Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

CFE-Investigation ACFE Certified Fraud Examiner (CFE) - Investigation Free Practice Exam Questions (2025 Updated)

Prepare effectively for your ACFE CFE-Investigation Certified Fraud Examiner (CFE) - Investigation certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 3
Total 170 questions

Anne used Will as a confidential informant in her investigation Anne listed information provided by Will in her final report, referring to him using his initials. She paid Will in cash and obtained a receipt for the transaction. Which of Anne's methods was NOT considered a best practice when using informants?

A.

Referring to Will using his initials

B.

Obtaining a receipt from Will

C.

Using information provided by Will in her report

D.

Using cash to pay Will

Which of the following statements about the process of obtaining a verbal confession is NOT true?

A.

The transition from the accusation to the confession should occur when the accused supplies the first detailed information about the offense.

B.

Fraudsters tend to overestimate the amount of funds involved in the offense to relieve themselves of the guilt of their dishonest actions.

C.

If the subject lies about an aspect of the offense in the process of confessing, it is best to proceed initially as if the falsehood has been accepted as truth.

D.

The three general approaches to obtaining a verbal confession are chronologically, by transaction, or by event.

Which of the following statements about the process of obtaining a verbal confession is TRUE?

A.

The only acceptable approaches to obtaining a verbal confession are chronologically or by transaction

B.

The transition from the accusation to the confession should occur when the accused supplies the first detailed information about the offense.

C.

If the subject lies about an aspect of the offense in the process of confessing, it is best to correct the records immediately before proceeding

D.

Fraudsters tend to overestimate the amount of funds involved in the offense to relieve themselves of the guilt of their dishonest actions.

Mila. a Certified Fraud Examiner (CFE). needs to obtain court records and wants to be as sure as possible that the records are accurate In most countries, the most reliable way lo obtain these documents is to obtain them directly from the court authorities.

A.

True

B.

False

Scarlett, a Certified Fraud Examiner (CFE). is assigned to the internal audit department of the ABC Company. She is getting ready to conduct an interview with another company employee who might be involved in a fraud. Which of the following is the MOST APPROPRIATE introduction for Scarlett to use with the employee?

A.

"Hello, my name is Scarlett, and I'm with the ABC Company."

B.

"Hello, my name is Scarlett. I'm an auditor with the ABC Company."

C.

"Hello, my name is Scarlett. I'm a Certified Fraud Examiner and an auditor with the ABC Company."

D.

"Hello, my name is Scarlett. I'm a Certified Fraud Examiner with the ABC Company."

Which of the following is NOT a best practice for obtaining a signed statement?

A.

Add subsequent facts to the statement as an addendum.

B.

Have the suspect write out the entire statement in their own handwriting

C.

Prepare separate statements for unrelated offenses

D.

Have two individuals witness the signing of the document when possible.

Which of the following is considered a best practice for preserving the confidentiality of a fraud investigation?

A.

Suspend all employees involved in the investigation pending the investigation's outcome.

B.

Ensure that the investigation is conducted at the direction of, or under the supervision of. a government official

C.

Avoid using email or other electronic means to transmit confidential case information

D.

Implement a blanket policy prohibiting all employees from discussing anything related to employee investigations

Which of the following is NOT one of the main limitations of conducting a search for public records using online databases?

A.

Online records companies are difficult to find.

B.

Fraud examiners must validate the accuracy of the records obtained online

C.

The online record might only be a brief abstract of the original.

D.

Fraud examiners often must search for public records in multiple jurisdictions.

Which of the following is a factor that fraud examiners should consider when determining whether to dispose of evidence following the conclusion of a fraud examination?

A.

Whether the information was presented by a lay witness or an expert witness

B.

Whether the evidence is documentary or testimonial

C.

Whether the evidence is direct or circumstantial

D.

Whether the organization has a general document retention policy in place

Which of the following should be done to prepare an organization for a formal fraud investigation?

A.

Inform the subject that they are under investigation.

B.

Issue an organization-wide communication that notifies all employees about the investigation

C.

Notify all managers about the investigation, explaining why it is happening and who is involved.

D.

Prepare the managers of the employees who will be involved in the investigation

Which of the following is NOT a common use of public sources of information?

A.

Searching an individual's income tax filings

B.

Obtaining background information on individuals

C.

Locating people and their assets

D.

Corroborating or refuting witness statements

When planning for the interview phase of an investigation, which of the following steps should NOT be taken by the fraud examiner?

A.

Consider what the interview is intended to accomplish and state an objective.

B.

Review the case file to ensure that important information has not been overlooked

C.

Prepare a detailed list of questions to ask the subject during the interview.

D.

Ensure that the interview is held in a venue where the subject will feel Uncomfortable

Leslie, a fraud examiner for ACME Corporation, suspects that a salesperson for another company has defrauded ACME. Leslie wants to obtain a copy of the suspect individual's credit report and personal data from a third-party information broker If Leslie works in a jurisdiction that regulates the distribution of personal credit information, she generally can obtain the information if she has the consent of the individual.

A.

True

B.

False

Which of the following types of information would LEAST LIKELY be found when searching external sources without the subject's consent or a legal order?

A.

A witness's address

B.

Assets owned by a subject

C.

A subject's employee personnel file

D.

A competitor's ownership information

Which of the following is the MOST ACCURATE statement about trying to locate a subject using online records?

A.

Most public records services do not maintain a list of past addresses

B.

Obtaining a past address of the subject should be the first step in trying to locate a subject using online records

C.

The first step in locating someone using online records is to obtain a list of past employers

D.

Online records are generally not useful in locating subjects whose address is unknown

Baker, a Certified Fraud Examiner (CFE). is assigned to the internal audit department of the ABC Company. He is getting ready to conduct an interview with another company employee who might be involved in a fraud. In general, what title should Baker use in his introduction to the employee?

A.

Baker should omit a title altogether

B.

Investigator

C.

Auditor

D.

Certified Fraud Examiner

Charles, a fraud examiner, accuses George of fraud during an admission-seeking interview. George immediately denies the charge How should Charles respond to George's denial?

A.

Counter the denial by arguing with George until further denials are futile

B.

Use a delaying tactic to interrupt the denial

C.

Remind George he has to tell the truth or face perjury.

D.

Allow George to continue denying the charge.

If you are seizing a computer for forensic analysis, why is it generally necessary to seize any copiers connected to it?

A.

Many copiers connect via parallel cables, which store and transmit copy job data.

B.

Most copiers store, process, and transmit data m a cloud environment

C.

Many copiers have internal hard drives that might contain information relevant to a fraud examination

D.

Most copiers today are nonimpact copiers, meaning that they store copied images indefinitely.

Caroline, a fraud examiner, is conducting an admission-seeking interview with John, an employee suspected of stealing cash. Which of the following is the MOST effective phrasing for Caroline to use when posing an admission-seeking question to John?

A.

"Why did you take the money?"

B.

"What do you know about the stolen money?"

C.

"Do you know who took the money''"

D.

"Did you steal the money?"

Which of the following is FALSE regarding link analysis?

A.

Link analysis is a poor tool to use for investigating a money laundering scheme

B.

Link analysis can be used to map connections between entities that share an address

C.

Link analysis helps identify indirect relationships with several degrees of separation

D.

Link analysis is an effective tool for demonstrating complex networks

Page: 2 / 3
Total 170 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved