11.11 Big Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

CFE-Investigation Certified Fraud Examiner (CFE) - Investigation Questions and Answers

Questions 4

Steve, a Certified Fraud Examiner (CFE). was interviewing Michelle, a fraud suspect. Dunng the first part of the interview. Michelle was attentive. However, when he asked her more direct questions about the fraud, she suddenly seemed unconcerned, alternately chewing on her pen cap and picking at a loose piece of fabric on the arm of her chair. From this conduct. Steve is likely to conclude that Michelle

Options:

A.

Is feeling bored by the interview process

B.

Is being deceptive

C.

Does not know the answers to Steve's questions

D.

Is telling the truth

Buy Now
Questions 5

Which of the following types of data is BEST suited for a BenfordTs Law analysis?

Options:

A.

Employee identification numbers

B.

Telephone numbers

C.

A listing of payment amounts

D.

Vendor addresses

Buy Now
Questions 6

Mila. a Certified Fraud Examiner (CFE). needs to obtain court records and wants to be as sure as possible that the records are accurate In most countries, the most reliable way lo obtain these documents is to obtain them directly from the court authorities.

Options:

A.

True

B.

False

Buy Now
Questions 7

Which of the following is a best practice for obtaining a signed statement?

Options:

A.

Make sure that everything is included in the signed statement and that no addendum are made

B.

Have the suspect write out the entire statement in their own handwriting

C.

Have two individuals witness the signing of the document when possible.

D.

Include all of the subject's offenses, whether related or not, in a angle document.

Buy Now
Questions 8

Gilbert is preparing to conduct a covert investigation. Before acting, he wants to wnte a memorandum documenting his plan. Which of the following pieces of information should he include in this memorandum?

Options:

A.

The information expected to be gained from the operation

B.

The identities of any confidential sources to be used in the operation

C.

His first impression regarding the subject's culpability

D.

All of the above

Buy Now
Questions 9

Which of the following is the MOST APPROPRIATE measure when seeking to avoid alerting suspected perpetrators who are under investigation?

Options:

A.

Terminate the suspected employee.

B.

Delay taking any action.

C.

Investigate during nonbusiness hours.

D.

Disclose the investigation to all employees

Buy Now
Questions 10

John, a fraud investigator, is interviewing Mary, who he suspects has been embezzling company funds. Which of the following is the recommended approach John should use to ask Mary questions?

Options:

A.

Start with questions about unknown information and work toward known information

B.

Ask questions in random order to keep Mary from guessing the next question

C.

Start with specific questions and move toward general questions

D.

Seek general information before seeking specific details

Buy Now
Questions 11

Which of the following is NOT a best practice for obtaining a signed statement?

Options:

A.

Add subsequent facts to the statement as an addendum.

B.

Have the suspect write out the entire statement in their own handwriting

C.

Prepare separate statements for unrelated offenses

D.

Have two individuals witness the signing of the document when possible.

Buy Now
Questions 12

Baker, a Certified Fraud Examiner (CFE). is assigned to the internal audit department of the ABC Company. He is getting ready to conduct an interview with another company employee who might be involved in a fraud. In general, what title should Baker use in his introduction to the employee?

Options:

A.

Baker should omit a title altogether

B.

Investigator

C.

Auditor

D.

Certified Fraud Examiner

Buy Now
Questions 13

Which of the following is considered a best practice for preserving the confidentiality of a fraud investigation?

Options:

A.

Suspend all employees involved in the investigation pending the investigation's outcome.

B.

Ensure that the investigation is conducted at the direction of, or under the supervision of. a government official

C.

Avoid using email or other electronic means to transmit confidential case information

D.

Implement a blanket policy prohibiting all employees from discussing anything related to employee investigations

Buy Now
Questions 14

Which of the following situations would MOST LIKELY require access to nonpublic records to develop evidence?

Options:

A.

Finding out where a person lives

B.

Reviewing an individual's personal mobile phone records

C.

Obtaining a company's business filings

D.

Determining who owns a piece of real estate

Buy Now
Questions 15

Which of the following is NOT a step a fraud examiner must take before seizing evidence in a digital forensic investigation?

Options:

A.

Obtain and become familiar with any legal orders that apply to the investigation

B.

Assemble an investigation team comprised only of outside digital forensic experts

C.

Ensure that only trained professionals employ any software used in a forensic capacity

D.

Determine whether there are privacy issues related to the item(s) to be searched.

Buy Now
Questions 16

Misty, a fraud investigator, is interviewing Larry, who she suspects has been embezzling company funds. Which of the following is NOT a recommended sequence in which Misty should ask Lam/ questions?

Options:

A.

Ask questions in random order to prevent Larry from knowing what question comes next.

B.

Start with questions about known information and work toward unknown information

C.

Start with general questions and move toward specific questions

D.

Ask questions seeking general information before seeking details

Buy Now
Questions 17

Which of the following is TRUE of a follow-up/recommendations section in a written fraud examination report?

Options:

A.

A follow-up recommendations section is a required part of every written fraud examination report

B.

A follow-up/recommendations section calculates the amount of fraud-related loss sustained by the organization

C.

A follow-up/recommendations section should state remedial measures for the organization to undertake

D.

All of the above

Buy Now
Questions 18

After completing all necessary investigative steps. Erica, a Certified Fraud Examiner (CFE), is reasonably sure that Justine, her primary suspect, committed the fraud in question. Before scheduling an admission-seeking interview with Justine, what else should Erica be reasonably sure of?

Options:

A.

That Justine will confess to the accusation when prompted

B.

That Justine's employer will take disciplinary action against Justine if she confesses

C.

That the interview's time, place, and content can De controlled

D.

That no other person was involved in the fraud n question

Buy Now
Questions 19

A fraud examiner is based in Mexico, a non-European Union (EU) country, and is collecting personal information from their company's human resources (HR) files about an employee based in Germany, an EU country. Based on these facts, the fraud examiner would need to comply with the EU"s General Data Protection Regulation (GDPR) when conducting their internal investigation.

Options:

A.

True

B.

False

Buy Now
Questions 20

Which of the following statements about the process of obtaining a verbal confession is NOT true?

Options:

A.

The transition from the accusation to the confession should occur when the accused supplies the first detailed information about the offense.

B.

Fraudsters tend to overestimate the amount of funds involved in the offense to relieve themselves of the guilt of their dishonest actions.

C.

If the subject lies about an aspect of the offense in the process of confessing, it is best to proceed initially as if the falsehood has been accepted as truth.

D.

The three general approaches to obtaining a verbal confession are chronologically, by transaction, or by event.

Buy Now
Questions 21

Which of the following is NOT a function of a fraud examination report?

Options:

A.

To convey all the evidence necessary for other parties to thoroughly evaluate the case

B.

To add credibility to the fraud examiner's work

C.

To corroborate previously known facts

D.

To communicate the fraud examiner's qualifications for providing opinions about the case

Buy Now
Questions 22

If the following statements were included in a fraud examination report of a qualified expert, which of them would be IMPROPER?

Options:

A.

"When asked a second time about the amount of funds missing, the suspect contradicted their previous testimony."

B.

"The evidence shows that between S1 million and S1.5 million in assets were transferred to an offshore account."

C.

"The organization must address the inadequate separation of accounting duties to prevent such an event from happening again."

D.

"In light of all the evidence, the suspect is most likely guilty of fraud against the organization."

Buy Now
Questions 23

Charles, a fraud examiner, accuses George of fraud during an admission-seeking interview. George immediately denies the charge How should Charles respond to George's denial?

Options:

A.

Counter the denial by arguing with George until further denials are futile

B.

Use a delaying tactic to interrupt the denial

C.

Remind George he has to tell the truth or face perjury.

D.

Allow George to continue denying the charge.

Buy Now
Questions 24

Which of the following is NOT a recommended strategy when conducting admission-seeking interviews?

Options:

A.

Conduct admission-seeking interviews only when time is not a factor.

B.

Ensure that accusations are made under conditions of privacy to avoid potential liability

C.

Minimize empathy while emphasizing the perception of moral wrongdoing

D.

Present a morally acceptable reason for the subject's behavior

Buy Now
Questions 25

Which of the following is NOT true about observing the reactions of interview subjects?

Options:

A.

The interpretation of an interview subject's reactions requires specific skills on the part of the interviewer.

B.

The observation of a subjects body language is often just as important as the observation of the words used by the subject.

C.

Emotive words should be used early in the interview to observe the respondents emotional reaction.

D.

To effectively observe reactions, an interviewer should move from less sensitive to more sensitive questions as the interview progresses.

Buy Now
Questions 26

Which of the following BEST describes the data analytics approach known as predictive analytics?

Options:

A.

The employment of a learning algorithm that identifies similarities, patterns, or anomalies within a data set on its own, without human involvement

B.

The configuration of a business program to emulate and integrate the actions of a human to execute certain business processes thus increasing efficiency and automating repetitive manual tasks

C.

The use of historical data, along with analyses, statistics, and machine learning components, to build a mathematical model that captures important trends and creates a quantitative forecast

D.

The use of layered artificial neural networks to accommodate more data and more sophisticated algorithms to identify complex patterns

Buy Now
Questions 27

Amanda needs to know the location of the principal office and the date of incorporation of a company she is investigating. Which of the following would be the BEST source of this information?

Options:

A.

The organizational filing with the government of the jurisdiction in which the company is incorporated

B.

The company's income tax filings

C.

The contractual records of any real property owned by the corporation

D.

The comprehensive litigation file in the local court in the jurisdiction in which the company is headquartered

Buy Now
Questions 28

Antonio is the former boyfriend of Hannah, a fraud suspect. He approaches Ashley, a fraud examiner at Hannah's company, and offers to provide critical information about Hannah's fraud in exchange for full confidentiality. Which of the following is the MOST APPROPRIATE response for Ashley to make?

Options:

A.

Ashley should explain that Antonio may have qualified confidentiality but that she cannot make any absolute assurances

B.

Ashley should promise Antonio unqualified confidentiality over all information provided

C.

Ashley should explain that all information must be disclosed to management so nothing Antonio says will be confidential

D.

Ashley should promise Antonio that his identity will not become known.

Buy Now
Questions 29

When documenting interviews, it is BEST practice for the interviewer to:

Options:

A.

Document notes for each interview separately, nduding those for electronic recordings.

B.

Write down verbatim all of (he information that the subject provides during the interview

C.

Err on the side of taking too many notes rather than too few.

D.

Note impressions regarding the subject's guilt or innocence.

Buy Now
Questions 30

Which of the following is the MOST ACCURATE statement about how fraud examiners shook! approach fraud examinations?

Options:

A.

Fraud examinations should begin with general information that is known, starting at the periphery, and then move to the more specific details.

B.

When conducting fraud examinations, fraud examiners should adhere to the means-and-ends approach

C.

When conducting fraud examinations, fraud examiners should operate under the assumption that the subjects are guilty

D.

In most examinations, fraud examiners should interview those who are more involved in the matters at issue before interviewing those who are less involved.

Buy Now
Questions 31

Shane, a Certified Fraud Examiner (CFE). is investigating Larsen. who is active on various social networking sites. Shane wants to search and extract information from Larson's social media postings so that it can be used in court as evidence Which of the following is the MOST ACCURATE statement regarding what Shane should do when conducting a social media investigation of Larsen?

Options:

A.

Shane should conduct a forensic shutdown of his computer to preserve the metadata in the social networking sites.

B.

Shane should preserve the information from the social networking sites so that it can be established as authentic if used in court.

C.

Shane should email himself the links of the postings so that he can retrieve them later.

D.

Shane should preserve the information by saving the links of the postings in his 'bookmarks"

Buy Now
Questions 32

Which of the following is a reason why a subject's credit card records are useful in tracing investigations?

Options:

A.

Credit card statements show source of the funds used to pay a credit card bill

B.

Credit card records show the movements and habits of the subject

C.

Credit card records provide insight into the subject's litigation history

D.

Credit card records contain information about the division and distribution of the subject's assets

Buy Now
Questions 33

Which of the following types of files is the most difficult to recover during a digital forensic examination?

Options:

A.

Overwritten files

B.

Deleted until

C.

Deleted link (shortcut) files

D.

Hidden files

Buy Now
Questions 34

Lisa, a fraud examiner at a private company, receives an anonymous call from a potential whistleblower. The whistleblower is hesitant to reveal their identity but will do so if it can be Kept fully confidential. Which of the following statements is MOST ACCURATE?

Options:

A.

Lisa may offer the whistleblower full confidentiality because they are not a suspect

B.

Lisa should explain that she will try her best to keep the whistleblower"s identity confidential.

C.

Lisa should state that she will not be able to keep the whistleblower's identity confidential because all information must be disclosed to management

D.

Lisa may promise the whistleblower full confidentiality, even if she knows her statement is untrue, because the lie is ultimately beneficial to her employer.

Buy Now
Questions 35

When documenting interviews, it is best practice for the interviewer to.

Options:

A.

Covertly record all interviews with potential suspects.

B.

Note impressions regarding the subject's guilt or innocence.

C.

Err on the side of taking too few notes rather than too many.

D.

Write down verbatim all the information that the subject provides

Buy Now
Questions 36

Anita is interviewing her client's employee, whom she suspects committed check fraud. During the interview. Anita asks if she can obtain account records from the suspect's bank If the suspect only gives Anita oral consent, the suspect's bank is required to allow Anita access to the suspect's account records.

Options:

A.

True

B.

False

Buy Now
Questions 37

Delta, an interviewer with little experience, asks Sigma, the respondent, the following question: "Were you aware that the signature was forged, and why didn't you tell anyone earlier?" This kind of question is called a_____________question

Options:

A.

Complex

B.

Controlled answer

C.

Free narrative

D.

Double-negative

Buy Now
Questions 38

Which of the following is the MOST ACCURATE statement about imaging suspect computers' hard drives?

Options:

A.

Imaging enables the retrieval of data from the suspect computer directly via its operating system.

B.

Imaging prohibits access to the suspect computer's hard drive by individuals not professionally trained in forensic analysis

C.

Imaging creates pictures of the suspect computer system and its wires and cables

D.

Imaging allows for the analysis of data from a suspect computer without altering or damaging the original data in any way

Buy Now
Questions 39

Which of the following is TRUE of a follow-up/recommendations section in a written fraud examination report?

Options:

A.

A follow-up/recommendations section is not a required part of every written fraud examination report

B.

A follow-up/recommendations section calculates the amount of loss caused by any misconduct identified during the investigation

C.

A follow-up/recommendations section must include a list of organizational failings that contnbuted to the fraud

D.

All of the above

Buy Now
Questions 40

Pedro, a Certified Fraud Examiner (CFE). is conducting an admission-seeking interview of Manuel, a fraud suspect. After Pedro diffused Manuel's alibis. Manuel became withdrawn and stowty began to slouch m his chair, bowing his head and beginning to cry. What should Pedro do now?

Options:

A.

Leave the room for a short lime

B.

Ask Manuel to sit up straight

C.

Demand that Manuel stop crying.

D.

Present an alternative question.

Buy Now
Questions 41

Vishal, a Certified Fraud Examiner (CFE). has just initiated an interview with Steve, a fraud suspect. After a short introduction. Vishal jokes about the fact that he and Steve are wearing the same tie and then proceeds to ask Steve about the previous night's major sporting event Vishal is attempting to

Options:

A.

Establish the interview theme

B.

Condition the witness.

C.

Establish rapport

D.

Exhibit passive listening.

Buy Now
Questions 42

Which of the following is one of the purposes of closing questions in a routine interview?

Options:

A.

To close the interview positively and maintain goodwill

B.

To assess whether the subject is ready to confess

C.

To confirm the credibility of the witness being interviewed

D.

To reduce testimony to a signed, written statement

Buy Now
Questions 43

A law enforcement officer receives a reliable tip from an informant that a government employee is soliciting bribes in exchange for awarding contracts to the employee's agency. To investigate, the officer poses as a potential contractor and contacts the suspect employee about the possibility of getting a contract with the agency. During the conversation, the suspect demands a cash payment for the officer to be considered for upcoming contracts. If the suspect claims entrapment at trial, then which of the following is MOST LIKELY to occur?

Options:

A.

The suspect's claim will succeed because the investigator used deceit

B.

The suspect's claim will succeed because the investigator lacked probable cause

C.

The suspect's claim will fail because the investigator had adequate predication

D.

The suspect's claim will fail because the investigator is a law enforcement agent

Buy Now
Questions 44

Jana. the controller of XYZ Company, notices that the company's hotel expenses increased substantially from the prior year She wants to check to see if this increase is reasonable by comparing hotel expenses from both years to the number of days XYZ"s employees traveled. Which of the following data analysis functions would be the MOST USEFUL in helping Jana analyze these two variables?

Options:

A.

Correlation analysis

B.

Duplicate testing

C.

Verifying multiples of a number

D.

Ben ford’s Law analysis

Buy Now
Questions 45

Which of the following is a recommended strategy when conducting admission-seeking interviews?

Options:

A.

Increase sympathy while downplaying implications of wrongdoing.

B.

Ensure that accusations are made in the presence of a third party to avoid potential liability

C.

Emphasize a lack of morality in the subject's actions to induce them into confessing.

D.

Use time constraints as a means to pressure the subject into making a confession.

Buy Now
Questions 46

If you are seizing a computer for forensic analysis, why is it generally necessary to seize any copiers connected to it?

Options:

A.

Many copiers connect via parallel cables, which store and transmit copy job data.

B.

Most copiers store, process, and transmit data m a cloud environment

C.

Many copiers have internal hard drives that might contain information relevant to a fraud examination

D.

Most copiers today are nonimpact copiers, meaning that they store copied images indefinitely.

Buy Now
Questions 47

Tara. a Certified Fraud Examiner (CFE). is searching social media sites for evidence in a fraud investigation. Which of the following is the MOST ACCURATE statement regarding what Tara should do when mining social media sites for evidence of fraud?

Options:

A.

Tara should preserve the information by saving the links of the postings as bookmarks in her browser.

B.

Tara should preserve the metadata by printing out the web pages of each of the postings.

C.

Tara should conduct a forensic shutdown of the computer to preserve the metadata m the social networking sites.

D.

Tara should preserve the information from the sites so that it can be established as authentic if used in court.

Buy Now
Questions 48

Gunn, a Certified Fraud Examiner (CFE). was hired to trace Kelly's financial transactions. During his investigation. Gunn obtains records of electronic payments that Kelly made during the past three years. Which of the following are these records MOST LIKELY to reveal?

Options:

A.

If Kelly has been skimming funds

B.

The cities and countries in which Kelly conducts business

C.

The division and distribution of Kelly's assets

D.

The market value of any real property Kelly owns

Buy Now
Questions 49

Which of the following is a reason why a subject's credit card records and statements can be useful in tracing investigations?

Options:

A.

Credit card records can provide leads to help identify a subjects hidden assets

B.

Credit card records can show signs that the subject has skimmed funds.

C.

Credit card statements show the source of the funds used to pay a credit card bill.

D.

Credit card statements provide insight into the subject's litigation history

Buy Now
Questions 50

Sarah is conducting an admission-seeking interview of a suspect. Throughout the interview, the suspect makes little eye contact with Sarah. Based on this information atone, can Sarah conclude that the suspect is being deceptive?

Options:

A.

Yes, because it is safe to assume that suspects who avoid eye contact are most likely being deceptive.

B.

Yes, because avoiding eye contact is a sign of deceptive.

C.

No, because this is not enough information to conclude that the suspect is being deceptive

D.

No, because avoiding eye contact is not directly linked to deception.

Buy Now
Questions 51

Assuming that a jurisdiction has prohibited pretexting with financial institutes, which of the following actions would constitute illegal pretexting?

Options:

A.

Withdrawing another person's funds using a stolen bank account number and PIN

B.

Digging through a person's trash to obtain their bank account information

C.

Making purchases with a credit card account under a fictitious identity

D.

Falsely claiming to be the spouse of an account holder to access bank records

Buy Now
Exam Code: CFE-Investigation
Exam Name: Certified Fraud Examiner (CFE) - Investigation
Last Update: Nov 17, 2025
Questions: 170
CFE-Investigation pdf

CFE-Investigation PDF

$25.5  $84.99
CFE-Investigation Engine

CFE-Investigation Testing Engine

$30  $99.99
CFE-Investigation PDF + Engine

CFE-Investigation PDF + Testing Engine

$40.5  $134.99