ACFE CFE Investigation Certified Fraud Examiner – Investigation Exam Online Training
ACFE CFE Investigation Online Training
The questions for CFE Investigation were last updated at Nov 23,2024.
- Exam Code: CFE Investigation
- Exam Name: Certified Fraud Examiner - Investigation Exam
- Certification Provider: ACFE
- Latest update: Nov 23,2024
Which of the following statements is MOST ACCURATE regarding how a fraud examiner should prepare for an interview with a subject from a different jurisdiction?
- A . A fraud examiner does not need to research cultural considerations such as personal space and eye contact.
- B . A fraud examiner should find out whether there are limitations on the use of information obtained during an interview
- C . Failing to observe cultural norms is not a concern if the interviewer is from a different country than the interviewee
- D . Consulting with legal counsel is only necessary when an investigation spans multiple junsdictions
Jackson, a digital forensic examiner for a government agency, is conducting a criminal investigation into the alleged embezzlement of funds from the government’s Welfare Department (WD). Ginny. a WD employee, is the prime suspect. Jackson obtains a court order authorizing him to seize Ginny’s personal computer for forensic examination .
Which of the following is the MOST ACCURATE statement?
- A . If Ginny’s computer is running. Jackson should perform a graceful shutdown by turning it off using the normal shutdown process
- B . If Ginny’s computer is off and Jackson needs evidence that exists only in the form of volatile data, he should turn the computer on and retrieve data directly via the computer’s normal interface.
- C . If Ginny’s computer is off. Jackson should not turn it on unless he plans to use an encryption device that can guarantee that the system’s hard drive will not be accessed during startup.
- D . If Ginny’s computer is running. Jackson may retrieve data from the computer directly via its normal interface if the evidence that he needs exists only in the form of volatile data
Which of the following is the MOST ACCURATE statement about trying to locate a subject using online records?
- A . Most public records services do not maintain a list of past addresses
- B . Obtaining a past address of the subject should be the first step in trying to locate a subject using online records
- C . The first step in locating someone using online records is to obtain a list of past employers
- D . Online records are generally not useful in locating subjects whose address is unknown
The term_____________refers to a process of resolving allegations of fraud from inception to disposition.
- A . Fraud theory
- B . Forensic investigation
- C . Fraud management
- D . Fraud examination
Which of the following can be obtained from a wire transfer record?
- A . The name of the receiving institution’s registered agent
- B . The recipient’s government identification number
- C . The name of the sender or originator
- D . The sending institution’s accreditation type
Which of the following is TRUE of a follow-up/recommendations section in a written fraud examination report?
- A . A follow-up/recommendations section is not a required part of every written fraud examination report
- B . A follow-up/recommendations section calculates the amount of loss caused by any misconduct identified during the investigation
- C . A follow-up/recommendations section must include a list of organizational failings that contnbuted to the fraud
- D . All of the above
Which of the following is a reason why a person or organization might engage a fraud examiner to trace illicit transactions?
- A . A victim of fraud wants to facilitate the recovery of criminal proceeds.
- B . An employer wants to know if an employee is falsifying regulatory reports
- C . An attorney wants to evaluate an expert’s financial report
- D . An entity needs to find hidden relationships in big data that otherwise would not be discovered.
Susan, a Certified Fraud Examiner (CFE). is conducting an ad mission-seeking interview of Beth, a fraud suspect. After Susan gave Beth a suitable rationalization for her conduct. Beth continued her denials, giving various alibis .
Which of the following would be the LEAST EFFECTIVE technique for Susan to use in this situation?
- A . Displaying evidence that specifically contradicts Beth’s alibis
- B . Discussing some of Beth’s prior deceptions
- C . Discussing the testimony of other witnesses
- D . Displaying all the evidence she has against Beth at once
Charles, a fraud examiner, accuses George of fraud during an admission-seeking
interview. George immediately denies the charge How should Charles respond to George’s denial?
- A . Counter the denial by arguing with George until further denials are futile
- B . Use a delaying tactic to interrupt the denial
- C . Remind George he has to tell the truth or face perjury.
- D . Allow George to continue denying the charge.
Nobles, a digital forensic examiner for a government agency, is conducting a criminal investigation of Lucas, a construction company executive, for alleged bribery of foreign officials Nobles obtains a court order authorizing him to seize Lucas’s personal computer for forensic examination .
Which of the following is the MOST ACCURATE statement?
- A . If Lucas’s computer is running. Nobles may retrieve data from the computer directly via its normal interface 4 the evidence that he needs exists only in the form of volatile data
- B . If Lucas’s computer is off and Nobles needs evidence that exists only in the form of volatile data, he should turn the computer on and retrieve data directly via the computer’s normal interlace.
- C . If Lucas’s computer is off. Nobles should not turn it on unless he plans to use an encryption device that can guarantee that the system’s hard drive will not be accessed during startup.
- D . If Lucas’s computer is running. Nobles should perform a graceful shutdown by turning it off using the normal shutdown process