Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > ACFE > Certified Fraud Examiner > CFE-Investigation

CFE-Investigation Certified Fraud Examiner - Investigation Exam Question and Answers

Question # 4

Baker, a Certified Fraud Examiner (CFE). is getting prepared to conduct a lengthy and complex interview. To prepare himself. Baker should:

A.

Writs down a detailed list of questions in advance

B.

Avoid bringing any notes with him to the interview

C.

Write down key points to go over with the respondent

D.

Take only the documents he wishes to go over

Full Access
Question # 5

Which of the following is the MOST IMPORTANT question for a fraud examiner to ask before commencing a legal action to recover assets?

A.

"Has the defendant been previously arrested for allegedly committing a white-collar crime?"

B.

"Does the defendant have sufficient property or money to satisfy a money judgment?"

C.

"Is there a relevant statute of limitations?"

D.

"Is the suspect guilty of the fraudulent act?"

Full Access
Question # 6

Which of the following statements concerning access to nonpublic records is MOST ACCURATE?

A.

Once a criminal case is filed, all records obtained by the government are considered public records

B.

Nonpublic records cannot be obtained by subpoena or legal order in a civil action

C.

In most junsdictions. banks are allowed to turn over a suspect's account information directly to a fraud victim when there is adequate evidence of wrongdoing.

D.

The government usually will not share nonpublic records with a fraud victim during an investigation into the underlying fraud.

Full Access
Question # 7

When a fraud examiner is conducting an examination and is in the process of collecting documents, the fraud examiner should:

A.

Dust all physical key documents for fingerprints

B.

Establish a document database early in the investigation

C.

Make copies of originals and leave the originals where they were found

D.

Organize all the documents obtained in chronological order

Full Access
Question # 8

Andrew wants to use a confidential informant in his investigation. He plans to compensate the informant with cash and obtain a receipt. He also plans to identify his source in a memorandum and his final report using only the informant's initials. Which of Andrew's plans is NOT considered a best practice when using an informant?

A.

Referring to the informant in the memorandum using the informant's initials

B.

Using information from the informant in his final report

C.

Creating a receipt regarding the cash payment

D.

Compensating the informant with cash

Full Access
Question # 9

Which of the following is FALSE regarding link analysis?

A.

Link analysis is a poor tool to use for investigating a money laundering scheme

B.

Link analysis can be used to map connections between entities that share an address

C.

Link analysis helps identify indirect relationships with several degrees of separation

D.

Link analysis is an effective tool for demonstrating complex networks

Full Access
Question # 10

Vishal, a Certified Fraud Examiner (CFE). has just initiated an interview with Steve, a fraud suspect. After a short introduction. Vishal jokes about the fact that he and Steve are wearing the same tie and then proceeds to ask Steve about the previous night's major sporting event Vishal is attempting to

A.

Establish the interview theme

B.

Condition the witness.

C.

Establish rapport

D.

Exhibit passive listening.

Full Access
Question # 11

Which of the following is INCORRECT with regard to locating individuals using online records?

A.

Before engaging in a search the fraud examine' should know the mod powerful and useful '>Des of searches

B.

If an individual has moved, obtaining a past address is usually of no help

C.

Online records are very useful in locating subjects whose whereabouts are unknown

D.

Obtaining a past address of the subject should be the first step in trying to locate a subject using online records.

Full Access
Question # 12

Which of the following is one of the purposes of closing questions in a routine interview?

A.

To close the interview positively and maintain goodwill

B.

To assess whether the subject is ready to confess

C.

To confirm the credibility of the witness being interviewed

D.

To reduce testimony to a signed, written statement

Full Access
Question # 13

Elizabeth, a Certified Fraud Examiner (CFE), is conducting an admission-seeking interview with Shannon, a fraud suspect. Shannon is seated approximately five feet away from Elizabeth in an empty room The room has several pictures and posters on the wall, and the door is closed According to admission-seeking interview best practices, what change should Elizabeth make to the interview environment to increase the chances of the interview's success?

A.

Move the interview to a room without pictures or wall hangings to prevent distractions

B.

Open the door so that Shannon feels free to leave at any time

C.

Place a table between her and Shannon to create a psychological barrier

D.

All of the above

Full Access
Question # 14

Tony, a fraud examiner, believes that vendors might be submitting multiple invoices for the same sales with the hope that they will be paid more than once. He wants to ensure that no two invoices in the system have the same number. Which of the Mowing data analysis functions would be most useful for this test?

A.

Duplicate search

B.

Benford's Law analysis

C.

Correlation analysis

D.

Linear regression

Full Access
Question # 15

An investigator is preparing to administer what is likely to be an intense and extended interview with a fraud suspect. To organize their thoughts prior to the interview, the fraud examiner should:

A.

Provide the suspect with a list of questions to ensure detailed responses-

B.

Make a list of key points to go over with the respondent.

C.

Develop a list of questions ranked in order of importance.

D.

Memorize a detailed list of questions, but avoid taking a written list to the interview

Full Access
Question # 16

Which of the following is the MOST APPROPRIATE measure when seeking to avoid alerting suspected perpetrators who are under investigation?

A.

Terminate the suspected employee.

B.

Delay taking any action.

C.

Investigate during nonbusiness hours.

D.

Disclose the investigation to all employees

Full Access
Question # 17

Which of the following statements about how fraud examiners should approach fraud examinations is FALSE?

A.

In most examinations, fraud examiners should start interviewing the least involved candidates and proceed toward those who are potentially more involved.

B.

When conducting fraud examinations, fraud examiners should start with specific details and move toward more general information.

C.

When conducting fraud examinations, fraud examiners should adhere to the fraud theory approach.

D.

When conducting fraud examinations, fraud examiners should begin with general information that is known and then move to the more specific details.

Full Access
Question # 18

Leslie, a fraud examiner for ACME Corporation, suspects that a salesperson for another company has defrauded ACME. Leslie wants to obtain a copy of the suspect individual's credit report and personal data from a third-party information broker If Leslie works in a jurisdiction that regulates the distribution of personal credit information, she generally can obtain the information if she has the consent of the individual.

A.

True

B.

False

Full Access
Question # 19

Which of the following is NOT one of the main limitations of conducting a search for public records using online databases?

A.

Online records companies are difficult to find.

B.

Fraud examiners must validate the accuracy of the records obtained online

C.

The online record might only be a brief abstract of the original.

D.

Fraud examiners often must search for public records in multiple jurisdictions.

Full Access
Question # 20

Jason is an investigator who is conducting an interview with Dina. a fraud suspect. After introducing himself. Jason attempts to be amiable by asking about Dina's favorite sports team and complimenting her eyeglass frames. Jason is attempting to:

A.

Establish the interview theme.

B.

Establish rapport.

C.

Calibrate the witness.

D.

Exhibit passive listening

Full Access
Question # 21

Which of the following is NOT one of the main limitations of conducting a search for public records using online databases?

A.

Online public records searches are limited in the jurisdictions they cover.

B.

Public records database companies are difficult to find.

C.

Online coverage of public records varies widely from jurisdiction to jurisdiction

D.

The timeliness and accuracy of information in online databases must be validated

Full Access
Question # 22

Which of the following statements is MOST ACCURATE regarding how a fraud examiner should prepare for an interview with a subject from a different jurisdiction?

A.

A fraud examiner does not need to research cultural considerations such as personal space and eye contact.

B.

A fraud examiner should find out whether there are limitations on the use of information obtained during an interview

C.

Failing to observe cultural norms is not a concern if the interviewer is from a different country than the interviewee

D.

Consulting with legal counsel is only necessary when an investigation spans multiple junsdictions

Full Access
Question # 23

Which of the following data analysis functions is used to determine whether company policies are met by employee transactions, such as verifying that traveling employees book their accommodations at approved hotels?

A.

The correlation analysis function

B.

The Join function

C.

The gap testing function

D.

The compliance verification function

Full Access
Question # 24

Which of the following can be obtained from a wire transfer record?

A.

The name of the receiving institution's registered agent

B.

The recipient's government identification number

C.

The name of the sender or originator

D.

The sending institution's accreditation type

Full Access
Question # 25

A law enforcement officer receives a reliable tip from an informant that a government employee is soliciting bribes in exchange for awarding contracts to the employee's agency. To investigate, the officer poses as a potential contractor and contacts the suspect employee about the possibility of getting a contract with the agency. During the conversation, the suspect demands a cash payment for the officer to be considered for upcoming contracts. If the suspect claims entrapment at trial, then which of the following is MOST LIKELY to occur?

A.

The suspect's claim will succeed because the investigator used deceit

B.

The suspect's claim will succeed because the investigator lacked probable cause

C.

The suspect's claim will fail because the investigator had adequate predication

D.

The suspect's claim will fail because the investigator is a law enforcement agent

Full Access