Spring Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

ACFE CFE-Investigation Certified Fraud Examiner (CFE) - Investigation Exam Practice Test

Certified Fraud Examiner (CFE) - Investigation Questions and Answers

Question 1

Which of the following is a reason why a person or organization might engage a fraud examiner to trace illicit transactions?

Options:

A.

A victim of fraud wants to facilitate the recovery of criminal proceeds.

B.

An employer wants to know if an employee is falsifying regulatory reports

C.

An attorney wants to evaluate an expert's financial report

D.

An entity needs to find hidden relationships in big data that otherwise would not be discovered.

Question 2

When a fraud examiner is conducting an examination and is in the process of collecting documents, the fraud examiner should:

Options:

A.

Dust all physical key documents for fingerprints

B.

Establish a document database early in the investigation

C.

Make copies of originals and leave the originals where they were found

D.

Organize all the documents obtained in chronological order

Question 3

Elsa, a fraud examiner at ABC Corp., is interviewing Leah, a fraud suspect. Leah allegedly committed a fraud scheme that resulted in a loss of $200,000 for ABC. Elsa asks Leah directly whether she was involved in the fraud. Which of the following responses from Leah is MOST LIKELY an indication that she is being deceptive?

Options:

A.

“No, I have never stolen anything from ABC.”

B.

“I had no involvement with the scheme.”

C.

“Why would I do something like that?”

D.

“No, I did not commit fraud against ABC.”

Question 4

Which of the following is NOT a best practice for obtaining a signed statement?

Options:

A.

Add subsequent facts to the statement as an addendum.

B.

Have the suspect write out the entire statement in their own handwriting

C.

Prepare separate statements for unrelated offenses

D.

Have two individuals witness the signing of the document when possible.

Question 5

Barnes, a Certified Fraud Examiner (CFE). is using data analysis to identify anomalies that might indicate fraud in XYZ Company's accounts payable transactions. Which of the following is the MOST EFFECTIVE data analysis function that Barnes could use to look for potential fraud in accounts payable?

Options:

A.

Compare book and tax depreciation and indicate variances

B.

Identify paycheck amounts over a certain limit

C.

Review recurring monthly expenses and compare to posted/paid invoices

D.

All of the above

Question 6

Divya, a Certified Fraud Examiner (CFE), is considering whether to commence a legal action to recover assets for her client. Of the following choices, which is the MOST IMPORTANT question for Divya to ask before moving forward with the legal action?

Options:

A.

“Does the defendant have sufficient money or property to satisfy a judgment?”

B.

“Has the suspect been arrested for any crimes in the past?”

C.

“What is the likelihood that the suspect did not actually commit fraud?”

D.

“Is there a relevant statute of limitations for the offense?”

Question 7

Mila. a Certified Fraud Examiner (CFE). needs to obtain court records and wants to be as sure as possible that the records are accurate In most countries, the most reliable way lo obtain these documents is to obtain them directly from the court authorities.

Options:

A.

True

B.

False

Question 8

Which of the following is NOT true with regard to tracing the disposition of loan proceeds?

Options:

A.

Tracing loan proceeds can determine if the proceeds were deposited into hidden accounts.

B.

Tracing loan proceeds can uncover previously hidden assets

C.

Tracing loan proceeds can determine if hidden accounts were used for loan payments

D.

Tracing loan proceeds can identify the presence of internal control weaknesses.

Question 9

Which of the following is the MOST ACCURATE statement about the privacy of information shared through social media?

Options:

A.

To access any user-posted information on social media sites, fraud examiners must obtain some type of legal order from the jurisdiction in which the user resides.

B.

A fraud examiner cannot be held liable for violating a user's privacy rights if they hack or break into areas of a social networking site designated as private because all social media information is public.

C.

The Privacy of Social Networks Treaty is a binding international treaty that makes it illegal for law enforcement to seek social media log-in credentials from users.

D.

Hacking or breaking into information on social media sites that is restricted as private could result in liability for fraud examiners due to violation of users' privacy rights.

Question 10

Marilyn, a Certified Fraud Examiner (CFE). is reasonably sure that Shelly, her primary suspect, committed the fraud in question Before scheduling an admission-seeking interview with Shelly. Marilyn should be reasonably sure of all of the following EXCEPT:

Options:

A.

That all reasonable investigative steps have been taken

B.

That the interview's time and location can be controlled

C.

That no other person was involved in the fraud in question

D.

That the interview's subject matter can be controlled

Question 11

Nobles, a digital forensic examiner for a government agency, is conducting a criminal investigation of Lucas, a construction company executive, for alleged bribery of foreign officials Nobles obtains a court order authorizing him to seize Lucas's personal computer for forensic examination. Which of the following is the MOST ACCURATE statement?

Options:

A.

If Lucas's computer is running. Nobles may retrieve data from the computer directly via its normal interface 4 the evidence that he needs exists only in the form of volatile data

B.

If Lucas's computer is off and Nobles needs evidence that exists only in the form of volatile data, he should turn the computer on and retrieve data directly via the computer's normal interlace.

C.

If Lucas's computer is off. Nobles should not turn it on unless he plans to use an encryption device that can guarantee that the system's hard drive will not be accessed during startup.

D.

If Lucas's computer is running. Nobles should perform a graceful shutdown by turning it off using the normal shutdown process

Question 12

Anne used Will as a confidential informant in her investigation Anne listed information provided by Will in her final report, referring to him using his initials. She paid Will in cash and obtained a receipt for the transaction. Which of Anne's methods was NOT considered a best practice when using informants?

Options:

A.

Referring to Will using his initials

B.

Obtaining a receipt from Will

C.

Using information provided by Will in her report

D.

Using cash to pay Will

Question 13

Boyd, a Certified Fraud Examiner (CFE). was hired to trace Lottie's financial transactions. During his investigation. Boyd obtains records of electronic payments that Lottie made during the past five years. Which of the following are these records MOST LIKELY to reveal?

Options:

A.

The market value of any real property Lottie owns

B.

The assets that Lottie has purchased

C.

The division and distribution of Lottie's assets

D.

If Lottie is skimming her employer's funds

Question 14

Baker, a Certified Fraud Examiner (CFE). is assigned to the internal audit department of the ABC Company. He is getting ready to conduct an interview with another company employee who might be involved in a fraud. In general, what title should Baker use in his introduction to the employee?

Options:

A.

Baker should omit a title altogether

B.

Investigator

C.

Auditor

D.

Certified Fraud Examiner

Question 15

Delta, an interviewer with little experience, asks Sigma, the respondent, the following question: "Were you aware that the signature was forged, and why didn't you tell anyone earlier?" This kind of question is called a_____________question

Options:

A.

Complex

B.

Controlled answer

C.

Free narrative

D.

Double-negative

Question 16

Which of the following types of files is the most difficult to recover during a digital forensic examination?

Options:

A.

Overwritten files

B.

Deleted until

C.

Deleted link (shortcut) files

D.

Hidden files

Question 17

Why is it necessary to image a seized computer's hard drive for forensic analysis?

Options:

A.

To prohibit access to the suspect computer's hard drive by individuals not professionally trained in forensic analysis

B.

To allow for the analysis of data from a suspect computer without altering or damaging the original data in any way

C.

To create pictures of the suspect computer system and its wires and cables

D.

To enable the retrieval of data from the suspect computer directly via its operating system

Question 18

Which of the following is NOT a step a fraud examiner must take before seizing evidence in a digital forensic investigation?

Options:

A.

Obtain and become familiar with any legal orders that apply to the investigation

B.

Assemble an investigation team comprised only of outside digital forensic experts

C.

Ensure that only trained professionals employ any software used in a forensic capacity

D.

Determine whether there are privacy issues related to the item(s) to be searched.

Question 19

When planning for the interview phase of an investigation, which of the following steps should NOT be taken by the fraud examiner?

Options:

A.

Consider what the interview is intended to accomplish and state an objective.

B.

Review the case file to ensure that important information has not been overlooked

C.

Prepare a detailed list of questions to ask the subject during the interview.

D.

Ensure that the interview is held in a venue where the subject will feel Uncomfortable

Question 20

Bobbie, a fraud examiner, is preparing to interview Craig, a close friend and coworker of the primary suspect in the case. Craig has been described by others as "easily angered" and "intense" How should Bobbie approach her interview of Craig?

Options:

A.

Provide Craig with plenty of notice prior to the interview to not provoke resentment

B.

Conduct the interview with as little notice as possible so Craig will be unprepared

C.

Ask Craig when ho would prefer to be interviewed in an effort to engender cooperation

D.

Avoid interviewing Craig if possible due to Craig's potential volatility

Question 21

Which of the following types of information would LEAST LIKELY be found when searching external sources without the subject's consent or a legal order?

Options:

A.

A witness's address

B.

Assets owned by a subject

C.

A subject's employee personnel file

D.

A competitor's ownership information

Question 22

Antonio is the former boyfriend of Hannah, a fraud suspect. He approaches Ashley, a fraud examiner at Hannah's company, and offers to provide critical information about Hannah's fraud in exchange for full confidentiality. Which of the following is the MOST APPROPRIATE response for Ashley to make?

Options:

A.

Ashley should explain that Antonio may have qualified confidentiality but that she cannot make any absolute assurances

B.

Ashley should promise Antonio unqualified confidentiality over all information provided

C.

Ashley should explain that all information must be disclosed to management so nothing Antonio says will be confidential

D.

Ashley should promise Antonio that his identity will not become known.

Question 23

Which of the following statements about the process of obtaining a verbal confession is NOT true?

Options:

A.

The transition from the accusation to the confession should occur when the accused supplies the first detailed information about the offense.

B.

Fraudsters tend to overestimate the amount of funds involved in the offense to relieve themselves of the guilt of their dishonest actions.

C.

If the subject lies about an aspect of the offense in the process of confessing, it is best to proceed initially as if the falsehood has been accepted as truth.

D.

The three general approaches to obtaining a verbal confession are chronologically, by transaction, or by event.

Question 24

Which of the following is NOT a function of a fraud examination report?

Options:

A.

To convey all the evidence necessary for other parties to thoroughly evaluate the case

B.

To add credibility to the fraud examiner's work

C.

To corroborate previously known facts

D.

To communicate the fraud examiner's qualifications for providing opinions about the case

Question 25

Jackson, a Certified Fraud Examiner (CFE). is analyzing Elm Company's accounts payable data to identify anomalies that might indicate fraud. Which of the following is the MOST EFFECTIVE data analysis function that Jackson could use to look for potential fraud in accounts payable?

Options:

A.

Compare book and tax depreciation and indicate variances

B.

Identify paychecks with amounts over a certain limit

C.

Summarize large invoices by amount and vendor

D.

All of the above

Question 26

Which of the following statements concerning a well-written fraud examination report is MOST ACCURATE?

Options:

A.

The report should convey all Information provided by witnesses

B.

Only relevant facts that support the fraud allegation should be included in the report

C.

The report writer should avoid technical jargon where possible

D.

Signed copies of the fraud examiner's interview notes should be used to report interview details

Question 27

Which of the following is NOT true about observing the reactions of interview subjects?

Options:

A.

The interpretation of an interview subject's reactions requires specific skills on the part of the interviewer.

B.

The observation of a subjects body language is often just as important as the observation of the words used by the subject.

C.

Emotive words should be used early in the interview to observe the respondents emotional reaction.

D.

To effectively observe reactions, an interviewer should move from less sensitive to more sensitive questions as the interview progresses.

Question 28

All of the following are true with regard to textual analytics EXCEPT:

Options:

A.

When conducting textual analysis, the fraud examiner should come up with a list of fraud keywords to search for.

B.

Textual analytics is used to reveal patterns, sentiments, and relationships indicative of fraud

C.

The purpose of textual analytics is to search for and find an admission of fraud that can be presented in court

D.

Textual analytics provides the ability to uncover warning signs of potentially fraudulent employee behavior

Question 29

John, a fraud investigator, is interviewing Mary, who he suspects has been embezzling company funds. Which of the following is the recommended approach John should use to ask Mary questions?

Options:

A.

Start with questions about unknown information and work toward known information

B.

Ask questions in random order to keep Mary from guessing the next question

C.

Start with specific questions and move toward general questions

D.

Seek general information before seeking specific details

Question 30

Which of the following is the MOST ACCURATE statement regarding a fraud examiner's ability to trace cryptocurrency transactions?

Options:

A.

Each Blockchain transaction contains a user's cryptographic address, which can help identify patterns that might link the user to criminal activity.

B.

Most jurisdictions do not require digital wallet providers to record any personal information about cryptocurrency users

C.

Cryptocurrency ownership cannot be determined through an analysis of details on a subject's bank statements.

D.

Most cryptocurrencies rely on private block chains, which allow users' transactions to be completely anonymous and therefore difficult to trace.

Question 31

Which of the following is FALSE regarding link analysis?

Options:

A.

Link analysis is a poor tool to use for investigating a money laundering scheme

B.

Link analysis can be used to map connections between entities that share an address

C.

Link analysis helps identify indirect relationships with several degrees of separation

D.

Link analysis is an effective tool for demonstrating complex networks

Question 32

An investigator is preparing to administer what is likely to be an intense and extended interview with a fraud suspect. To organize their thoughts prior to the interview, the fraud examiner should:

Options:

A.

Provide the suspect with a list of questions to ensure detailed responses-

B.

Make a list of key points to go over with the respondent.

C.

Develop a list of questions ranked in order of importance.

D.

Memorize a detailed list of questions, but avoid taking a written list to the interview

Question 33

Scarlett, a Certified Fraud Examiner (CFE), is conducting an admission-seeking interview of Plum, a fraud suspect. After Scarlett defused Plum's alibis. Plum became withdrawn and slowly began to slouch in her chair, bowing her head. What should Scarlett do now?

Options:

A.

Discourage Plum from showing any emotion.

B.

Remain silent until Plum makes a confession.

C.

Insist that Plum sit up straight in her chair

D.

Continue to display evidence that implicates Plum

Question 34

Charles, a fraud examiner, accuses George of fraud during an admission-seeking interview. George immediately denies the charge How should Charles respond to George's denial?

Options:

A.

Counter the denial by arguing with George until further denials are futile

B.

Use a delaying tactic to interrupt the denial

C.

Remind George he has to tell the truth or face perjury.

D.

Allow George to continue denying the charge.

Question 35

Louis, a Certified Fraud Examiner (CFE). is investigating a potential internal fraud case originating from a whistteblower tip about embezzlement. He discovers that the organization purportedly affected by the embezzlement recorded the tip in a memorandum. Which type of evidence would the memorandum be considered?

Options:

A.

Testimonial evidence

B.

Incriminating evidence

C.

Documentary evidence

D.

Verbal evidence

Question 36

Management at First Choice Inc. suspects that Nathan, its chief financial officer (CFO), has been embezzling funds. It hires Reina. a Certified Fraud Examiner (CFE), to investigate the matter When conducting the fraud examination. Reina should proceed as though;

Options:

A.

After Nathan is terminated, the case will end

B.

The case will end in litigation.

C.

Nathan is guilty

D.

The matter will be resolved completely internally.

Question 37

Management at Oak Company has asked Arthur, an internal auditor, to implement a data analysis program to search for warning signs of potential fraud within the company. Which of the following steps should Arthur conduct first to MOST effectively use data analysis techniques for such an initiative?

Options:

A.

Analyze the data.

B.

Cleanse and normalize the data

C.

Build a profile of potential frauds.

D.

Obtain the data.

Question 38

Which of the following sets of numbers could a fraud examiner MOST LIKELY benefit from running a Benford’s Law analysis on?

Options:

A.

Telephone numbers

B.

Vendor invoice amounts

C.

Employee identification numbers

D.

Bank account numbers

Question 39

Smith, a Certified Fraud Examiner (CFE) for the Ajax Co.. observes Jones, an accounts payable clerk, driving an expensive sports car to work. Smith also has knowledge that Jones recently had extensive remodeling done on her residence. Smith has sufficient predication to:

Options:

A.

Conduct discreet inquiries into Jones's responsibilities as an accounts payable clerk

B.

Notify management of the possibility that Jones has committed fraudulent acts.

C.

Search Jones's mobile phone for evidence of misconduct

D.

Accuse Jones directly of having committed fraud.

Question 40

Assuming that a jurisdiction has prohibited pretexting against financial institutions, which of the following actions would constitute illegal pretexting?

Options:

A.

Intentionally making false statements on loan applications

B.

Stealing a person's mail lo obtain the person's bank account number

C.

Impersonating an account holder to access their bank records

D.

Setting up a bank account in an assumed name

Question 41

Naveed, a fraud suspect, has decided to make an admission to Omar, a Certified Fraud Examiner (CFE). Which of the following items of information should Omar obtain from Naveed during the verbal admission?

Options:

A.

A general estimate of the amount of money involved in the fraud

B.

Facts about the fraud known to co-conspirators and witnesses

C.

A statement from Naveed indicating that his conduct was an accident

D.

Controls that would have prevented Naveed from committing the fraud

Question 42

Tony, a fraud examiner, believes that vendors might be submitting multiple invoices for the same sales with the hope that they will be paid more than once. He wants to ensure that no two invoices in the system have the same number. Which of the Mowing data analysis functions would be most useful for this test?

Options:

A.

Duplicate search

B.

Benford's Law analysis

C.

Correlation analysis

D.

Linear regression

Question 43

Which of the following statements is MOST ACCURATE regarding covert operations?

Options:

A.

Fraud examiners should conduct coven operations only after attempting conventional methods of evidence-gathering

B.

Mistakes in covert operations generally do not cause damage to their associated investigations

C.

Covert operations rarely prove beneficial to investigations even when planned properly.

D.

Most jurisdictions provide protections for investigators conducting covert operations that shield them from reputational, financial, and legal consequences.

Question 44

Martin is a fraud examiner. He contacts Dianne for the purpose of conducting a routine, information-gathering interview. Dianne says that she wants her coworker. Sheila, whom Martin also plans to interview, to be present during the interview. Martin should:

Options:

A.

Interview Dianne and Sheila separately

B.

Allow Sheila to be present but only if she does not speak

C.

Interview Dianne and Sheila together by himself

D.

Interview Dianne and Sheila together, but bring in a second interviewer

Question 45

Al needs to know the location of the principal office and the initial shareholders of a company he is investigating. Which of the following would be the BEST source of this reformation?

Options:

A.

The organizational filings with the government of the jurisdiction in which the company is incorporated

B.

The contractual documents regarding real properly owned by the corporation

C.

The utility records in the municipality where the corporation has its principal office

D.

The shareholder data form filed with the World Bank

Question 46

In response to an accusation made during an admission-seeking interview, the subject begins to voice a denial to the charge. How should the interviewer react to the first indication of a subject's denial?

Options:

A.

Allow the subject 1o continue denying the charge

B.

Argue the point directly with the subject until a confession is obtained

C.

Remind the subject of the laws against perjury.

D.

Interrupt the denial by using a delaying tactic.

Question 47

Which of the following is NOT one of the main limitations of conducting a search for public records using online databases?

Options:

A.

Online public records searches are limited in the jurisdictions they cover.

B.

Public records database companies are difficult to find.

C.

Online coverage of public records varies widely from jurisdiction to jurisdiction

D.

The timeliness and accuracy of information in online databases must be validated

Question 48

Jackson, a digital forensic examiner for a government agency, is conducting a criminal investigation into the alleged embezzlement of funds from the government's Welfare Department (WD). Ginny. a WD employee, is the prime suspect. Jackson obtains a court order authorizing him to seize Ginny's personal computer for forensic examination. Which of the following is the MOST ACCURATE statement?

Options:

A.

If Ginny's computer is running. Jackson should perform a graceful shutdown by turning it off using the normal shutdown process

B.

If Ginny’s computer is off and Jackson needs evidence that exists only in the form of volatile data, he should turn the computer on and retrieve data directly via the computer's normal interface.

C.

If Ginny's computer is off. Jackson should not turn it on unless he plans to use an encryption device that can guarantee that the system's hard drive will not be accessed during startup.

D.

If Ginny's computer is running. Jackson may retrieve data from the computer directly via its normal interface if the evidence that he needs exists only in the form of volatile data

Question 49

Which of the following is a factor that fraud examiners should consider when determining whether to dispose of evidence following the conclusion of a fraud examination?

Options:

A.

Whether the information was presented by a lay witness or an expert witness

B.

Whether the evidence is documentary or testimonial

C.

Whether the evidence is direct or circumstantial

D.

Whether the organization has a general document retention policy in place

Question 50

A fraud examiner is based m the United States, a non-European Union (EU) country, and is collecting personal information from their company's human resources (HR) files about an employee based in Spain, an EU country Based on these facts, the fraud examiner would need to comply with the EU's General Data Protection Regulation (GDPR) when conducting their internal investigation.

Options:

A.

True

B.

False

Question 51

Which of the following situations would MOST LIKELY require access to nonpublic records to develop evidence?

Options:

A.

Finding out where a person lives

B.

Reviewing an individual's personal mobile phone records

C.

Obtaining a company's business filings

D.

Determining who owns a piece of real estate

Question 52

A fraud examiner contacts a witness regarding an interview. If the respondent says. ‘I’m too busy." how should the fraud examiner react?

Options:

A.

Explain that the respondent will be subject to discipline if they do not participate

B.

Stress that the interview will be short.

C.

Caution the witness that avoidance of the interview will be considered suspicious.

D.

Inquire about a more convenient time

Question 53

Vishal, a Certified Fraud Examiner (CFE). has just initiated an interview with Steve, a fraud suspect. After a short introduction. Vishal jokes about the fact that he and Steve are wearing the same tie and then proceeds to ask Steve about the previous night's major sporting event Vishal is attempting to

Options:

A.

Establish the interview theme

B.

Condition the witness.

C.

Establish rapport

D.

Exhibit passive listening.

Question 54

Nathaniel, a Certified Fraud Examiner (CFE). is investigating an alleged inventory theft scheme. While interviewing a subject, he asks, "When were you promoted to manager of the department?" This can BEST be described as a(n):

Options:

A.

Leading question

B.

Open question

C.

Complex question

D.

Closed question