.

Verbal evidence

D.

Inconclusive evidence

Full Access
Question # 35

Jason is an investigator who is conducting an interview with Dina. a fraud suspect. After introducing himself. Jason attempts to be amiable by asking about Dina's favorite sports team and complimenting her eyeglass frames. Jason is attempting to:

A.

Establish the interview theme.

B.

Establish rapport.

C.

Calibrate the witness.

D.

Exhibit passive listening

Full Access
Question # 36

Which of the following is the MOST ACCURATE statement concerning the volatility of digital evidence?

A.

Digital evidence is more volatile than tangible evidence because digital evidence is subject to claims of spoliation, whereas tangible evidence is not.

B.

Digital evidence is more volatile than tangible evidence because the rules of admissibility for digital evidence are stricter than such rules for tangible evidence.

C.

If the integrity of digital evidence is violated, it can often be restored through a digital cleansing process

D.

The failure to preserve the integrity of digital evidence could result in evidence being deemed inadmissible in a legal proceeding

Full Access
Question # 37

Which of the following is NOT a function of a fraud examination report?

A.

To convey all the evidence necessary for other parties to thoroughly evaluate the case

B.

To add credibility to the fraud examiner's work

C.

To corroborate previously known facts

D.

To communicate the fraud examiner's qualifications for providing opinions about the case

Full Access
Question # 38

Gunn, a Certified Fraud Examiner (CFE). was hired to trace Kelly's financial transactions. During his investigation. Gunn obtains records of electronic payments that Kelly made during the past three years. Which of the following are these records MOST LIKELY to reveal?

A.

If Kelly has been skimming funds

B.

The cities and countries in which Kelly conducts business

C.

The division and distribution of Kelly's assets

D.

The market value of any real property Kelly owns

Full Access
Question # 39

Arnold, a Certified Fraud Examiner (CFE) for Integra Wealth, learns that Elizabeth, an accounts payable clerk, recently purchased an expensive ski boat Arnold also knows that Elizabeth recently purchased a vacation home on a nearby lake Arnold has sufficient predication to:

A.

Notify management of the possibility that Elizabeth has committed fraudulent acts

B.

Search Elizabeth's mobile phone for evidence of misconduct.

C.

Accuse Elizabeth directly of having committed fraud

D.

Conduct discreet inquiries into Elizabeth's responsibilities as an accounts payable clerk

Full Access
Question # 40

Which of the following BEST describes the data analytics approach known as predictive analytics?

A.

The employment of a learning algorithm that identifies similarities, patterns, or anomalies within a data set on its own, without human involvement

B.

The configuration of a business program to emulate and integrate the actions of a human to execute certain business processes thus increasing efficiency and automating repetitive manual tasks

C.

The use of historical data, along with analyses, statistics, and machine learning components, to build a mathematical model that captures important trends and creates a quantitative forecast

D.

The use of layered artificial neural networks to accommodate more data and more sophisticated algorithms to identify complex patterns

Full Access
Question # 41

When planning for the interview phase of an investigation, which of the following steps should NOT be taken by the fraud examiner?

A.

Consider what the interview is intended to accomplish and state an objective.

B.

Review the case file to ensure that important information has not been overlooked

C.

Prepare a detailed list of questions to ask the subject during the interview.

D.

Ensure that the interview is held in a venue where the subject will feel Uncomfortable

Full Access
Question # 42

Which of the following is NOT a best practice for obtaining a signed statement?

A.

Add subsequent facts to the statement as an addendum.

B.

Have the suspect write out the entire statement in their own handwriting

C.

Prepare separate statements for unrelated offenses

D.

Have two individuals witness the signing of the document when possible.

Full Access
Question # 43

Which of the following is the MOST ACCURATE statement regarding a fraud examiner's ability to trace cryptocurrency transactions?

A.

Each Blockchain transaction contains a user's cryptographic address, which can help identify patterns that might link the user to criminal activity.

B.

Most jurisdictions do not require digital wallet providers to record any personal information about cryptocurrency users

C.

Cryptocurrency ownership cannot be determined through an analysis of details on a subject's bank statements.

D.

Most cryptocurrencies rely on private block chains, which allow users' transactions to be completely anonymous and therefore difficult to trace.

Full Access
Question # 44

A fraud examiner is based m the United States, a non-European Union (EU) country, and is collecting personal information from their company's human resources (HR) files about an employee based in Spain, an EU country Based on these facts, the fraud examiner would need to comply with the EU's General Data Protection Regulation (GDPR) when conducting their internal investigation.

A.

True

B.

False

Full Access
Question # 45

Thea is conducting a fraud examination for a company and suspects one of the company's vendors (a one-person operation) of fraudulent billing. Thea wants to obtain a copy of the suspect individual's credit report and personal data from a third-party information broker. If Thea works in a jurisdiction that regulates the distribution of personal credit information, she cannot obtain the suspect's personal credit data under any circumstances.

A.

True

B.

False

Full Access
Question # 46

Which of the following types of data is BEST suited for a BenfordTs Law analysis?

A.

Employee identification numbers

B.

Telephone numbers

C.

A listing of payment amounts

D.

Vendor addresses

Full Access
Question # 47

Which of the following is TRUE of a well-written fraud examination report?

A.

The details of witness interviews should be reported in a separate memorandum.

B.

The report should discuss only the evidence that substantiates the fraud allegation

C.

All information provided by witnesses, regardless of relevance, should be included in the report.

D.

Technical terms should be included whenever possible to convey professionalism.

Full Access
Question # 48

Which of the following is a reason why a subject's credit card records and statements can be useful in tracing investigations?

A.

Credit card records can provide leads to help identify a subjects hidden assets

B.

Credit card records can show signs that the subject has skimmed funds.

C.

Credit card statements show the source of the funds used to pay a credit card bill.

D.

Credit card statements provide insight into the subject's litigation history

Full Access
Question # 49

When a fraud examiner is conducting an examination and is in the process of collecting documents, the fraud examiner should:

A.

Dust all physical key documents for fingerprints

B.

Establish a document database early in the investigation

C.

Make copies of originals and leave the originals where they were found

D.

Organize all the documents obtained in chronological order

Full Access
Question # 50

Which of the following is NOT one of the main limitations of conducting a search for public records using online databases?

A.

Online records companies are difficult to find.

B.

Fraud examiners must validate the accuracy of the records obtained online

C.

The online record might only be a brief abstract of the original.

D.

Fraud examiners often must search for public records in multiple jurisdictions.

Full Access
Question # 51

Which of the following is one of the purposes of closing questions in a routine interview?

A.

To close the interview positively and maintain goodwill

B.

To assess whether the subject is ready to confess

C.

To confirm the credibility of the witness being interviewed

D.

To reduce testimony to a signed, written statement

Full Access