Page 1 out of 12. Viewing questions 1-15 out of 170
Question 1
Which of the following is NOT true with regard to tracing the disposition of loan proceeds?
A.
Tracing loan proceeds can reveal previous civil offenses committed by the subject
B.
Tracing loan proceeds can determine if the proceeds were deposited into hidden accounts
C.
Tracing loan proceeds can uncover previously unknown witnesses
D.
Tracing loan proceeds can determine if hidden accounts were used for loan payments.
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 2
If you are seizing a computer for forensic analysis, why is it generally necessary to seize any copiers connected to it?
A.
Many copiers connect via parallel cables, which store and transmit copy job data.
B.
Most copiers store, process, and transmit data m a cloud environment
C.
Many copiers have internal hard drives that might contain information relevant to a fraud examination
D.
Most copiers today are nonimpact copiers, meaning that they store copied images indefinitely.
Answer:
C
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 3
Which of the following can be obtained from a wire transfer record?
A.
The name of the receiving institution's registered agent
B.
The recipient's government identification number
C.
The name of the sender or originator
D.
The sending institution's accreditation type
Answer:
C
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 4
When planning for the interview phase of an investigation, which of the following steps should NOT be taken by the fraud examiner?
A.
Consider what the interview is intended to accomplish and state an objective.
B.
Review the case file to ensure that important information has not been overlooked
C.
Prepare a detailed list of questions to ask the subject during the interview.
D.
Ensure that the interview is held in a venue where the subject will feel Uncomfortable
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 5
Jackson, a digital forensic examiner for a government agency, is conducting a criminal investigation into the alleged embezzlement of funds from the government's Welfare Department (WD). Ginny. a WD employee, is the prime suspect. Jackson obtains a court order authorizing him to seize Ginny's personal computer for forensic examination. Which of the following is the MOST ACCURATE statement?
A.
If Ginny's computer is running. Jackson should perform a graceful shutdown by turning it off using the normal shutdown process
B.
If Ginny’s computer is off and Jackson needs evidence that exists only in the form of volatile data, he should turn the computer on and retrieve data directly via the computer's normal interface.
C.
If Ginny's computer is off. Jackson should not turn it on unless he plans to use an encryption device that can guarantee that the system's hard drive will not be accessed during startup.
D.
If Ginny's computer is running. Jackson may retrieve data from the computer directly via its normal interface if the evidence that he needs exists only in the form of volatile data
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 6
Which of the following terms refers to a process of resolving allegations of fraud from inception to disposition?
A.
Forensic methodology
B.
Fraud theory
C.
Fraud assessment
D.
Fraud examination
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 7
Eugene is conducting an admission-seeking interview of a suspect. During the interview, the suspect frequently looks away from Eugene while responding to questions. Eugene can safely conclude that the suspect is dishonest due to his failure to maintain eye contact.
A.
True
B.
False
Answer:
B
User Votes:
A
50%
B
50%
Discussions
0/ 1000
Question 8
Anne used Will as a confidential informant in her investigation Anne listed information provided by Will in her final report, referring to him using his initials. She paid Will in cash and obtained a receipt for the transaction. Which of Anne's methods was NOT considered a best practice when using informants?
A.
Referring to Will using his initials
B.
Obtaining a receipt from Will
C.
Using information provided by Will in her report
D.
Using cash to pay Will
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 9
Jan a. the controller of XYZ Company, notices that the company's hotel expenses increased substantially from the prior year She wants to check to see if this increase is reasonable by comparing hotel expenses from both years to the number of days XYZ"s employees traveled. Which of the following data analysis functions would be the MOST USEFUL in helping Jana analyze these two variables?
A.
Correlation analysis
B.
Duplicate testing
C.
Verifying multiples of a number
D.
Ben ford’s Law analysis
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 10
When a fraud examiner is conducting an examination and is in the process of collecting documents, the fraud examiner should:
A.
Dust all physical key documents for fingerprints
B.
Establish a document database early in the investigation
C.
Make copies of originals and leave the originals where they were found
D.
Organize all the documents obtained in chronological order
Answer:
B
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 11
Which of the following is the LEAST ACCURATE statement about seizing a computer for examination?
A.
When taking a computer for examination, if the computer is off. it should remain off when it is removed.
B.
When seizing a computer that is running, it is acceptable for a fraud examiner to review the files contained on the machine prior to seizing it.
C.
Before removing a computer system from a scene for further analysis, it is important to document the system's setup with photographs or diagrams.
D.
When seizing a computer for examination, the seizing party should took around the area for passwords because many people leave passwords near their computers
Answer:
B
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 12
Which of the following is the MOST ACCURATE statement concerning the volatility of digital evidence?
A.
Digital evidence is more volatile than tangible evidence because digital evidence is subject to claims of spoliation, whereas tangible evidence is not.
B.
Digital evidence is more volatile than tangible evidence because the rules of admissibility for digital evidence are stricter than such rules for tangible evidence.
C.
If the integrity of digital evidence is violated, it can often be restored through a digital cleansing process
D.
The failure to preserve the integrity of digital evidence could result in evidence being deemed inadmissible in a legal proceeding
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 13
Allison, a Certified Fraud Examiner (CFE). is investigating a potential procurement fraud scheme. While interviewing a subject, she asks. "Why did you choose to do business with that vendor?" This can BEST be described as a(n):
A.
Open question
B.
Complex question
C.
Leading question
D.
Closed question
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 14
Marilyn, a Certified Fraud Examiner (CFE). is reasonably sure that Shelly, her primary suspect, committed the fraud in question Before scheduling an admission-seeking interview with Shelly. Marilyn should be reasonably sure of all of the following EXCEPT:
A.
That all reasonable investigative steps have been taken
B.
That the interview's time and location can be controlled
C.
That no other person was involved in the fraud in question
D.
That the interview's subject matter can be controlled
Answer:
C
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 15
Sam needs to obtain the most accurate court records possible in a particular jurisdiction concerning a fraud suspect. The BEST place for Sam to look is a global database that compiles court cases from various jurisdictions