Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

CFE-Investigation Certified Fraud Examiner (CFE) - Investigation Questions and Answers

Questions 4

Due to risks of illicit transactions, most jurisdictions require financial institutions to obtain information about which of the following from an institution with which they have a foreign correspondent relationship?

Options:

A.

The institution's ownership details

B.

The institution's investment portfolio

C.

The institution's client loan profiles

D.

The institution's tax statements

Buy Now
Questions 5

Martin, a fraud examiner, is conducting an interview of Stephanie, a fraud suspect. Although Stephanie heard all of the questions during the introductory part of the interview, she began asking Martin to repeat almost every question when they became more focused If Stephanie is being deceptive, which of the choices below is MOST LIKELY the cause of Stephanie's behavior?

Options:

A.

Stephanie is testing Martin to determine whether he is able to ask consistent questions

B.

Stephanie is trying to make sure she understands the question so that she will not make a misstatement.

C.

Stephanie is delaying the answer so that she has more time to think of what to say.

D.

Stephanie is having trouble recalling the events or details related to Martin's questions.

Buy Now
Questions 6

Assuming that a jurisdiction has prohibited pretexting against financial institutions, which of the following actions would constitute illegal pretexting?

Options:

A.

Intentionally making false statements on loan applications

B.

Stealing a person's mail lo obtain the person's bank account number

C.

Impersonating an account holder to access their bank records

D.

Setting up a bank account in an assumed name

Buy Now
Questions 7

Which of the following statements is MOST ACCURATE regarding how a fraud examiner should prepare for an interview with a subject from a different jurisdiction?

Options:

A.

A fraud examiner does not need to research cultural considerations such as personal space and eye contact.

B.

A fraud examiner should find out whether there are limitations on the use of information obtained during an interview

C.

Failing to observe cultural norms is not a concern if the interviewer is from a different country than the interviewee

D.

Consulting with legal counsel is only necessary when an investigation spans multiple junsdictions

Buy Now
Questions 8

Which of the following BEST describes the data analytics approach known as predictive analytics?

Options:

A.

The configuration of a business program to emulate and Integrate the actions of a human to execute certain business processes, thus increasing efficiency and automating repetitive manual tasks

B.

The use of historical data, along with analyses, statistics, and machine learning components, to build a mathematical model that captures important trends and creates a quantitative forecast

C.

The employment of computer systems to perform human-like tasks such as visual perception and decision-making

D.

The use of layered artificial neural networks to accommodate more data and more sophisticated algorithms to identify complex patterns

Buy Now
Questions 9

Charles, a fraud examiner, accuses George of fraud during an admission-seeking interview. George immediately denies the charge How should Charles respond to George's denial?

Options:

A.

Counter the denial by arguing with George until further denials are futile

B.

Use a delaying tactic to interrupt the denial

C.

Remind George he has to tell the truth or face perjury.

D.

Allow George to continue denying the charge.

Buy Now
Questions 10

Which of the following sets of numbers could a fraud examiner MOST LIKELY benefit from running a Benford’s Law analysis on?

Options:

A.

Telephone numbers

B.

Vendor invoice amounts

C.

Employee identification numbers

D.

Bank account numbers

Buy Now
Questions 11

Al needs to know the location of the principal office and the initial shareholders of a company he is investigating. Which of the following would be the BEST source of this reformation?

Options:

A.

The organizational filings with the government of the jurisdiction in which the company is incorporated

B.

The contractual documents regarding real properly owned by the corporation

C.

The utility records in the municipality where the corporation has its principal office

D.

The shareholder data form filed with the World Bank

Buy Now
Questions 12

In response to an accusation made during an admission-seeking interview, the subject begins to voice a denial to the charge. How should the interviewer react to the first indication of a subject's denial?

Options:

A.

Allow the subject 1o continue denying the charge

B.

Argue the point directly with the subject until a confession is obtained

C.

Remind the subject of the laws against perjury.

D.

Interrupt the denial by using a delaying tactic.

Buy Now
Questions 13

Talia has been hired by SBS Inc. to implement a new data analysis program to search for warning signs of potential fraud within the company. Which of the following steps should Talia conduct first to MOST EFFECTIVELY use data analysis techniques for such an initiative?

Options:

A.

Build a profile of potential frauds.

B.

Monitor the data.

C.

Cleanse and normalize the data.

D.

Identify the relevant data

Buy Now
Questions 14

Which of the following is the MOST ACCURATE statement regarding a fraud examiner’s ability to trace cryptocurrency transactions?

Options:

A.

Information about cryptocurrency ownership can sometimes be revealed by analyzing a subject’s bank statements.

B.

Each blockchain transaction contains direct identifying information that can be used to find cryptocurrency users.

C.

Most jurisdictions do not require digital wallet providers to record any personal information about cryptocurrency users.

D.

Most cryptocurrencies rely on private blockchains, which require court orders to obtain transaction information.

Buy Now
Questions 15

After completing all necessary investigative steps. Erica, a Certified Fraud Examiner (CFE), is reasonably sure that Justine, her primary suspect, committed the fraud in question. Before scheduling an admission-seeking interview with Justine, what else should Erica be reasonably sure of?

Options:

A.

That Justine will confess to the accusation when prompted

B.

That Justine's employer will take disciplinary action against Justine if she confesses

C.

That the interview's time, place, and content can De controlled

D.

That no other person was involved in the fraud n question

Buy Now
Questions 16

Which of the following is one of the purposes of closing questions in a routine interview?

Options:

A.

To close the interview positively and maintain goodwill

B.

To assess whether the subject is ready to confess

C.

To confirm the credibility of the witness being interviewed

D.

To reduce testimony to a signed, written statement

Buy Now
Questions 17

Which of the following BEST describes the data analytics approach known as predictive analytics?

Options:

A.

The employment of a learning algorithm that identifies similarities, patterns, or anomalies within a data set on its own, without human involvement

B.

The configuration of a business program to emulate and integrate the actions of a human to execute certain business processes thus increasing efficiency and automating repetitive manual tasks

C.

The use of historical data, along with analyses, statistics, and machine learning components, to build a mathematical model that captures important trends and creates a quantitative forecast

D.

The use of layered artificial neural networks to accommodate more data and more sophisticated algorithms to identify complex patterns

Buy Now
Questions 18

Rachel, a fraud suspect, has decided to confess to Linda, a Certified Fraud Examiner (CFE). In obtaining a verbal confession from Rachel. Linda should obtain all of the following items of information EXCEPT:

Options:

A.

The approximate beginning and end dates of the fraud

B.

A statement from Rachel that her conduct was an accident

C.

A general estimate of the amount of money involved

D.

Rachel's motive for the offense

Buy Now
Questions 19

Shannon, a Certified Fraud Examiner (CFE), is conducting a fraud examination for Sand Corp. Shannon is going to perform a textual analysis on unstructured data, such as emails and instant messages. Why would Shannon perform such an analysis?

Options:

A.

The analysis will determine whether someone is lying or telling the truth based on clues within the data.

B.

The analysis will uncover an admission of fraud in an email or other communication that can be presented in court.

C.

The analysis will produce a visual representation of the data collected to track the movement of money.

D.

The analysis will categorize data to reveal patterns, sentiments, and relationships that are indicative of fraud.

Buy Now
Questions 20

Scarlett, a Certified Fraud Examiner (CFE), is conducting an admission-seeking interview of Plum, a fraud suspect. After Scarlett defused Plum's alibis. Plum became withdrawn and slowly began to slouch in her chair, bowing her head. What should Scarlett do now?

Options:

A.

Discourage Plum from showing any emotion.

B.

Remain silent until Plum makes a confession.

C.

Insist that Plum sit up straight in her chair

D.

Continue to display evidence that implicates Plum

Buy Now
Questions 21

Which of the following data is the MOST DIFFICULT to recover during a digital forensic examination?

Options:

A.

Time and date information about files

B.

Websites visited

C.

Files that have been overwritten

D.

Communications sent via instant messenger

Buy Now
Questions 22

John, a fraud investigator, is interviewing Mary, who he suspects has been embezzling company funds. Which of the following is the recommended approach John should use to ask Mary questions?

Options:

A.

Start with questions about unknown information and work toward known information

B.

Ask questions in random order to keep Mary from guessing the next question

C.

Start with specific questions and move toward general questions

D.

Seek general information before seeking specific details

Buy Now
Questions 23

Bobbie, a fraud examiner, is preparing to interview Craig, a close friend and coworker of the primary suspect in the case. Craig has been described by others as "easily angered" and "intense" How should Bobbie approach her interview of Craig?

Options:

A.

Provide Craig with plenty of notice prior to the interview to not provoke resentment

B.

Conduct the interview with as little notice as possible so Craig will be unprepared

C.

Ask Craig when ho would prefer to be interviewed in an effort to engender cooperation

D.

Avoid interviewing Craig if possible due to Craig's potential volatility

Buy Now
Questions 24

Baker, a Certified Fraud Examiner (CFE). is getting prepared to conduct a lengthy and complex interview. To prepare himself. Baker should:

Options:

A.

Writs down a detailed list of questions in advance

B.

Avoid bringing any notes with him to the interview

C.

Write down key points to go over with the respondent

D.

Take only the documents he wishes to go over

Buy Now
Questions 25

Vishal, a Certified Fraud Examiner (CFE). has just initiated an interview with Steve, a fraud suspect. After a short introduction. Vishal jokes about the fact that he and Steve are wearing the same tie and then proceeds to ask Steve about the previous night's major sporting event Vishal is attempting to

Options:

A.

Establish the interview theme

B.

Condition the witness.

C.

Establish rapport

D.

Exhibit passive listening.

Buy Now
Questions 26

Which of the following is a common method that fraudsters use to hide their ill-gotten gains?

Options:

A.

Purchasing a used vehicle

B.

Creating a will to allocate assets at death

C.

Placing assets in probate

D.

Transferring assets into foreign trusts

Buy Now
Questions 27

Which of the following is usually considered the most useful source of financial information available to fraud examiners in tracing a subject's assets?

Options:

A.

Financial institution records

B.

Service bills

C.

Paystubs

D.

Credit card statements

Buy Now
Questions 28

Which of the following situations would probably NOT require access to nonpublic records to develop evidence?

Options:

A.

Obtaining personal health care records

B.

Accessing banking records to trace assets

C.

Reviewing a company's business filings

D.

Analyzing an individual's personal mobile phone records

Buy Now
Questions 29

All of the following are true with regard to textual analytics EXCEPT:

Options:

A.

When conducting textual analysis, the fraud examiner should come up with a list of fraud keywords to search for.

B.

Textual analytics is used to reveal patterns, sentiments, and relationships indicative of fraud

C.

The purpose of textual analytics is to search for and find an admission of fraud that can be presented in court

D.

Textual analytics provides the ability to uncover warning signs of potentially fraudulent employee behavior

Buy Now
Questions 30

Which of the following would be most useful in determining when a specific document file was created?

Options:

A.

The document's metadata

B.

Internet activity data

C.

The system tog

D.

Operating system partition

Buy Now
Questions 31

If the following statements were included in a fraud examination report of a qualified expert, which of them would be IMPROPER?

Options:

A.

"When asked a second time about the amount of funds missing, the suspect contradicted their previous testimony."

B.

"The evidence shows that between S1 million and S1.5 million in assets were transferred to an offshore account."

C.

"The organization must address the inadequate separation of accounting duties to prevent such an event from happening again."

D.

"In light of all the evidence, the suspect is most likely guilty of fraud against the organization."

Buy Now
Questions 32

Which of the following is NOT one of the main limitations of conducting a search for public records using online databases?

Options:

A.

Online public records searches are limited in the jurisdictions they cover.

B.

Public records database companies are difficult to find.

C.

Online coverage of public records varies widely from jurisdiction to jurisdiction

D.

The timeliness and accuracy of information in online databases must be validated

Buy Now
Questions 33

June, a fraud examiner, is preparing to interview a subject who is from a different jurisdiction. Before conducting the interview, June should:

Options:

A.

Familiarize the subject with the cultural practices common in June’s jurisdiction so there are no surprises.

B.

Research the cultural norms common in the subject’s jurisdiction so they can be avoided to make the subject less comfortable.

C.

Consult with legal counsel in advance only if the investigation is likely to involve a third jurisdiction.

D.

Verify whether the subject’s jurisdiction has any rules in place that would prevent June from compelling the subject to cooperate with her.

Buy Now
Questions 34

Which of the following is a common characteristic that asset hiders look for in the financial vehicles they use to conceal their assets?

Options:

A.

Accessibility

B.

Transparency

C.

Exclusivity

D.

Traceability

Buy Now
Questions 35

Gilbert is preparing to conduct a covert investigation. Before acting, he wants to wnte a memorandum documenting his plan. Which of the following pieces of information should he include in this memorandum?

Options:

A.

The information expected to be gained from the operation

B.

The identities of any confidential sources to be used in the operation

C.

His first impression regarding the subject's culpability

D.

All of the above

Buy Now
Questions 36

Which of the following is the MOST ACCURATE statement regarding a fraud examiner's ability to trace cryptocurrency transactions?

Options:

A.

Each Blockchain transaction contains a user's cryptographic address, which can help identify patterns that might link the user to criminal activity.

B.

Most jurisdictions do not require digital wallet providers to record any personal information about cryptocurrency users

C.

Cryptocurrency ownership cannot be determined through an analysis of details on a subject's bank statements.

D.

Most cryptocurrencies rely on private block chains, which allow users' transactions to be completely anonymous and therefore difficult to trace.

Buy Now
Questions 37

Elsa, a fraud examiner at ABC Corp., is interviewing Leah, a fraud suspect. Leah allegedly committed a fraud scheme that resulted in a loss of $200,000 for ABC. Elsa asks Leah directly whether she was involved in the fraud. Which of the following responses from Leah is MOST LIKELY an indication that she is being deceptive?

Options:

A.

“No, I have never stolen anything from ABC.”

B.

“I had no involvement with the scheme.”

C.

“Why would I do something like that?”

D.

“No, I did not commit fraud against ABC.”

Buy Now
Questions 38

Sarah is conducting an admission-seeking interview of a suspect. Throughout the interview, the suspect makes little eye contact with Sarah. Based on this information atone, can Sarah conclude that the suspect is being deceptive?

Options:

A.

Yes, because it is safe to assume that suspects who avoid eye contact are most likely being deceptive.

B.

Yes, because avoiding eye contact is a sign of deceptive.

C.

No, because this is not enough information to conclude that the suspect is being deceptive

D.

No, because avoiding eye contact is not directly linked to deception.

Buy Now
Questions 39

If your suspect is spending suspected illicit funds on consumables (e.g.. travel and entertainment) and you need to prove their illicit income circumstantially, which of the following methods of tracing assets would yield the BEST result?

Options:

A.

expenditures method

B.

The consumables method

C.

The income method

D.

The asset method

Buy Now
Questions 40

Lmdsey, a Certified Fraud Examiner (CFE). has been retained to investigate allegations of bribery and kickbacks allegedly committed by a member of an organization's procurement department. Lindsey conducts an interview during which one of the accused's colleagues states that they overheard the accused discussing a free tnp received from one of the organization's vendors. Which type of evidence would the interviewee's statement be considered?

Options:

A.

Documentary evidence

B.

Testimonial evidence

C.

Verbal evidence

D.

Inconclusive evidence

Buy Now
Questions 41

When documenting interviews, it is BEST practice for the interviewer to:

Options:

A.

Document notes for each interview separately, nduding those for electronic recordings.

B.

Write down verbatim all of (he information that the subject provides during the interview

C.

Err on the side of taking too many notes rather than too few.

D.

Note impressions regarding the subject's guilt or innocence.

Buy Now
Questions 42

Which of the following statements is MOST ACCURATE regarding how a fraud examiner should prepare for an interview with a subject from a different jurisdiction?

Options:

A.

Failing to observe cultural norms is not a concern if the interviewer is from a different country than the interviewee.

B.

Consulting with legal counsel is only necessary when an investigation spans multiple

C.

A fraud examiner should find out whether the interviewee can insist upon the presence of a legal representative

D.

A fraud examiner does not need to research cultural considerations such as appropriate greetings and eye contact.

Buy Now
Questions 43

Lisa, a fraud examiner at a private company, receives an anonymous call from a potential whistleblower. The whistleblower is hesitant to reveal their identity but will do so if it can be Kept fully confidential. Which of the following statements is MOST ACCURATE?

Options:

A.

Lisa may offer the whistleblower full confidentiality because they are not a suspect

B.

Lisa should explain that she will try her best to keep the whistleblower"s identity confidential.

C.

Lisa should state that she will not be able to keep the whistleblower's identity confidential because all information must be disclosed to management

D.

Lisa may promise the whistleblower full confidentiality, even if she knows her statement is untrue, because the lie is ultimately beneficial to her employer.

Buy Now
Questions 44

Caroline, a fraud examiner, is conducting an admission-seeking interview with John, an employee suspected of stealing cash. Which of the following is the MOST effective phrasing for Caroline to use when posing an admission-seeking question to John?

Options:

A.

"Why did you take the money?"

B.

"What do you know about the stolen money?"

C.

"Do you know who took the money''"

D.

"Did you steal the money?"

Buy Now
Questions 45

Which of the following is the MOST ACCURATE statement about imaging suspect computers' hard drives?

Options:

A.

Imaging enables the retrieval of data from the suspect computer directly via its operating system.

B.

Imaging prohibits access to the suspect computer's hard drive by individuals not professionally trained in forensic analysis

C.

Imaging creates pictures of the suspect computer system and its wires and cables

D.

Imaging allows for the analysis of data from a suspect computer without altering or damaging the original data in any way

Buy Now
Questions 46

A fraud examiner contacts a witness for an interview regarding a bribery case, but the witness says that they are too busy to be interviewed. It is MOST APPROPRIATE for the fraud examiner to respond by:

Options:

A.

Telling the witness that they will be disciplined if they do not agree to meet that day.

B.

Suggesting that the witness choose a time and location that is more convenient.

C.

Asking the witness to detail what they are busy doing for reporting purposes.

D.

Emphasizing to the witness that their help is needed and it will not take long.

Buy Now
Questions 47

Which of the following statements concerning access to nonpublic records is MOST ACCURATE?

Options:

A.

Once a criminal case is filed, all records obtained by the government are considered public records

B.

Nonpublic records cannot be obtained by subpoena or legal order in a civil action

C.

In most junsdictions. banks are allowed to turn over a suspect's account information directly to a fraud victim when there is adequate evidence of wrongdoing.

D.

The government usually will not share nonpublic records with a fraud victim during an investigation into the underlying fraud.

Buy Now
Questions 48

Which of the following is a reason why a subject's credit card records are useful in tracing investigations?

Options:

A.

Credit card statements show source of the funds used to pay a credit card bill

B.

Credit card records show the movements and habits of the subject

C.

Credit card records provide insight into the subject's litigation history

D.

Credit card records contain information about the division and distribution of the subject's assets

Buy Now
Questions 49

During an interview with Alice, a suspect in an embezzlement case, the interviewer observes several signs of stress in Alice's behavior, such as shifting around in her chair, exhibiting shallow breathing, and occasionally stuttering during her replies. The interviewer should conclude that these symptoms are caused by deception.

Options:

A.

True

B.

False

Buy Now
Questions 50

Shane, a Certified Fraud Examiner (CFE). is investigating Larsen. who is active on various social networking sites. Shane wants to search and extract information from Larson's social media postings so that it can be used in court as evidence Which of the following is the MOST ACCURATE statement regarding what Shane should do when conducting a social media investigation of Larsen?

Options:

A.

Shane should conduct a forensic shutdown of his computer to preserve the metadata in the social networking sites.

B.

Shane should preserve the information from the social networking sites so that it can be established as authentic if used in court.

C.

Shane should email himself the links of the postings so that he can retrieve them later.

D.

Shane should preserve the information by saving the links of the postings in his 'bookmarks"

Buy Now
Questions 51

Which of the following statements about fraud response plans is FALSE?

Options:

A.

A fraud response plan outlines the actions an organization will take when suspicions of fraud have arisen.

B.

A fraud response plan should create an environment to minimize risk and maximize the potential for success

C.

A fraud response plan must be simple to understand and administer

D.

A fraud response plan should specify how every fraud examination should be conducted regardless of the type of fraud

Buy Now
Questions 52

Which of the following is NOT true with regard to tracing the disposition of loan proceeds?

Options:

A.

Tracing loan proceeds can reveal previous civil offenses committed by the subject

B.

Tracing loan proceeds can determine if the proceeds were deposited into hidden accounts

C.

Tracing loan proceeds can uncover previously unknown witnesses

D.

Tracing loan proceeds can determine if hidden accounts were used for loan payments.

Buy Now
Questions 53

Which of the following can be obtained from a wire transfer record?

Options:

A.

The name of the receiving institution's registered agent

B.

The recipient's government identification number

C.

The name of the sender or originator

D.

The sending institution's accreditation type

Buy Now
Questions 54

Divya, a Certified Fraud Examiner (CFE), is considering whether to commence a legal action to recover assets for her client. Of the following choices, which is the MOST IMPORTANT question for Divya to ask before moving forward with the legal action?

Options:

A.

“Does the defendant have sufficient money or property to satisfy a judgment?”

B.

“Has the suspect been arrested for any crimes in the past?”

C.

“What is the likelihood that the suspect did not actually commit fraud?”

D.

“Is there a relevant statute of limitations for the offense?”

Buy Now
Exam Code: CFE-Investigation
Exam Name: Certified Fraud Examiner (CFE) - Investigation
Last Update: Mar 3, 2026
Questions: 181
CFE-Investigation pdf

CFE-Investigation PDF

$25.5  $84.99
CFE-Investigation Engine

CFE-Investigation Testing Engine

$30  $99.99
CFE-Investigation PDF + Engine

CFE-Investigation PDF + Testing Engine

$40.5  $134.99