ACFE CFE Investigation Certified Fraud Examiner – Investigation Exam Online Training
ACFE CFE Investigation Online Training
The questions for CFE Investigation were last updated at Nov 23,2024.
- Exam Code: CFE Investigation
- Exam Name: Certified Fraud Examiner - Investigation Exam
- Certification Provider: ACFE
- Latest update: Nov 23,2024
Baker, a Certified Fraud Examiner (CFE). contacts Dierdre for the purpose of conducting a routine, information-gathering interview Dierdre expresses a desire that her coworker.
Matthew, whom Baker also plans to interview, be interviewed at the same time Baker should:
- A . Interview Dierdre and Matthew separately.
- B . Interview Dierdre and Matthew at the same time, but bring in a second interviewer
- C . Interview Dierdre and Matthew at the same time by himself
- D . Allow Matthew to be present as a silent observer.
Which of the following is NOT a step a fraud examiner must take before seizing evidence in a digital forensic investigation?
- A . Obtain and become familiar with any legal orders that apply to the investigation
- B . Assemble an investigation team comprised only of outside digital forensic experts
- C . Ensure that only trained professionals employ any software used in a forensic capacity
- D . Determine whether there are privacy issues related to the item(s) to be searched.
Al needs to know the location of the principal office and the initial shareholders of a company he is investigating .
Which of the following would be the BEST source of this reformation?
- A . The organizational filings with the government of the jurisdiction in which the company is incorporated
- B . The contractual documents regarding real properly owned by the corporation
- C . The utility records in the municipality where the corporation has its principal office
- D . The shareholder data form filed with the World Bank
If your suspect is spending suspected illicit funds on consumables (e.g.. travel and entertainment) and you need to prove their illicit income circumstantially, which of the following methods of tracing assets would yield the BEST result?
- A . expenditures method
- B . The consumables method
- C . The income method
- D . The asset method
Marilyn, a Certified Fraud Examiner (CFE). is reasonably sure that Shelly, her primary suspect, committed the fraud in question Before scheduling an admission-seeking interview with Shelly. Marilyn should be reasonably sure of all of the following EXCEPT:
- A . That all reasonable investigative steps have been taken
- B . That the interview’s time and location can be controlled
- C . That no other person was involved in the fraud in question
- D . That the interview’s subject matter can be controlled
Tara. a Certified Fraud Examiner (CFE). is searching social media sites for evidence in a fraud investigation .
Which of the following is the MOST ACCURATE statement regarding what Tara should do when mining social media sites for evidence of fraud?
- A . Tara should preserve the information by saving the links of the postings as bookmarks in her browser.
- B . Tara should preserve the metadata by printing out the web pages of each of the postings.
- C . Tara should conduct a forensic shutdown of the computer to preserve the metadata m the social networking sites.
- D . Tara should preserve the information from the sites so that it can be established as authentic if used in court.
Andrew wants to use a confidential informant in his investigation. He plans to compensate the informant with cash and obtain a receipt. He also plans to identify his source in a memorandum and his final report using only the informant’s initials .
Which of Andrew’s plans is NOT considered a best practice when using an informant?
- A . Referring to the informant in the memorandum using the informant’s initials
- B . Using information from the informant in his final report
- C . Creating a receipt regarding the cash payment
- D . Compensating the informant with cash
Which of the following is NOT one of the main limitations of conducting a search for public records using online databases?
- A . Online public records searches are limited in the jurisdictions they cover.
- B . Public records database companies are difficult to find.
- C . Online coverage of public records varies widely from jurisdiction to jurisdiction
- D . The timeliness and accuracy of information in online databases must be validated
Which of the following is the MOST ACCURATE statement about the privacy of information shared through social media?
- A . To access any user-posted information on social media sites, fraud examiners must obtain some type of legal order from the jurisdiction in which the user resides.
- B . A fraud examiner cannot be held liable for violating a user’s privacy rights if they hack or break into areas of a social networking site designated as private because all social media information is public.
- C . The Privacy of Social Networks Treaty is a binding international treaty that makes it illegal for law enforcement to seek social media log-in credentials from users.
- D . Hacking or breaking into information on social media sites that is restricted as private could result in liability for fraud examiners due to violation of users’ privacy rights.
Which of the following statements concerning access to nonpublic records is MOST ACCURATE?
- A . Once a criminal case is filed, all records obtained by the government are considered public records
- B . Nonpublic records cannot be obtained by subpoena or legal order in a civil action
- C . In most junsdictions. banks are allowed to turn over a suspect’s account information directly to a fraud victim when there is adequate evidence of wrongdoing.
- D . The government usually will not share nonpublic records with a fraud victim during an investigation into the underlying fraud.