ACFE CFE Investigation Certified Fraud Examiner – Investigation Exam Online Training
ACFE CFE Investigation Online Training
The questions for CFE Investigation were last updated at Nov 23,2024.
- Exam Code: CFE Investigation
- Exam Name: Certified Fraud Examiner - Investigation Exam
- Certification Provider: ACFE
- Latest update: Nov 23,2024
Which of the following types of information would LEAST LIKELY be found when searching external sources without the subject’s consent or a legal order?
- A . A witness’s address
- B . Assets owned by a subject
- C . A subject’s employee personnel file
- D . A competitor’s ownership information
Which of the following data analysis functions is used to determine whether company policies are met by employee transactions, such as verifying that traveling employees book their accommodations at approved hotels?
- A . The correlation analysis function
- B . The Join function
- C . The gap testing function
- D . The compliance verification function
Sam needs to obtain the most accurate court records possible in a particular jurisdiction concerning a fraud suspect. The BEST place for Sam to look is a global database that compiles court cases from various jurisdictions
- A . True
- B . False
Orlando is conducting a fraud examination regarding Fast Freight, a large publicly traded corporation, and wants to find the current officers and directors of the company .
Which of the following would be the best source of information for this purpose?
- A . Commercial filings
- B . Real property records
- C . The company’s corporate bylaws
- D . Regulatory securities records
Caroline, a fraud examiner, is conducting an admission-seeking interview with John, an employee suspected of stealing cash .
Which of the following is the MOST effective phrasing for Caroline to use when posing an admission-seeking question to John?
- A . "Why did you take the money?"
- B . "What do you know about the stolen money?"
- C . "Do you know who took the money”"
- D . "Did you steal the money?"
Assuming that a jurisdiction has prohibited pretexting with financial institutes, which of the following actions would constitute illegal pretexting?
- A . Withdrawing another person’s funds using a stolen bank account number and PIN
- B . Digging through a person’s trash to obtain their bank account information
- C . Making purchases with a credit card account under a fictitious identity
- D . Falsely claiming to be the spouse of an account holder to access bank records
Which of the following data is the MOST DIFFICULT to recover during a digital forensic examination?
- A . Time and date information about files
- B . Websites visited
- C . Files that have been overwritten
- D . Communications sent via instant messenger
Which of the following is INCORRECT with regard to locating individuals using online records?
- A . Before engaging in a search the fraud examine’ should know the mod powerful and useful ‘>Des of searches
- B . If an individual has moved, obtaining a past address is usually of no help
- C . Online records are very useful in locating subjects whose whereabouts are unknown
- D . Obtaining a past address of the subject should be the first step in trying to locate a subject using online records.
Which of the following statements is MOST ACCURATE regarding covert operations?
- A . Fraud examiners should conduct coven operations only after attempting conventional methods of evidence-gathering
- B . Mistakes in covert operations generally do not cause damage to their associated investigations
- C . Covert operations rarely prove beneficial to investigations even when planned properly.
- D . Most jurisdictions provide protections for investigators conducting covert operations that shield them from reputational, financial, and legal consequences.
Which of the following sources of information is usually considered to be the MOST IMPORTANT in tracing a subject’s assets?
- A . Credit card statements
- B . PaystuDs
- C . Surveillance footage
- D . Financial institution records