Pre-Summer Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

CFE-Investigation Sample Questions Answers

Questions 4

Lisa, a fraud examiner at a private company, receives an anonymous call from a potential whistleblower. The whistleblower is hesitant to reveal their identity but will do so if it can be Kept fully confidential. Which of the following statements is MOST ACCURATE?

Options:

A.

Lisa may offer the whistleblower full confidentiality because they are not a suspect

B.

Lisa should explain that she will try her best to keep the whistleblower"s identity confidential.

C.

Lisa should state that she will not be able to keep the whistleblower's identity confidential because all information must be disclosed to management

D.

Lisa may promise the whistleblower full confidentiality, even if she knows her statement is untrue, because the lie is ultimately beneficial to her employer.

Buy Now
Questions 5

John, a fraud investigator, is interviewing Mary, who he suspects has been embezzling company funds. Which of the following is the recommended approach John should use to ask Mary questions?

Options:

A.

Start with questions about unknown information and work toward known information

B.

Ask questions in random order to keep Mary from guessing the next question

C.

Start with specific questions and move toward general questions

D.

Seek general information before seeking specific details

Buy Now
Questions 6

Fraud examination reports should be written with which of the following audiences in mind?

Options:

A.

The media

B.

Opposing legal counsel

C.

Investors and owners

D.

All of the above

Buy Now
Questions 7

In response to an accusation made during an admission-seeking interview, the subject begins to voice a denial to the charge. How should the interviewer react to the first indication of a subject's denial?

Options:

A.

Allow the subject 1o continue denying the charge

B.

Argue the point directly with the subject until a confession is obtained

C.

Remind the subject of the laws against perjury.

D.

Interrupt the denial by using a delaying tactic.

Buy Now
Questions 8

Rachel, a fraud suspect, has decided to confess to Linda, a Certified Fraud Examiner (CFE). In obtaining a verbal confession from Rachel. Linda should obtain all of the following items of information EXCEPT:

Options:

A.

The approximate beginning and end dates of the fraud

B.

A statement from Rachel that her conduct was an accident

C.

A general estimate of the amount of money involved

D.

Rachel's motive for the offense

Buy Now
Questions 9

Smith, a Certified Fraud Examiner (CFE) for the Ajax Co.. observes Jones, an accounts payable clerk, driving an expensive sports car to work. Smith also has knowledge that Jones recently had extensive remodeling done on her residence. Smith has sufficient predication to:

Options:

A.

Conduct discreet inquiries into Jones's responsibilities as an accounts payable clerk

B.

Notify management of the possibility that Jones has committed fraudulent acts.

C.

Search Jones's mobile phone for evidence of misconduct

D.

Accuse Jones directly of having committed fraud.

Buy Now
Questions 10

Bobbie, a fraud examiner, is preparing to interview Craig, a close friend and coworker of the primary suspect in the case. Craig has been described by others as "easily angered" and "intense" How should Bobbie approach her interview of Craig?

Options:

A.

Provide Craig with plenty of notice prior to the interview to not provoke resentment

B.

Conduct the interview with as little notice as possible so Craig will be unprepared

C.

Ask Craig when ho would prefer to be interviewed in an effort to engender cooperation

D.

Avoid interviewing Craig if possible due to Craig's potential volatility

Buy Now
Questions 11

Elsa, a fraud examiner at ABC Corp., is interviewing Leah, a fraud suspect. Leah allegedly committed a fraud scheme that resulted in a loss of $200,000 for ABC. Elsa asks Leah directly whether she was involved in the fraud. Which of the following responses from Leah is MOST LIKELY an indication that she is being deceptive?

Options:

A.

“No, I have never stolen anything from ABC.”

B.

“I had no involvement with the scheme.”

C.

“Why would I do something like that?”

D.

“No, I did not commit fraud against ABC.”

Buy Now
Questions 12

Jade, a Certrfied Fraud Examiner (CFE). is conducting an internal investigation in which an employee is suspected of stealing inventory and selling it through a possible shell company called Hidden Finds. LLC. When Jade tries to check Hidden Finds' website, a message appears that redirects customers to a web address that ends with onion To view the website's content. Jade will need to install a specialized web browser that enables her to access which of the following?

Options:

A.

The deep archives

B.

The free web

C.

The dark web

D.

The internet archives

Buy Now
Questions 13

If an important witness becomes hostile and argumentative during an interview, the interviewer should generally.

Options:

A.

Avoid reacting to the witness.

B.

Refute the witness's arguments

C.

Try to reason with the witness

D.

Terminate the interview.

Buy Now
Questions 14

Which of the following is NOT one of the main limitations of conducting a search for public records using online databases?

Options:

A.

Online public records searches are limited in the jurisdictions they cover.

B.

Public records database companies are difficult to find.

C.

Online coverage of public records varies widely from jurisdiction to jurisdiction

D.

The timeliness and accuracy of information in online databases must be validated

Buy Now
Questions 15

Allison, a Certified Fraud Examiner (CFE). is investigating a potential procurement fraud scheme. While interviewing a subject, she asks. "Why did you choose to do business with that vendor?" This can BEST be described as a(n):

Options:

A.

Open question

B.

Complex question

C.

Leading question

D.

Closed question

Buy Now
Questions 16

Which of the following is TRUE of a follow-up/recommendations section in a written fraud examination report?

Options:

A.

A follow-up recommendations section is a required part of every written fraud examination report

B.

A follow-up/recommendations section calculates the amount of fraud-related loss sustained by the organization

C.

A follow-up/recommendations section should state remedial measures for the organization to undertake

D.

All of the above

Buy Now
Questions 17

Management at Oak Company has asked Arthur, an internal auditor, to implement a data analysis program to search for warning signs of potential fraud within the company. Which of the following steps should Arthur conduct first to MOST effectively use data analysis techniques for such an initiative?

Options:

A.

Analyze the data.

B.

Cleanse and normalize the data

C.

Build a profile of potential frauds.

D.

Obtain the data.

Buy Now
Questions 18

Eugene is conducting an admission-seeking interview of a suspect. During the interview, the suspect frequently looks away from Eugene while responding to questions. Eugene can safely conclude that the suspect is dishonest due to his failure to maintain eye contact.

Options:

A.

True

B.

False

Buy Now
Questions 19

Which of the following statements would be IMPROPER if included in the fraud examination report of a Certified Fraud Examiner (CFE» who is also qualified as an accounting expert?

Options:

A.

"The company's internal controls were wholly inadequate to prevent this type of violation and should be remediated at the earliest possible time."

B.

"The evidence shows that expenses in excess of $5 million were omitted from the company's financial statements "

C.

"Based on statements the suspect made to me. it is my assessment that the suspect has a dishonest disposition."

D.

"From my examination, it appears that the company's financial statements were not presented in accordance with generally accepted accounting principles "

Buy Now
Questions 20

Which of the following is a recommended strategy when conducting admission-seeking interviews?

Options:

A.

Increase sympathy while downplaying implications of wrongdoing.

B.

Ensure that accusations are made in the presence of a third party to avoid potential liability

C.

Emphasize a lack of morality in the subject's actions to induce them into confessing.

D.

Use time constraints as a means to pressure the subject into making a confession.

Buy Now
Questions 21

Which of the following is a unique challenge of cloud forensics that is not encountered in traditional forensic practices?

Options:

A.

Lack of corroborating evidence

B.

Lack of data control

C.

Lack of trust from cloud providers

D.

Lack of relevant data

Buy Now
Questions 22

Which of the following is the MOST IMPORTANT question for a fraud examiner to ask before commencing a legal action to recover assets?

Options:

A.

"Is there a relevant statute of limitations9"

B.

"Does the suspect already have a criminal record?"

C.

"Is the suspect guilty of the fraudulent act?''

D.

"Are nonlegal recovery methods or remedies available?''

Buy Now
Questions 23

An investigator is preparing to administer what is likely to be an intense and extended interview with a fraud suspect. To organize their thoughts prior to the interview, the fraud examiner should:

Options:

A.

Provide the suspect with a list of questions to ensure detailed responses-

B.

Make a list of key points to go over with the respondent.

C.

Develop a list of questions ranked in order of importance.

D.

Memorize a detailed list of questions, but avoid taking a written list to the interview

Buy Now
Questions 24

Steve, a Certified Fraud Examiner (CFE). was interviewing Michelle, a fraud suspect. Dunng the first part of the interview. Michelle was attentive. However, when he asked her more direct questions about the fraud, she suddenly seemed unconcerned, alternately chewing on her pen cap and picking at a loose piece of fabric on the arm of her chair. From this conduct. Steve is likely to conclude that Michelle

Options:

A.

Is feeling bored by the interview process

B.

Is being deceptive

C.

Does not know the answers to Steve's questions

D.

Is telling the truth

Buy Now
Questions 25

Which of the following is a reason why a subject's credit card records and statements can be useful in tracing investigations?

Options:

A.

Credit card records can provide leads to help identify a subjects hidden assets

B.

Credit card records can show signs that the subject has skimmed funds.

C.

Credit card statements show the source of the funds used to pay a credit card bill.

D.

Credit card statements provide insight into the subject's litigation history

Buy Now
Questions 26

Quincy, a Certified Fraud Examiner (CFE), is investigating a payroll fraud scheme. While interviewing a subject in the case, Quincy asks, “What year did you start working in the accounting department?” This can MOST ACCURATELY be described as a(n) ______ question.

Options:

A.

Complex

B.

Open

C.

Leading

D.

Closed

Buy Now
Questions 27

Which of the following is the MOST ACCURATE statement concerning the volatility of digital evidence?

Options:

A.

Digital evidence is more volatile than tangible evidence because digital evidence is subject to claims of spoliation, whereas tangible evidence is not.

B.

Digital evidence is more volatile than tangible evidence because the rules of admissibility for digital evidence are stricter than such rules for tangible evidence.

C.

If the integrity of digital evidence is violated, it can often be restored through a digital cleansing process

D.

The failure to preserve the integrity of digital evidence could result in evidence being deemed inadmissible in a legal proceeding

Buy Now
Questions 28

Why is it necessary to image a seized computer's hard drive for forensic analysis?

Options:

A.

To prohibit access to the suspect computer's hard drive by individuals not professionally trained in forensic analysis

B.

To allow for the analysis of data from a suspect computer without altering or damaging the original data in any way

C.

To create pictures of the suspect computer system and its wires and cables

D.

To enable the retrieval of data from the suspect computer directly via its operating system

Buy Now
Questions 29

Which of the following types of information would LEAST LIKELY be found when searching external sources without the subject's consent or a legal order?

Options:

A.

A witness's address

B.

Assets owned by a subject

C.

A subject's employee personnel file

D.

A competitor's ownership information

Buy Now
Questions 30

Which of the following is the MOST ACCURATE statement about trying to locate a subject using online records?

Options:

A.

Most public records services do not maintain a list of past addresses

B.

Obtaining a past address of the subject should be the first step in trying to locate a subject using online records

C.

The first step in locating someone using online records is to obtain a list of past employers

D.

Online records are generally not useful in locating subjects whose address is unknown

Buy Now
Questions 31

A fraud examiner is based in Mexico, a non-European Union (EU) country, and is collecting personal information from their company's human resources (HR) files about an employee based in Germany, an EU country. Based on these facts, the fraud examiner would need to comply with the EU"s General Data Protection Regulation (GDPR) when conducting their internal investigation.

Options:

A.

True

B.

False

Buy Now
Questions 32

Which of the following is NOT a common use of public sources of information?

Options:

A.

Searching an individual's income tax filings

B.

Obtaining background information on individuals

C.

Locating people and their assets

D.

Corroborating or refuting witness statements

Buy Now
Questions 33

Sylvia, a novice interviewer, asks Adam, the respondent, the following question: "Didn't you know that something wasn't right?" This kind of question is called a_____________question.

Options:

A.

Double-negative

B.

Free narrative

C.

Controlled answer

D.

Complex

Buy Now
Questions 34

Al needs to know the location of the principal office and the initial shareholders of a company he is investigating. Which of the following would be the BEST source of this reformation?

Options:

A.

The organizational filings with the government of the jurisdiction in which the company is incorporated

B.

The contractual documents regarding real properly owned by the corporation

C.

The utility records in the municipality where the corporation has its principal office

D.

The shareholder data form filed with the World Bank

Buy Now
Questions 35

Which of the following situations would MOST LIKELY require access to nonpublic records to develop evidence?

Options:

A.

Finding out where a person lives

B.

Reviewing an individual's personal mobile phone records

C.

Obtaining a company's business filings

D.

Determining who owns a piece of real estate

Buy Now
Questions 36

Tonya, a suspect in a kickback scheme, is being interviewed by Carlos, a fraud examiner. As the interview progresses. Carlos notices that Tonya is exhibiting signs of stress, such as repeatedly touching her face, crossing and uncrossing her legs, and darting her eyes around the room Carlos should conclude that Tonya's behavior is the result of deception

Options:

A.

True

B.

False

Buy Now
Questions 37

Which of the following is the MOST ACCURATE statement regarding the analysis phase in digital forensic investigations?

Options:

A.

When analyzing data for evidence, fraud examiners should look for exculpatory evidence But not inculpatory evidence

B.

During the analysis phase, it is best to use just one forensic tool for identifying, extracting, and collecting digital evidence

C.

The primary concern when analyzing digital evidence is to maintain the integrity of the data at all times

D.

The analysis phase of digital forensic investigations should not commence unless it is venfied that the suspect devices do not contain relevant data

Buy Now
Questions 38

Susan, a Certified Fraud Examiner (CFE). is conducting an ad mission-seeking interview of Beth, a fraud suspect. After Susan gave Beth a suitable rationalization for her conduct. Beth continued her denials, giving various alibis. Which of the following would be the LEAST EFFECTIVE technique for Susan to use in this situation?

Options:

A.

Displaying evidence that specifically contradicts Beth's alibis

B.

Discussing some of Beth's prior deceptions

C.

Discussing the testimony of other witnesses

D.

Displaying all the evidence she has against Beth at once

Buy Now
Questions 39

Which of the following situations would probably NOT require access to nonpublic records to develop evidence?

Options:

A.

Obtaining personal health care records

B.

Accessing banking records to trace assets

C.

Reviewing a company's business filings

D.

Analyzing an individual's personal mobile phone records

Buy Now
Questions 40

Which of the following data is the MOST DIFFICULT to recover during a digital forensic examination?

Options:

A.

Time and date information about files

B.

Websites visited

C.

Files that have been overwritten

D.

Communications sent via instant messenger

Buy Now
Questions 41

Butler, a Certified Fraud Examiner (CFE), needs to obtain a copy of a statement that the chief executive officer (CEO) of Accord Investments, a venture capital firm, posted on the firm's website sometime last year. Unfortunately, the quote has been removed from the website. Which of the following resources would be the BEST choice for Butler to consult to find an earlier version of the web page that he needs?

Options:

A.

The invisible archives

B.

The free web

C.

The internet archives

D.

The deep web

Buy Now
Questions 42

Which of the following would be most useful in determining when a specific document file was created?

Options:

A.

The document's metadata

B.

Internet activity data

C.

The system tog

D.

Operating system partition

Buy Now
Questions 43

Which of the following is the MOST ACCURATE statement about how fraud examiners shook! approach fraud examinations?

Options:

A.

Fraud examinations should begin with general information that is known, starting at the periphery, and then move to the more specific details.

B.

When conducting fraud examinations, fraud examiners should adhere to the means-and-ends approach

C.

When conducting fraud examinations, fraud examiners should operate under the assumption that the subjects are guilty

D.

In most examinations, fraud examiners should interview those who are more involved in the matters at issue before interviewing those who are less involved.

Buy Now
Questions 44

Which of the following statements about fraud response plans is FALSE?

Options:

A.

A fraud response plan outlines the actions an organization will take when suspicions of fraud have arisen.

B.

A fraud response plan should create an environment to minimize risk and maximize the potential for success

C.

A fraud response plan must be simple to understand and administer

D.

A fraud response plan should specify how every fraud examination should be conducted regardless of the type of fraud

Buy Now
Questions 45

Which of the following statements about the limitations of using online databases for public record searches is MOST ACCURATE?

Options:

A.

Public records featured in electronic formats include too much detail to be efficiently analyzed.

B.

Availability of public records through online databases varies widely across jurisdictions.

C.

The public records produced by online database searches rarely contain correct information.

D.

It is very difficult to find a legitimate online database for accessing public records.

Buy Now
Questions 46

Pedro, a Certified Fraud Examiner (CFE). is conducting an admission-seeking interview of Manuel, a fraud suspect. After Pedro diffused Manuel's alibis. Manuel became withdrawn and stowty began to slouch m his chair, bowing his head and beginning to cry. What should Pedro do now?

Options:

A.

Leave the room for a short lime

B.

Ask Manuel to sit up straight

C.

Demand that Manuel stop crying.

D.

Present an alternative question.

Buy Now
Questions 47

Which of the following is NOT a recommended strategy when conducting admission-seeking interviews?

Options:

A.

Conduct admission-seeking interviews only when time is not a factor.

B.

Ensure that accusations are made under conditions of privacy to avoid potential liability

C.

Minimize empathy while emphasizing the perception of moral wrongdoing

D.

Present a morally acceptable reason for the subject's behavior

Buy Now
Questions 48

Thea is conducting a fraud examination for a company and suspects one of the company's vendors (a one-person operation) of fraudulent billing. Thea wants to obtain a copy of the suspect individual's credit report and personal data from a third-party information broker. If Thea works in a jurisdiction that regulates the distribution of personal credit information, she cannot obtain the suspect's personal credit data under any circumstances.

Options:

A.

True

B.

False

Buy Now
Questions 49

Caroline, a fraud examiner, is conducting an admission-seeking interview with John, an employee suspected of stealing cash. Which of the following is the MOST effective phrasing for Caroline to use when posing an admission-seeking question to John?

Options:

A.

"Why did you take the money?"

B.

"What do you know about the stolen money?"

C.

"Do you know who took the money''"

D.

"Did you steal the money?"

Buy Now
Questions 50

Which of the following statements regarding the data analytics approach known as predictive analytics is MOST ACCURATE?

Options:

A.

In predictive analytics, layered artificial neural networks are used to accommodate more data and more sophisticated algorithms to identify complex patterns.

B.

Predictive analytics involves configuring a program that imitates and integrates the actions of a human to execute certain business processes, which increases efficiency and automates repetitive manual tasks.

C.

Predictive analytics involves the use of historical data, analyses, statistics, and machine learning components to build a model that depicts important trends and creates a quantitative projection about future outcomes.

D.

In predictive analytics, computer systems are used to perform human tasks, such as visual perception and decision-making.

Buy Now
Questions 51

Which of the following data analysis functions is used to determine whether company policies are met by employee transactions, such as verifying that traveling employees book their accommodations at approved hotels?

Options:

A.

The correlation analysis function

B.

The Join function

C.

The gap testing function

D.

The compliance verification function

Buy Now
Questions 52

Sarah is conducting an admission-seeking interview of a suspect. Throughout the interview, the suspect makes little eye contact with Sarah. Based on this information atone, can Sarah conclude that the suspect is being deceptive?

Options:

A.

Yes, because it is safe to assume that suspects who avoid eye contact are most likely being deceptive.

B.

Yes, because avoiding eye contact is a sign of deceptive.

C.

No, because this is not enough information to conclude that the suspect is being deceptive

D.

No, because avoiding eye contact is not directly linked to deception.

Buy Now
Questions 53

Tara. a Certified Fraud Examiner (CFE). is searching social media sites for evidence in a fraud investigation. Which of the following is the MOST ACCURATE statement regarding what Tara should do when mining social media sites for evidence of fraud?

Options:

A.

Tara should preserve the information by saving the links of the postings as bookmarks in her browser.

B.

Tara should preserve the metadata by printing out the web pages of each of the postings.

C.

Tara should conduct a forensic shutdown of the computer to preserve the metadata m the social networking sites.

D.

Tara should preserve the information from the sites so that it can be established as authentic if used in court.

Buy Now
Questions 54

Which of the following statements is MOST ACCURATE regarding how a fraud examiner should prepare for an interview with a subject from a different jurisdiction?

Options:

A.

A fraud examiner does not need to research cultural considerations such as personal space and eye contact.

B.

A fraud examiner should find out whether there are limitations on the use of information obtained during an interview

C.

Failing to observe cultural norms is not a concern if the interviewer is from a different country than the interviewee

D.

Consulting with legal counsel is only necessary when an investigation spans multiple junsdictions

Buy Now
Exam Code: CFE-Investigation
Exam Name: Certified Fraud Examiner (CFE) - Investigation
Last Update: Apr 14, 2026
Questions: 181
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now CFE-Investigation