ACFE CFE Investigation Certified Fraud Examiner – Investigation Exam Online Training
ACFE CFE Investigation Online Training
The questions for CFE Investigation were last updated at Nov 23,2024.
- Exam Code: CFE Investigation
- Exam Name: Certified Fraud Examiner - Investigation Exam
- Certification Provider: ACFE
- Latest update: Nov 23,2024
Which of the following BEST describes the data analytics approach known as predictive analytics?
- A . The employment of a learning algorithm that identifies similarities, patterns, or anomalies within a data set on its own, without human involvement
- B . The configuration of a business program to emulate and integrate the actions of a human to execute certain business processes thus increasing efficiency and automating repetitive manual tasks
- C . The use of historical data, along with analyses, statistics, and machine learning components, to build a mathematical model that captures important trends and creates a quantitative forecast
- D . The use of layered artificial neural networks to accommodate more data and more sophisticated algorithms to identify complex patterns
Which of the following types of files is the most difficult to recover during a digital forensic examination?
- A . Overwritten files
- B . Deleted until
- C . Deleted link (shortcut) files
- D . Hidden files
Which of the following situations would MOST LIKELY require access to nonpublic records to develop evidence?
- A . Finding out where a person lives
- B . Reviewing an individual’s personal mobile phone records
- C . Obtaining a company’s business filings
- D . Determining who owns a piece of real estate
Jade, a Certrfied Fraud Examiner (CFE). is conducting an internal investigation in which an employee is suspected of stealing inventory and selling it through a possible shell company called Hidden Finds. LLC. When Jade tries to check Hidden Finds’ website, a message appears that redirects customers to a web address that ends with onion.
To view the website’s content. Jade will need to install a specialized web browser that enables her to access which of the following?
- A . The deep archives
- B . The free web
- C . The dark web
- D . The internet archives
Gunn, a Certified Fraud Examiner (CFE). was hired to trace Kelly’s financial transactions. During his investigation. Gunn obtains records of electronic payments that Kelly made during the past three years .
Which of the following are these records MOST LIKELY to reveal?
- A . If Kelly has been skimming funds
- B . The cities and countries in which Kelly conducts business
- C . The division and distribution of Kelly’s assets
- D . The market value of any real property Kelly owns
Anne used Will as a confidential informant in her investigation Anne listed information provided by Will in her final report, referring to him using his initials. She paid Will in cash and obtained a receipt for the transaction .
Which of Anne’s methods was NOT considered a best practice when using informants?
- A . Referring to Will using his initials
- B . Obtaining a receipt from Will
- C . Using information provided by Will in her report
- D . Using cash to pay Will
Which of the following is a reason why a subject’s credit card records are useful in tracing investigations?
- A . Credit card statements show source of the funds used to pay a credit card bill
- B . Credit card records show the movements and habits of the subject
- C . Credit card records provide insight into the subject’s litigation history
- D . Credit card records contain information about the division and distribution of the subject’s assets
Vishal, a Certified Fraud Examiner (CFE). has just initiated an interview with Steve, a fraud suspect. After a short introduction. Vishal jokes about the fact that he and Steve are wearing the same tie and then proceeds to ask Steve about the previous night’s major sporting event Vishal is attempting to
- A . Establish the interview theme
- B . Condition the witness.
- C . Establish rapport
- D . Exhibit passive listening.
Which of the following is the MOST IMPORTANT question for a fraud examiner to ask before commencing a legal action to recover assets?
- A . "Is there a relevant statute of limitations9"
- B . "Does the suspect already have a criminal record?"
- C . "Is the suspect guilty of the fraudulent act?”
- D . "Are nonlegal recovery methods or remedies available?”
Shane, a Certified Fraud Examiner (CFE). is investigating Larsen. who is active on various social networking sites. Shane wants to search and extract information from Larson’s social media postings so that it can be used in court as evidence.
Which of the following is the MOST ACCURATE statement regarding what Shane should do when conducting a social media investigation of Larsen?
- A . Shane should conduct a forensic shutdown of his computer to preserve the metadata in the social networking sites.
- B . Shane should preserve the information from the social networking sites so that it can be established as authentic if used in court.
- C . Shane should email himself the links of the postings so that he can retrieve them later.
- D . Shane should preserve the information by saving the links of the postings in his ‘bookmarks"