Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ACFE Certified Fraud Examiner CFE-Investigation Questions and answers with CertsForce

Viewing page 4 out of 6 pages
Viewing questions 31-40 out of questions
Questions # 31:

Christopher, a fraud examiner, is conducting an admission-seeking interview with Jennifer, an employee suspected of stealing cash. Which of the following is the LEAST EFFECTIVE phrasing for Christopher to use when posing an admission-seeking question to Jennifer?

Options:

A.

"Did you steal the money?"


B.

'What did you do with the money?"


C.

"Why did you take the money?"


D.

"How much of the money do you have left?"


Expert Solution
Questions # 32:

Louis, a Certified Fraud Examiner (CFE). is investigating a potential internal fraud case originating from a whistteblower tip about embezzlement. He discovers that the organization purportedly affected by the embezzlement recorded the tip in a memorandum. Which type of evidence would the memorandum be considered?

Options:

A.

Testimonial evidence


B.

Incriminating evidence


C.

Documentary evidence


D.

Verbal evidence


Expert Solution
Questions # 33:

Which of the following is the LEAST ACCURATE statement about seizing a computer for examination?

Options:

A.

When taking a computer for examination, if the computer is off. it should remain off when it is removed.


B.

When seizing a computer that is running, it is acceptable for a fraud examiner to review the files contained on the machine prior to seizing it.


C.

Before removing a computer system from a scene for further analysis, it is important to document the system's setup with photographs or diagrams.


D.

When seizing a computer for examination, the seizing party should took around the area for passwords because many people leave passwords near their computers


Expert Solution
Questions # 34:

Shane, a Certified Fraud Examiner (CFE). is investigating Larsen. who is active on various social networking sites. Shane wants to search and extract information from Larson's social media postings so that it can be used in court as evidence Which of the following is the MOST ACCURATE statement regarding what Shane should do when conducting a social media investigation of Larsen?

Options:

A.

Shane should conduct a forensic shutdown of his computer to preserve the metadata in the social networking sites.


B.

Shane should preserve the information from the social networking sites so that it can be established as authentic if used in court.


C.

Shane should email himself the links of the postings so that he can retrieve them later.


D.

Shane should preserve the information by saving the links of the postings in his 'bookmarks"


Expert Solution
Questions # 35:

Why do fraud examiners perform analysis on unstructured, or textual, data?

Options:

A.

To determine whether the footnotes to the financial statements are fairly presented


B.

To find an admission of fraud m an email or other communication that can be presented in court


C.

To categorize data to reveal patterns, sentiments, and relationships indicative of fraud


D.

To figure out whether someone is lying or telling the truth based on context duet


Expert Solution
Questions # 36:

Which of the following statements concerning access to nonpublic records is FALSE?

Options:

A.

When civil litigation has commenced, a party often may obtain a subpoena or legal order for an individual's relevant bank records.


B.

A fraud examiner can request a business's bank records even if the business is not legally obligated to comply.


C.

An audit clause can be designed to allow a party to inspect the books of a business partner or vendor.


D.

During the government's criminal investigation, a fraud examiner not employed by the government has a right to access relevant documents that the government has obtained.


Expert Solution
Questions # 37:

Which of the following types of information would LEAST LIKELY be found when searching external sources without the subject's consent or a legal order?

Options:

A.

A witness's address


B.

Assets owned by a subject


C.

A subject's employee personnel file


D.

A competitor's ownership information


Expert Solution
Questions # 38:

An investigator is preparing to administer what is likely to be an intense and extended interview with a fraud suspect. To organize their thoughts prior to the interview, the fraud examiner should:

Options:

A.

Provide the suspect with a list of questions to ensure detailed responses-


B.

Make a list of key points to go over with the respondent.


C.

Develop a list of questions ranked in order of importance.


D.

Memorize a detailed list of questions, but avoid taking a written list to the interview


Expert Solution
Questions # 39:

Which of the following BEST describes the data analytics approach known as predictive analytics?

Options:

A.

The employment of a learning algorithm that identifies similarities, patterns, or anomalies within a data set on its own, without human involvement


B.

The configuration of a business program to emulate and integrate the actions of a human to execute certain business processes thus increasing efficiency and automating repetitive manual tasks


C.

The use of historical data, along with analyses, statistics, and machine learning components, to build a mathematical model that captures important trends and creates a quantitative forecast


D.

The use of layered artificial neural networks to accommodate more data and more sophisticated algorithms to identify complex patterns


Expert Solution
Questions # 40:

Which of the following is NOT a function of a fraud examination report?

Options:

A.

To convey all the evidence necessary for other parties to thoroughly evaluate the case


B.

To add credibility to the fraud examiner's work


C.

To corroborate previously known facts


D.

To communicate the fraud examiner's qualifications for providing opinions about the case


Expert Solution
Viewing page 4 out of 6 pages
Viewing questions 31-40 out of questions