Which of the following types of files is the most difficult to recover during a digital forensic examination?
Which of the following types of files is the most difficult to recover during a digital forensic examination?A . Overwritten files B. Deleted until C. Deleted link (shortcut) files D. Hidden filesView AnswerAnswer: A
Which of the following would be MOST USEFUL m determining who created a specrfic document file?
Which of the following would be MOST USEFUL m determining who created a specrfic document file?A . Operating system partition B. Internet activity data C. The system log D. The document's metadataView AnswerAnswer: C
Which of the following BEST describes the data analytics approach known as predictive analytics?
Which of the following BEST describes the data analytics approach known as predictive analytics?A . The employment of a learning algorithm that identifies similarities, patterns, or anomalies within a data set on its own, without human involvement B. The configuration of a business program to emulate and integrate the actions...
Which of the following is INCORRECT with regard to locating individuals using online records?
Which of the following is INCORRECT with regard to locating individuals using online records?A . Before engaging in a search the fraud examine' should know the mod powerful and useful '>Des of searches B. If an individual has moved, obtaining a past address is usually of no help C. Online...
Which of the following statements is MOST ACCURATE regarding covert operations?
Which of the following statements is MOST ACCURATE regarding covert operations?A . Fraud examiners should conduct coven operations only after attempting conventional methods of evidence-gathering B. Mistakes in covert operations generally do not cause damage to their associated investigations C. Covert operations rarely prove beneficial to investigations even when planned...
Marilyn, a Certified Fraud Examiner (CFE). is reasonably sure that Shelly, her primary suspect, committed the fraud in question Before scheduling an admission-seeking interview with Shelly. Marilyn should be reasonably sure of all of the following EXCEPT:
Marilyn, a Certified Fraud Examiner (CFE). is reasonably sure that Shelly, her primary suspect, committed the fraud in question Before scheduling an admission-seeking interview with Shelly. Marilyn should be reasonably sure of all of the following EXCEPT:A . That all reasonable investigative steps have been taken B. That the interview's...
Which of Andrew's plans is NOT considered a best practice when using an informant?
Andrew wants to use a confidential informant in his investigation. He plans to compensate the informant with cash and obtain a receipt. He also plans to identify his source in a memorandum and his final report using only the informant's initials . Which of Andrew's plans is NOT considered a...
Which of the following is the MOST ACCURATE statement about how fraud examiners shook! approach fraud examinations?
Which of the following is the MOST ACCURATE statement about how fraud examiners shook! approach fraud examinations?A . Fraud examinations should begin with general information that is known, starting at the periphery, and then move to the more specific details. B. When conducting fraud examinations, fraud examiners should adhere to...
The term_____________refers to a process of resolving allegations of fraud from inception to disposition.
The term_____________refers to a process of resolving allegations of fraud from inception to disposition.A . Fraud theory B. Forensic investigation C. Fraud management D. Fraud examinationView AnswerAnswer: D
Which of the following is a reason why a person or organization might engage a fraud examiner to trace illicit transactions?
Which of the following is a reason why a person or organization might engage a fraud examiner to trace illicit transactions?A . A victim of fraud wants to facilitate the recovery of criminal proceeds. B. An employer wants to know if an employee is falsifying regulatory reports C. An attorney...