Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ACFE CFE-Investigation - Certified Fraud Examiner (CFE) - Investigation

Page: 2 / 6
Total 181 questions

Which of the following sets of numbers could a fraud examiner MOST LIKELY benefit from running a Benford’s Law analysis on?

A.

Telephone numbers

B.

Vendor invoice amounts

C.

Employee identification numbers

D.

Bank account numbers

Misty, a fraud investigator, is interviewing Larry, who she suspects has been embezzling company funds. Which of the following is NOT a recommended sequence in which Misty should ask Lam/ questions?

A.

Ask questions in random order to prevent Larry from knowing what question comes next.

B.

Start with questions about known information and work toward unknown information

C.

Start with general questions and move toward specific questions

D.

Ask questions seeking general information before seeking details

Louis, a Certified Fraud Examiner (CFE). is investigating a potential internal fraud case originating from a whistteblower tip about embezzlement. He discovers that the organization purportedly affected by the embezzlement recorded the tip in a memorandum. Which type of evidence would the memorandum be considered?

A.

Testimonial evidence

B.

Incriminating evidence

C.

Documentary evidence

D.

Verbal evidence

Christopher, a fraud examiner, is conducting an admission-seeking interview with Jennifer, an employee suspected of stealing cash. Which of the following is the LEAST EFFECTIVE phrasing for Christopher to use when posing an admission-seeking question to Jennifer?

A.

"Did you steal the money?"

B.

'What did you do with the money?"

C.

"Why did you take the money?"

D.

"How much of the money do you have left?"

Naveed, a fraud suspect, has decided to confess to Omar, a Certified Fraud Examiner (CFE). In obtaining a verbal confession from Naveed. Omar should obtain all of the following items of information EXCEPT:

A.

A general estimate of the amount of money involved

B.

The approximate number of instances

C.

The location of any residual assets

D.

A statement from Naveed that his conduct was an accident

Which of the following is usually considered the most useful source of financial information available to fraud examiners in tracing a subject's assets?

A.

Financial institution records

B.

Service bills

C.

Paystubs

D.

Credit card statements

Which of the following would be most useful in determining when a specific document file was created?

A.

The document's metadata

B.

Internet activity data

C.

The system tog

D.

Operating system partition

Management at Oak Company has asked Arthur, an internal auditor, to implement a data analysis program to search for warning signs of potential fraud within the company. Which of the following steps should Arthur conduct first to MOST effectively use data analysis techniques for such an initiative?

A.

Analyze the data.

B.

Cleanse and normalize the data

C.

Build a profile of potential frauds.

D.

Obtain the data.

Which of the following is NOT one of the main limitations of conducting a search for public records using online databases?

A.

Online public records searches are limited in the jurisdictions they cover.

B.

Public records database companies are difficult to find.

C.

Online coverage of public records varies widely from jurisdiction to jurisdiction

D.

The timeliness and accuracy of information in online databases must be validated

Fraud examination reports should be written with which of the following audiences in mind?

A.

The media

B.

Opposing legal counsel

C.

Investors and owners

D.

All of the above