To view the website's content. Jade will need to install a specialized web browser that enables her to access which of the following?
Jade, a Certrfied Fraud Examiner (CFE). is conducting an internal investigation in which an employee is suspected of stealing inventory and selling it through a possible shell company called Hidden Finds. LLC. When Jade tries to check Hidden Finds' website, a message appears that redirects customers to a web address...
Which of the following should be done to prepare an organization for a formal fraud investigation?
Which of the following should be done to prepare an organization for a formal fraud investigation?A . Inform the subject that they are under investigation. B. Issue an organization-wide communication that notifies all employees about the investigation C. Notify all managers about the investigation, explaining why it is happening and...
Which of the following is NOT one of the main limitations of conducting a search for public records using online databases?
Which of the following is NOT one of the main limitations of conducting a search for public records using online databases?A . Online public records searches are limited in the jurisdictions they cover. B. Public records database companies are difficult to find. C. Online coverage of public records varies widely...
Which of the following is the MOST ACCURATE statement regarding what Tara should do when mining social media sites for evidence of fraud?
Tara. a Certified Fraud Examiner (CFE). is searching social media sites for evidence in a fraud investigation . Which of the following is the MOST ACCURATE statement regarding what Tara should do when mining social media sites for evidence of fraud?A . Tara should preserve the information by saving the...
When planning for the interview phase of an investigation, which of the following steps should NOT be taken by the fraud examiner?
When planning for the interview phase of an investigation, which of the following steps should NOT be taken by the fraud examiner?A . Consider what the interview is intended to accomplish and state an objective. B. Review the case file to ensure that important information has not been overlooked C....
Assuming that a jurisdiction has prohibited pretexting with financial institutes, which of the following actions would constitute illegal pretexting?
Assuming that a jurisdiction has prohibited pretexting with financial institutes, which of the following actions would constitute illegal pretexting?A . Withdrawing another person's funds using a stolen bank account number and PIN B. Digging through a person's trash to obtain their bank account information C. Making purchases with a credit...
Which of the following is the MOST ACCURATE statement about the privacy of information shared through social media?
Which of the following is the MOST ACCURATE statement about the privacy of information shared through social media?A . To access any user-posted information on social media sites, fraud examiners must obtain some type of legal order from the jurisdiction in which the user resides. B. A fraud examiner cannot...
Marilyn, a Certified Fraud Examiner (CFE). is reasonably sure that Shelly, her primary suspect, committed the fraud in question Before scheduling an admission-seeking interview with Shelly. Marilyn should be reasonably sure of all of the following EXCEPT:
Marilyn, a Certified Fraud Examiner (CFE). is reasonably sure that Shelly, her primary suspect, committed the fraud in question Before scheduling an admission-seeking interview with Shelly. Marilyn should be reasonably sure of all of the following EXCEPT:A . That all reasonable investigative steps have been taken B. That the interview's...
Which of the following is NOT a step a fraud examiner must take before seizing evidence in a digital forensic investigation?
Which of the following is NOT a step a fraud examiner must take before seizing evidence in a digital forensic investigation?A . Obtain and become familiar with any legal orders that apply to the investigation B. Assemble an investigation team comprised only of outside digital forensic experts C. Ensure that...
Which of the following is a reason why a person or organization might engage a fraud examiner to trace illicit transactions?
Which of the following is a reason why a person or organization might engage a fraud examiner to trace illicit transactions?A . A victim of fraud wants to facilitate the recovery of criminal proceeds. B. An employer wants to know if an employee is falsifying regulatory reports C. An attorney...