acfe cfe investigation practice test

Certified Fraud Examiner - Investigation Exam

Last exam update: Nov 18 ,2025
Page 1 out of 12. Viewing questions 1-15 out of 170

Question 1

Which of the following is NOT true with regard to tracing the disposition of loan proceeds?

  • A. Tracing loan proceeds can reveal previous civil offenses committed by the subject
  • B. Tracing loan proceeds can determine if the proceeds were deposited into hidden accounts
  • C. Tracing loan proceeds can uncover previously unknown witnesses
  • D. Tracing loan proceeds can determine if hidden accounts were used for loan payments.
Mark Question:
Answer:

A


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

If you are seizing a computer for forensic analysis, why is it generally necessary to seize any copiers
connected to it?

  • A. Many copiers connect via parallel cables, which store and transmit copy job data.
  • B. Most copiers store, process, and transmit data m a cloud environment
  • C. Many copiers have internal hard drives that might contain information relevant to a fraud examination
  • D. Most copiers today are nonimpact copiers, meaning that they store copied images indefinitely.
Mark Question:
Answer:

C


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

Which of the following can be obtained from a wire transfer record?

  • A. The name of the receiving institution's registered agent
  • B. The recipient's government identification number
  • C. The name of the sender or originator
  • D. The sending institution's accreditation type
Mark Question:
Answer:

C


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

When planning for the interview phase of an investigation, which of the following steps should NOT
be taken by the fraud examiner?

  • A. Consider what the interview is intended to accomplish and state an objective.
  • B. Review the case file to ensure that important information has not been overlooked
  • C. Prepare a detailed list of questions to ask the subject during the interview.
  • D. Ensure that the interview is held in a venue where the subject will feel Uncomfortable
Mark Question:
Answer:

D


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

Jackson, a digital forensic examiner for a government agency, is conducting a criminal investigation
into the alleged embezzlement of funds from the government's Welfare Department (WD). Ginny. a
WD employee, is the prime suspect. Jackson obtains a court order authorizing him to seize Ginny's
personal computer for forensic examination. Which of the following is the MOST ACCURATE
statement?

  • A. If Ginny's computer is running. Jackson should perform a graceful shutdown by turning it off using the normal shutdown process
  • B. If Ginny’s computer is off and Jackson needs evidence that exists only in the form of volatile data, he should turn the computer on and retrieve data directly via the computer's normal interface.
  • C. If Ginny's computer is off. Jackson should not turn it on unless he plans to use an encryption device that can guarantee that the system's hard drive will not be accessed during startup.
  • D. If Ginny's computer is running. Jackson may retrieve data from the computer directly via its normal interface if the evidence that he needs exists only in the form of volatile data
Mark Question:
Answer:

D


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

Which of the following terms refers to a process of resolving allegations of fraud from inception to
disposition?

  • A. Forensic methodology
  • B. Fraud theory
  • C. Fraud assessment
  • D. Fraud examination
Mark Question:
Answer:

D


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

Eugene is conducting an admission-seeking interview of a suspect. During the interview, the suspect
frequently looks away from Eugene while responding to questions. Eugene can safely conclude that
the suspect is dishonest due to his failure to maintain eye contact.

  • A. True
  • B. False
Mark Question:
Answer:

B


User Votes:
A
50%
B
50%
Discussions
vote your answer:
A
B
0 / 1000

Question 8

Anne used Will as a confidential informant in her investigation Anne listed information provided by
Will in her final report, referring to him using his initials. She paid Will in cash and obtained a receipt
for the transaction. Which of Anne's methods was NOT considered a best practice when using
informants?

  • A. Referring to Will using his initials
  • B. Obtaining a receipt from Will
  • C. Using information provided by Will in her report
  • D. Using cash to pay Will
Mark Question:
Answer:

A


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

Jan
a. the controller of XYZ Company, notices that the company's hotel expenses increased substantially
from the prior year She wants to check to see if this increase is reasonable by comparing hotel
expenses from both years to the number of days XYZ"s employees traveled. Which of the following
data analysis functions would be the MOST USEFUL in helping Jana analyze these two variables?

  • A. Correlation analysis
  • B. Duplicate testing
  • C. Verifying multiples of a number
  • D. Ben ford’s Law analysis
Mark Question:
Answer:

A


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

When a fraud examiner is conducting an examination and is in the process of collecting documents,
the fraud examiner should:

  • A. Dust all physical key documents for fingerprints
  • B. Establish a document database early in the investigation
  • C. Make copies of originals and leave the originals where they were found
  • D. Organize all the documents obtained in chronological order
Mark Question:
Answer:

B


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

Which of the following is the LEAST ACCURATE statement about seizing a computer for examination?

  • A. When taking a computer for examination, if the computer is off. it should remain off when it is removed.
  • B. When seizing a computer that is running, it is acceptable for a fraud examiner to review the files contained on the machine prior to seizing it.
  • C. Before removing a computer system from a scene for further analysis, it is important to document the system's setup with photographs or diagrams.
  • D. When seizing a computer for examination, the seizing party should took around the area for passwords because many people leave passwords near their computers
Mark Question:
Answer:

B


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

Which of the following is the MOST ACCURATE statement concerning the volatility of digital
evidence?

  • A. Digital evidence is more volatile than tangible evidence because digital evidence is subject to claims of spoliation, whereas tangible evidence is not.
  • B. Digital evidence is more volatile than tangible evidence because the rules of admissibility for digital evidence are stricter than such rules for tangible evidence.
  • C. If the integrity of digital evidence is violated, it can often be restored through a digital cleansing process
  • D. The failure to preserve the integrity of digital evidence could result in evidence being deemed inadmissible in a legal proceeding
Mark Question:
Answer:

D


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

Allison, a Certified Fraud Examiner (CFE). is investigating a potential procurement fraud scheme.
While interviewing a subject, she asks. "Why did you choose to do business with that vendor?" This
can BEST be described as a(n):

  • A. Open question
  • B. Complex question
  • C. Leading question
  • D. Closed question
Mark Question:
Answer:

A


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

Marilyn, a Certified Fraud Examiner (CFE). is reasonably sure that Shelly, her primary suspect,
committed the fraud in question Before scheduling an admission-seeking interview with Shelly.
Marilyn should be reasonably sure of all of the following EXCEPT:

  • A. That all reasonable investigative steps have been taken
  • B. That the interview's time and location can be controlled
  • C. That no other person was involved in the fraud in question
  • D. That the interview's subject matter can be controlled
Mark Question:
Answer:

C


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

Sam needs to obtain the most accurate court records possible in a particular jurisdiction concerning a
fraud suspect. The BEST place for Sam to look is a global database that compiles court cases from
various jurisdictions

  • A. True
  • B. False
Mark Question:
Answer:

A


User Votes:
A
50%
B
50%
Discussions
vote your answer:
A
B
0 / 1000
To page 2