Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CFE-Investigation Exam Dumps - Certified Fraud Examiner (CFE) - Investigation

Go to page:
Question # 4

Which of the following terms refers to a process of resolving allegations of fraud from inception to disposition?

A.

Forensic methodology

B.

Fraud theory

C.

Fraud assessment

D.

Fraud examination

Full Access
Question # 5

Which of the following is NOT a step a fraud examiner must take before seizing evidence in a digital forensic investigation?

A.

Obtain and become familiar with any legal orders that apply to the investigation

B.

Assemble an investigation team comprised only of outside digital forensic experts

C.

Ensure that only trained professionals employ any software used in a forensic capacity

D.

Determine whether there are privacy issues related to the item(s) to be searched.

Full Access
Question # 6

If the following statements were included in a fraud examination report of a qualified expert, which of them would be IMPROPER?

A.

"When asked a second time about the amount of funds missing, the suspect contradicted their previous testimony."

B.

"The evidence shows that between S1 million and S1.5 million in assets were transferred to an offshore account."

C.

"The organization must address the inadequate separation of accounting duties to prevent such an event from happening again."

D.

"In light of all the evidence, the suspect is most likely guilty of fraud against the organization."

Full Access
Question # 7

Which of the following is the MOST ACCURATE statement regarding a fraud examiner's ability to trace cryptocurrency transactions?

A.

Each Blockchain transaction contains a user's cryptographic address, which can help identify patterns that might link the user to criminal activity.

B.

Most jurisdictions do not require digital wallet providers to record any personal information about cryptocurrency users

C.

Cryptocurrency ownership cannot be determined through an analysis of details on a subject's bank statements.

D.

Most cryptocurrencies rely on private block chains, which allow users' transactions to be completely anonymous and therefore difficult to trace.

Full Access
Question # 8

Assuming that a jurisdiction has prohibited pretexting against financial institutions, which of the following actions would constitute illegal pretexting?

A.

Intentionally making false statements on loan applications

B.

Stealing a person's mail lo obtain the person's bank account number

C.

Impersonating an account holder to access their bank records

D.

Setting up a bank account in an assumed name

Full Access
Go to page: