Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CFE-Investigation Exam Dumps - Certified Fraud Examiner (CFE) - Investigation

Searching for workable clues to ace the ACFE CFE-Investigation Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CFE-Investigation PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 17

Which of the following is NOT an advantage to using link analysis in a fraud investigation?

A.

Link analysis visually displays financial ratio analysis

B.

Link analysis is an affective tool to demonstrate complex networks

C.

Link analysis helps identify indirect relationships with several degrees of separation.

D.

Link analysis allows the investigator to discover patterns in data.

Full Access
Question # 18

Tony, a fraud examiner, believes that vendors might be submitting multiple invoices for the same sales with the hope that they will be paid more than once. He wants to ensure that no two invoices in the system have the same number. Which of the Mowing data analysis functions would be most useful for this test?

A.

Duplicate search

B.

Benford's Law analysis

C.

Correlation analysis

D.

Linear regression

Full Access
Question # 19

All of the following are true with regard to textual analytics EXCEPT:

A.

When conducting textual analysis, the fraud examiner should come up with a list of fraud keywords to search for.

B.

Textual analytics is used to reveal patterns, sentiments, and relationships indicative of fraud

C.

The purpose of textual analytics is to search for and find an admission of fraud that can be presented in court

D.

Textual analytics provides the ability to uncover warning signs of potentially fraudulent employee behavior

Full Access
Question # 20

Which of the following is NOT a recommended strategy when conducting admission-seeking interviews?

A.

Conduct admission-seeking interviews only when time is not a factor.

B.

Ensure that accusations are made under conditions of privacy to avoid potential liability

C.

Minimize empathy while emphasizing the perception of moral wrongdoing

D.

Present a morally acceptable reason for the subject's behavior

Full Access
Question # 21

If you are seizing a computer for forensic analysis, why is it generally necessary to seize any copiers connected to it?

A.

Many copiers connect via parallel cables, which store and transmit copy job data.

B.

Most copiers store, process, and transmit data m a cloud environment

C.

Many copiers have internal hard drives that might contain information relevant to a fraud examination

D.

Most copiers today are nonimpact copiers, meaning that they store copied images indefinitely.

Full Access
Question # 22

Gilbert is preparing to conduct a covert investigation. Before acting, he wants to wnte a memorandum documenting his plan. Which of the following pieces of information should he include in this memorandum?

A.

The information expected to be gained from the operation

B.

The identities of any confidential sources to be used in the operation

C.

His first impression regarding the subject's culpability

D.

All of the above

Full Access
Question # 23

Which of the following is a common method that fraudsters use to hide their ill-gotten gains?

A.

Purchasing a used vehicle

B.

Creating a will to allocate assets at death

C.

Placing assets in probate

D.

Transferring assets into foreign trusts

Full Access
Question # 24

Which of the following statements about the process of obtaining a verbal confession is TRUE?

A.

The only acceptable approaches to obtaining a verbal confession are chronologically or by transaction

B.

The transition from the accusation to the confession should occur when the accused supplies the first detailed information about the offense.

C.

If the subject lies about an aspect of the offense in the process of confessing, it is best to correct the records immediately before proceeding

D.

Fraudsters tend to overestimate the amount of funds involved in the offense to relieve themselves of the guilt of their dishonest actions.

Full Access
Go to page: