1 / 11

CFE Investigation Exam Questions

PassQuestion offer CFE Investigation Exam Questions with different ways to let you easily understand the content and information of your Exam.

Download Presentation

CFE Investigation Exam Questions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CFE Investigation Training Questions Certified Fraud Examiner - Investigation Exam Certified Fraud Examiner - Investigation Exam https://www.passquestion.com/CFE-Investigation.html

  2. Practice PassQuestion CFE Investigation Training Questions ensure your 100% success Question 1 Foster a Certified Fraud Examiner (CFE), needs to obtain a copy of a picture that a former Foster a Certified Fraud Examiner (CFE), needs to obtain a copy of a picture that a former employee of Friendly Interior an interior design studio posted on the company’s website three employee of Friendly Interior an interior design studio posted on the company’s website three years ago. Unfortunately because the website has since been updated the picture is no longer years ago. Unfortunately because the website has since been updated the picture is no longer available on the website. available on the website. Which of the following resources should Foster consult to find an earlier version of the Web Which of the following resources should Foster consult to find an earlier version of the Web page he needs? page he needs? A. The deep Web A. The deep Web B. The internet archives B. The internet archives C. The invisible Web C. The invisible Web D. The Library of Congress D. The Library of Congress Answer: B Answer: B

  3. Practice PassQuestion CFE Investigation Training Questions ensure your 100% success Question 2 In response to an accusation made during an admission-seeking interview the subject Begins to voice a denial In response to an accusation made during an admission-seeking interview the subject Begins to voice a denial to the charge. to the charge. How should the interviewer react to the first indication of a sublets denial' How should the interviewer react to the first indication of a sublets denial' A. Remind the subject of the laws against perjury A. Remind the subject of the laws against perjury B. Interrupt the denial by using a delaying tactic B. Interrupt the denial by using a delaying tactic C. Argue the point directly with the subject until a confession is obtained C. Argue the point directly with the subject until a confession is obtained D. Allow the subject to continue denying the charge D. Allow the subject to continue denying the charge Answer: A Answer: A

  4. Practice PassQuestion CFE Investigation Training Questions ensure your 100% success Question 3 Which of the following is a method of tracing assets that would yield the best result when Which of the following is a method of tracing assets that would yield the best result when several of the subject's assets or liabilities have changed during the period under examination several of the subject's assets or liabilities have changed during the period under examination and the subject a financial records are not available? and the subject a financial records are not available? A. Bank deposit method A. Bank deposit method B. Regression analysis B. Regression analysis C. Net worth method C. Net worth method D. Benford’s Law analysis D. Benford’s Law analysis Answer: C Answer: C

  5. Practice PassQuestion CFE Investigation Training Questions ensure your 100% success Question 4 A fabricated name and the post office box that an employee uses to collect disbursements from A fabricated name and the post office box that an employee uses to collect disbursements from false billings is called: false billings is called: A. Accomplice residence A. Accomplice residence B. Shell company B. Shell company C. Perpetrator check C. Perpetrator check D. Cash generator D. Cash generator Answer: B Answer: B

  6. Practice PassQuestion CFE Investigation Training Questions ensure your 100% success Question 5 Which of the following is the MOST ACCURATE statement about the privacy of information Which of the following is the MOST ACCURATE statement about the privacy of information shared through social media? shared through social media? A. the Privacy of Social Networks Treaty is a binding international treaty that makes it illegal for A. the Privacy of Social Networks Treaty is a binding international treaty that makes it illegal for law enforcement to seek social media login credentials from users. law enforcement to seek social media login credentials from users. B. To access any user-posted information on social media sites fraud examinees must obtain B. To access any user-posted information on social media sites fraud examinees must obtain some type of legal order from the Jurisdiction in which the user resides. some type of legal order from the Jurisdiction in which the user resides. C. A fraud examiner cannot be held liable for violating a user’s privacy rights if they hack or C. A fraud examiner cannot be held liable for violating a user’s privacy rights if they hack or break into areas of a social networking site designated as private because all social media break into areas of a social networking site designated as private because all social media Information is public Information is public D. Hacking or breaking into information on social media sites that is restricted as private could D. Hacking or breaking into information on social media sites that is restricted as private could result in liability for fraud examiners due to violation of users privacy rights result in liability for fraud examiners due to violation of users privacy rights Answer: A Answer: A

  7. Practice PassQuestion CFE Investigation Training Questions ensure your 100% success Question 6 Blue, a Certified Fraud Examiner (CFE) was interviewing Green a fraud suspect Although Green Blue, a Certified Fraud Examiner (CFE) was interviewing Green a fraud suspect Although Green had a strong memory when responding to questions involving insignificant events, he began had a strong memory when responding to questions involving insignificant events, he began asking Blue w repeat almost every question that addressed important facts. asking Blue w repeat almost every question that addressed important facts. If Green b Involved In the suspected misconduct he might be repeating the question to If Green b Involved In the suspected misconduct he might be repeating the question to A. Gain tine to frame Ns answer A. Gain tine to frame Ns answer B. Ensure he understood the question B. Ensure he understood the question C. Distrect Blue and change the subject C. Distrect Blue and change the subject D. Test Blue's ability to ask consistent questions D. Test Blue's ability to ask consistent questions Answer: A Answer: A

  8. Practice PassQuestion CFE Investigation Training Questions ensure your 100% success Question 7 When a fraud examiner is conducting an examination and is in the process of collecting. When a fraud examiner is conducting an examination and is in the process of collecting. documents the fraud examiner should: documents the fraud examiner should: A. A Wait until all documents have been collected before establishing a database A. A Wait until all documents have been collected before establishing a database B. Organize all the documents obtained in chronological order B. Organize all the documents obtained in chronological order C. Avoid touching original documents any more than necessary C. Avoid touching original documents any more than necessary D. Make copies of originals and leave the originals where they were found D. Make copies of originals and leave the originals where they were found Answer: A Answer: A

  9. Practice PassQuestion CFE Investigation Training Questions ensure your 100% success Question 8 The most common method of detection in corruption cases is: The most common method of detection in corruption cases is: A. Internal audits A. Internal audits B. Internal controls B. Internal controls C. Tips C. Tips D. By accident D. By accident Answer: C Answer: C

  10. Practice PassQuestion CFE Investigation Training Questions ensure your 100% success Question 9 Which at the following should be done to prepare an organization for a formal fraud Which at the following should be done to prepare an organization for a formal fraud investigation? investigation? A. Notify Ml managers about the investigation explaining why it is happening and who is A. Notify Ml managers about the investigation explaining why it is happening and who is involved involved B. Notify key decision-makers when the investigation is about to begin B. Notify key decision-makers when the investigation is about to begin C. Send an email to all employees explaining the investigation's purpose C. Send an email to all employees explaining the investigation's purpose D. Inform the subject that they are under Investigation. D. Inform the subject that they are under Investigation. Answer: B Answer: B

  11. Practice PassQuestion CFE Investigation Training Questions ensure your 100% success Question 10 Thea is conducting a fraud examination for a company and suspects one of the company’s Thea is conducting a fraud examination for a company and suspects one of the company’s vendors (a one-person operation) of fraudulent biting. Thea wants to obtain a copy of the vendors (a one-person operation) of fraudulent biting. Thea wants to obtain a copy of the suspect individuals credit report and personal data from a third-party information broker. If suspect individuals credit report and personal data from a third-party information broker. If Thea works In a jurisdiction that regulates the distribution of personal credit information she Thea works In a jurisdiction that regulates the distribution of personal credit information she cannot obtain the suspects personal credit data under any circumstances. cannot obtain the suspects personal credit data under any circumstances. A. True A. True B. False B. False Answer: B Answer: B

More Related