The term_____________refers to a process of resolving allegations of fraud from inception to disposition.
Which of the following is an important factor that fraud examiners should consider when determining whether evidence should be disposed of after a fraud examination has concluded?
Why is it necessary to image a seized computer's hard drive for forensic analysis?
Which of the following is NOT a recommended strategy when conducting admission-seeking interviews?
Beta, a Certified Fraud Examiner (CFE). is conducting an admission-seeking interview of Gamma, a fraud suspect. After Beta gave Gamma an appropriate rationalization for his conduct, Gamma continued his denials, giving various alibis. These alibis can usually be diffused by all of the following techniques EXCEPT:
Which of the following is the LEAST ACCURATE statement about seizing a computer for examination?
Which of the following data is the MOST DIFFICULT to recover during a digital forensic examination?
If an important witness becomes hostile and argumentative during an interview, the interviewer should generally.
Christopher, a fraud examiner, is conducting an admission-seeking interview with Jennifer, an employee suspected of stealing cash. Which of the following is the LEAST EFFECTIVE phrasing for Christopher to use when posing an admission-seeking question to Jennifer?
Lmdsey, a Certified Fraud Examiner (CFE). has been retained to investigate allegations of bribery and kickbacks allegedly committed by a member of an organization's procurement department. Lindsey conducts an interview during which one of the accused's colleagues states that they overheard the accused discussing a free tnp received from one of the organization's vendors. Which type of evidence would the interviewee's statement be considered?
Which of the following statements about the limitations of using online databases for public record searches is MOST ACCURATE?
Caroline, a fraud examiner, is conducting an admission-seeking interview with John, an employee suspected of stealing cash. Which of the following is the MOST effective phrasing for Caroline to use when posing an admission-seeking question to John?
Leslie, a fraud examiner for ACME Corporation, suspects that a salesperson for another company has defrauded ACME. Leslie wants to obtain a copy of the suspect individual's credit report and personal data from a third-party information broker If Leslie works in a jurisdiction that regulates the distribution of personal credit information, she generally can obtain the information if she has the consent of the individual.
Which of the following sets of numbers could a fraud examiner MOST LIKELY benefit from running a Benford’s Law analysis on?
If your suspect is spending suspected illicit funds on consumables (e.g.. travel and entertainment) and you need to prove their illicit income circumstantially, which of the following methods of tracing assets would yield the BEST result?
Which of the following is NOT a step a fraud examiner must take before seizing evidence in a digital forensic investigation?
When reporting the results of a fraud examination, it is BEST to include copies (not originals) of important documents in the formal report.
Lisa, a fraud examiner at a private company, receives an anonymous call from a potential whistleblower. The whistleblower is hesitant to reveal their identity but will do so if it can be Kept fully confidential. Which of the following statements is MOST ACCURATE?
Boyd, a Certified Fraud Examiner (CFE). was hired to trace Lottie's financial transactions. During his investigation. Boyd obtains records of electronic payments that Lottie made during the past five years. Which of the following are these records MOST LIKELY to reveal?
Which of the following statements about how fraud examiners should approach fraud examinations is FALSE?
Rachel, a fraud suspect, has decided to confess to Linda, a Certified Fraud Examiner (CFE). In obtaining a verbal confession from Rachel. Linda should obtain all of the following items of information EXCEPT:
Which of the following types of files is the most difficult to recover during a digital forensic examination?
Assuming that a jurisdiction has prohibited pretexting against financial institutions, which of the following actions would constitute illegal pretexting?
When planning for the interview phase of an investigation, which of the following steps should NOT be taken by the fraud examiner?
If you are seizing a computer for forensic analysis, why is it generally necessary to seize any copiers connected to it?
During an interview with Alice, a suspect in an embezzlement case, the interviewer observes several signs of stress in Alice's behavior, such as shifting around in her chair, exhibiting shallow breathing, and occasionally stuttering during her replies. The interviewer should conclude that these symptoms are caused by deception.
Talia has been hired by SBS Inc. to implement a new data analysis program to search for warning signs of potential fraud within the company. Which of the following steps should Talia conduct first to MOST EFFECTIVELY use data analysis techniques for such an initiative?
After completing all necessary investigative steps. Erica, a Certified Fraud Examiner (CFE), is reasonably sure that Justine, her primary suspect, committed the fraud in question. Before scheduling an admission-seeking interview with Justine, what else should Erica be reasonably sure of?
Vishal, a Certified Fraud Examiner (CFE). has just initiated an interview with Steve, a fraud suspect. After a short introduction. Vishal jokes about the fact that he and Steve are wearing the same tie and then proceeds to ask Steve about the previous night's major sporting event Vishal is attempting to
Louis, a Certified Fraud Examiner (CFE). is investigating a potential internal fraud case originating from a whistteblower tip about embezzlement. He discovers that the organization purportedly affected by the embezzlement recorded the tip in a memorandum. Which type of evidence would the memorandum be considered?
Andrew wants to use a confidential informant in his investigation. He plans to compensate the informant with cash and obtain a receipt. He also plans to identify his source in a memorandum and his final report using only the informant's initials. Which of Andrew's plans is NOT considered a best practice when using an informant?
Gilbert is preparing to conduct a covert investigation. Before acting, he wants to wnte a memorandum documenting his plan. Which of the following pieces of information should he include in this memorandum?
Orlando is conducting a fraud examination regarding Fast Freight, a large publicly traded corporation, and wants to find the current officers and directors of the company. Which of the following would be the best source of information for this purpose?
Amanda needs to know the location of the principal office and the date of incorporation of a company she is investigating. Which of the following would be the BEST source of this information?
Due to risks of illicit transactions, most jurisdictions require financial institutions to obtain information about which of the following from an institution with which they have a foreign correspondent relationship?
Which of the following types of data is BEST suited for a BenfordTs Law analysis?
Which of the following is the MOST ACCURATE statement regarding a fraud examiner’s ability to trace cryptocurrency transactions?
Al needs to know the location of the principal office and the initial shareholders of a company he is investigating. Which of the following would be the BEST source of this reformation?
Which of the following is a measure that can help avoid alerting suspected perpetrators who are under investigation?
Which of the following should be done to prepare an organization for a formal fraud investigation?
Which of the following statements concerning access to nonpublic records is FALSE?
Which of the following statements concerning access to nonpublic records is MOST ACCURATE?
Barnes, a Certified Fraud Examiner (CFE). is using data analysis to identify anomalies that might indicate fraud in XYZ Company's accounts payable transactions. Which of the following is the MOST EFFECTIVE data analysis function that Barnes could use to look for potential fraud in accounts payable?
Which of the following is the MOST ACCURATE statement regarding the analysis phase in digital forensic investigations?
A law enforcement officer receives a reliable tip from an informant that a government employee is soliciting bribes in exchange for awarding contracts to the employee's agency. To investigate, the officer poses as a potential contractor and contacts the suspect employee about the possibility of getting a contract with the agency. During the conversation, the suspect demands a cash payment for the officer to be considered for upcoming contracts. If the suspect claims entrapment at trial, then which of the following is MOST LIKELY to occur?
Which of the following situations would probably NOT require access to nonpublic records to develop evidence?