Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ACFE CFE-Investigation - Certified Fraud Examiner (CFE) - Investigation

Page: 3 / 6
Total 181 questions

Marilyn, a Certified Fraud Examiner (CFE). is reasonably sure that Shelly, her primary suspect, committed the fraud in question Before scheduling an admission-seeking interview with Shelly. Marilyn should be reasonably sure of all of the following EXCEPT:

A.

That all reasonable investigative steps have been taken

B.

That the interview's time and location can be controlled

C.

That no other person was involved in the fraud in question

D.

That the interview's subject matter can be controlled

Amanda needs to know the location of the principal office and the date of incorporation of a company she is investigating. Which of the following would be the BEST source of this information?

A.

The organizational filing with the government of the jurisdiction in which the company is incorporated

B.

The company's income tax filings

C.

The contractual records of any real property owned by the corporation

D.

The comprehensive litigation file in the local court in the jurisdiction in which the company is headquartered

Jackson, a digital forensic examiner for a government agency, is conducting a criminal investigation into the alleged embezzlement of funds from the government's Welfare Department (WD). Ginny. a WD employee, is the prime suspect. Jackson obtains a court order authorizing him to seize Ginny's personal computer for forensic examination. Which of the following is the MOST ACCURATE statement?

A.

If Ginny's computer is running. Jackson should perform a graceful shutdown by turning it off using the normal shutdown process

B.

If Ginny’s computer is off and Jackson needs evidence that exists only in the form of volatile data, he should turn the computer on and retrieve data directly via the computer's normal interface.

C.

If Ginny's computer is off. Jackson should not turn it on unless he plans to use an encryption device that can guarantee that the system's hard drive will not be accessed during startup.

D.

If Ginny's computer is running. Jackson may retrieve data from the computer directly via its normal interface if the evidence that he needs exists only in the form of volatile data

Beta, a Certified Fraud Examiner (CFE). is conducting an admission-seeking interview of Delta, a fraud suspect. In establishing a rationalization. Beta says to Delta. "I know you didn't do this for yourself: it was for your family." This technique seeks to establish rationalization by:

A.

Reducing Delta's stress about possibly being fired

B.

Claiming Delta's action was for altruistic reasons

C.

Reducing Delta's perception of the legal seriousness of the matter

D.

Establishing that Delta's family was being treated unfairly

Baker, a Certified Fraud Examiner (CFE). is getting prepared to conduct a lengthy and complex interview. To prepare himself. Baker should:

A.

Writs down a detailed list of questions in advance

B.

Avoid bringing any notes with him to the interview

C.

Write down key points to go over with the respondent

D.

Take only the documents he wishes to go over

Tara. a Certified Fraud Examiner (CFE). is searching social media sites for evidence in a fraud investigation. Which of the following is the MOST ACCURATE statement regarding what Tara should do when mining social media sites for evidence of fraud?

A.

Tara should preserve the information by saving the links of the postings as bookmarks in her browser.

B.

Tara should preserve the metadata by printing out the web pages of each of the postings.

C.

Tara should conduct a forensic shutdown of the computer to preserve the metadata m the social networking sites.

D.

Tara should preserve the information from the sites so that it can be established as authentic if used in court.

Antonio is the former boyfriend of Hannah, a fraud suspect. He approaches Ashley, a fraud examiner at Hannah's company, and offers to provide critical information about Hannah's fraud in exchange for full confidentiality. Which of the following is the MOST APPROPRIATE response for Ashley to make?

A.

Ashley should explain that Antonio may have qualified confidentiality but that she cannot make any absolute assurances

B.

Ashley should promise Antonio unqualified confidentiality over all information provided

C.

Ashley should explain that all information must be disclosed to management so nothing Antonio says will be confidential

D.

Ashley should promise Antonio that his identity will not become known.

Which of the following statements about the process of obtaining a verbal confession is TRUE?

A.

The only acceptable approaches to obtaining a verbal confession are chronologically or by transaction

B.

The transition from the accusation to the confession should occur when the accused supplies the first detailed information about the offense.

C.

If the subject lies about an aspect of the offense in the process of confessing, it is best to correct the records immediately before proceeding

D.

Fraudsters tend to overestimate the amount of funds involved in the offense to relieve themselves of the guilt of their dishonest actions.

A fraud examiner is based m the United States, a non-European Union (EU) country, and is collecting personal information from their company's human resources (HR) files about an employee based in Spain, an EU country Based on these facts, the fraud examiner would need to comply with the EU's General Data Protection Regulation (GDPR) when conducting their internal investigation.

A.

True

B.

False

Which of the following sources of information is usually considered to be the MOST IMPORTANT in tracing a subject's assets?

A.

Credit card statements

B.

PaystuDs

C.

Surveillance footage

D.

Financial institution records