Which of the following types of information would LEAST LIKELY be found when searching external sources without the subject's consent or a legal order?
Rachel, a fraud suspect, has decided to confess to Linda, a Certified Fraud Examiner (CFE). In obtaining a verbal confession from Rachel. Linda should obtain all of the following items of information EXCEPT:
Which of the following is the MOST ACCURATE statement about how fraud examiners shook! approach fraud examinations?
Janet suspects that a local restaurant is being used as a front business for a criminal operation. Which of the following types of records would be the MOST LIKELY to help Janet discover who owns the restaurant building?
Which of the following statements about the process of obtaining a verbal confession is NOT true?
Which of the following is NOT one of the main limitations of conducting a search for public records using online databases?
Which of the following is NOT a function of a fraud examination report?
Scarlett, a Certified Fraud Examiner (CFE). is assigned to the internal audit department of the ABC Company. She is getting ready to conduct an interview with another company employee who might be involved in a fraud. Which of the following is the MOST APPROPRIATE introduction for Scarlett to use with the employee?
Which of the following BEST describes the data analytics approach known as predictive analytics?
Pedro, a Certified Fraud Examiner (CFE). is conducting an admission-seeking interview of Manuel, a fraud suspect. After Pedro diffused Manuel's alibis. Manuel became withdrawn and stowty began to slouch m his chair, bowing his head and beginning to cry. What should Pedro do now?
Gunn, a Certified Fraud Examiner (CFE). was hired to trace Kelly's financial transactions. During his investigation. Gunn obtains records of electronic payments that Kelly made during the past three years. Which of the following are these records MOST LIKELY to reveal?
Baker, a Certified Fraud Examiner (CFE). contacts Dierdre for the purpose of conducting a routine, information-gathering interview Dierdre expresses a desire that her coworker. Matthew, whom Baker also plans to interview, be interviewed at the same time Baker should:
Which of the following data is the MOST DIFFICULT to recover during a digital forensic examination?
Gamma, a Certified Fraud Examiner (CFE>, was conducting an admission-seeking interview of Delta, a fraud suspect. Gamma tells Delta, "It isn't like you took something from a friend or neighbor I can see how you could say. 'Well, this would be okay as long as it is the company and not my coworkers.' Isn't that right?" This technique seeks to establish rationalization by:
Which of the following is considered a best practice for preserving the confidentiality of a fraud investigation?
The term_____________refers to a process of resolving allegations of fraud from inception to disposition.
A fraud examiner believes that a suspect might have used illicit funds to construct a commercial building to fit a restaurant. Which of the following records would be the MOST helpful in confirming the owner of the building?
If you are seizing a computer for forensic analysis, why is it generally necessary to seize any copiers connected to it?
Which of the following is a reason why a subject's credit card records and statements can be useful in tracing investigations?
Which of the following is the MOST ACCURATE statement regarding a fraud examiner's ability to trace cryptocurrency transactions?
Susan, a Certified Fraud Examiner (CFE). is conducting an ad mission-seeking interview of Beth, a fraud suspect. After Susan gave Beth a suitable rationalization for her conduct. Beth continued her denials, giving various alibis. Which of the following would be the LEAST EFFECTIVE technique for Susan to use in this situation?
Which of the following statements concerning a well-written fraud examination report is MOST ACCURATE?
A fraud examiner contacts a witness regarding an interview. If the respondent says. ‘I’m too busy." how should the fraud examiner react?
Leslie, a fraud examiner for ACME Corporation, suspects that a salesperson for another company has defrauded ACME. Leslie wants to obtain a copy of the suspect individual's credit report and personal data from a third-party information broker If Leslie works in a jurisdiction that regulates the distribution of personal credit information, she generally can obtain the information if she has the consent of the individual.
John, a fraud investigator, is interviewing Mary, who he suspects has been embezzling company funds. Which of the following is the recommended approach John should use to ask Mary questions?