ACFE CFE Investigation Certified Fraud Examiner – Investigation Exam Online Training
ACFE CFE Investigation Online Training
The questions for CFE Investigation were last updated at Nov 23,2024.
- Exam Code: CFE Investigation
- Exam Name: Certified Fraud Examiner - Investigation Exam
- Certification Provider: ACFE
- Latest update: Nov 23,2024
Arnold, a Certified Fraud Examiner (CFE) for Integra Wealth, learns that Elizabeth, an accounts payable clerk, recently purchased an expensive ski boat Arnold also knows that Elizabeth recently purchased a vacation home on a nearby lake Arnold has sufficient predication to:
- A . Notify management of the possibility that Elizabeth has committed fraudulent acts
- B . Search Elizabeth’s mobile phone for evidence of misconduct.
- C . Accuse Elizabeth directly of having committed fraud
- D . Conduct discreet inquiries into Elizabeth’s responsibilities as an accounts payable clerk
Which of the following is the MOST ACCURATE statement regarding the analysis phase in digital forensic investigations?
- A . The analysis phase of digital forensic investigations should not commence unless it is verified that the suspect devices do not contain relevant data.
- B . During the analysis phase, it is best to use a combination of the various forensic tools that can assist h identifying, extracting, and collecting digital evidence
- C . When analyzing data for evidence, fraud examiners should look for exculpatory evidence but not exculpatory evidence
- D . The primary concern when analyzing digital evidence is to protect the collected information from seizure
Which of the following should be done to prepare an organization for a formal fraud investigation?
- A . Inform the subject that they are under investigation.
- B . Issue an organization-wide communication that notifies all employees about the investigation
- C . Notify all managers about the investigation, explaining why it is happening and who is involved.
- D . Prepare the managers of the employees who will be involved in the investigation
When planning for the interview phase of an investigation, which of the following steps should NOT be taken by the fraud examiner?
- A . Consider what the interview is intended to accomplish and state an objective.
- B . Review the case file to ensure that important information has not been overlooked
- C . Prepare a detailed list of questions to ask the subject during the interview.
- D . Ensure that the interview is held in a venue where the subject will feel Uncomfortable
Eugene is conducting an admission-seeking interview of a suspect. During the interview, the suspect frequently looks away from Eugene while responding to questions. Eugene can safely conclude that the suspect is dishonest due to his failure to maintain eye contact.
- A . True
- B . False
During an interview, Alex asked a fraud suspect if he could retrieve the suspect’s account records from her bank. The suspect said, "yes." but she did not provide consent in writing
Although the suspect orally consented, the suspect’s bank is NOT required to allow Alex to access the suspect’s account records at this point.
- A . True
- B . False
Elizabeth, a Certified Fraud Examiner (CFE), is conducting an admission-seeking interview with Shannon, a fraud suspect. Shannon is seated approximately five feet away from Elizabeth in an empty room. The room has several pictures and posters on the wall, and the door is closed.
According to admission-seeking interview best practices, what change should Elizabeth make to the interview environment to increase the chances of the interview’s success?
- A . Move the interview to a room without pictures or wall hangings to prevent distractions
- B . Open the door so that Shannon feels free to leave at any time
- C . Place a table between her and Shannon to create a psychological barrier
- D . All of the above
Why is it necessary to image a seized computer’s hard drive for forensic analysis?
- A . To prohibit access to the suspect computer’s hard drive by individuals not professionally trained in forensic analysis
- B . To allow for the analysis of data from a suspect computer without altering or damaging the original data in any way
- C . To create pictures of the suspect computer system and its wires and cables
- D . To enable the retrieval of data from the suspect computer directly via its operating system
A fraud examiner believes that a suspect might have used illicit funds to construct a commercial building to fit a restaurant .
Which of the following records would be the MOST helpful in confirming the owner of the building?
- A . Local court records
- B . Commercial filings
- C . Building permit records
- D . Voter registration records
Cynthia is preparing to conduct a covert investigation. Prior to conducting surveillance of her subject, she creates a memorandum outlining the basis for her operation.
Which of the following pieces of information should she include in her memorandum?
- A . The name of the subject she will be observing
- B . Her first impression regarding the subject’s culpability
- C . The identities of any confidential sources to be used in the operation
- D . All of the above