Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

CFE-Investigation Certified Fraud Examiner (CFE) - Investigation Questions and Answers

Questions 4

Which of the following statements about the process of obtaining a verbal confession is NOT true?

Options:

A.

The transition from the accusation to the confession should occur when the accused supplies the first detailed information about the offense.

B.

Fraudsters tend to overestimate the amount of funds involved in the offense to relieve themselves of the guilt of their dishonest actions.

C.

If the subject lies about an aspect of the offense in the process of confessing, it is best to proceed initially as if the falsehood has been accepted as truth.

D.

The three general approaches to obtaining a verbal confession are chronologically, by transaction, or by event.

Buy Now
Questions 5

Which of the following is one of the purposes of closing questions in a routine interview?

Options:

A.

To close the interview positively and maintain goodwill

B.

To assess whether the subject is ready to confess

C.

To confirm the credibility of the witness being interviewed

D.

To reduce testimony to a signed, written statement

Buy Now
Questions 6

Janet suspects that a local restaurant is being used as a front business for a criminal operation. Which of the following types of records would be the MOST LIKELY to help Janet discover who owns the restaurant building?

Options:

A.

Commercial filings

B.

Building permit records

C.

Local court records

D.

Voter registration records

Buy Now
Questions 7

Which of the following is the MOST ACCURATE statement concerning the volatility of digital evidence?

Options:

A.

Digital evidence is more volatile than tangible evidence because digital evidence is subject to claims of spoliation, whereas tangible evidence is not.

B.

Digital evidence is more volatile than tangible evidence because the rules of admissibility for digital evidence are stricter than such rules for tangible evidence.

C.

If the integrity of digital evidence is violated, it can often be restored through a digital cleansing process

D.

The failure to preserve the integrity of digital evidence could result in evidence being deemed inadmissible in a legal proceeding

Buy Now
Questions 8

Which of the following questions is MOST HELPFUL for fraud examiners to ask themselves when determining the legality of electronically recording a conversation?

Options:

A.

"Can the recording include both audio and video?

B.

"Will the recording equipment produce a digital file?"

C.

"Will the recorded conversation take place before or after work?"

D.

"How long is the anticipated recording expected to last?"

Buy Now
Questions 9

Boyd, a Certified Fraud Examiner (CFE). was hired to trace Lottie's financial transactions. During his investigation. Boyd obtains records of electronic payments that Lottie made during the past five years. Which of the following are these records MOST LIKELY to reveal?

Options:

A.

The market value of any real property Lottie owns

B.

The assets that Lottie has purchased

C.

The division and distribution of Lottie's assets

D.

If Lottie is skimming her employer's funds

Buy Now
Questions 10

John, a fraud investigator, is interviewing Mary, who he suspects has been embezzling company funds. Which of the following is the recommended approach John should use to ask Mary questions?

Options:

A.

Start with questions about unknown information and work toward known information

B.

Ask questions in random order to keep Mary from guessing the next question

C.

Start with specific questions and move toward general questions

D.

Seek general information before seeking specific details

Buy Now
Questions 11

Lisa, a fraud examiner at a private company, receives an anonymous call from a potential whistleblower. The whistleblower is hesitant to reveal their identity but will do so if it can be Kept fully confidential. Which of the following statements is MOST ACCURATE?

Options:

A.

Lisa may offer the whistleblower full confidentiality because they are not a suspect

B.

Lisa should explain that she will try her best to keep the whistleblower"s identity confidential.

C.

Lisa should state that she will not be able to keep the whistleblower's identity confidential because all information must be disclosed to management

D.

Lisa may promise the whistleblower full confidentiality, even if she knows her statement is untrue, because the lie is ultimately beneficial to her employer.

Buy Now
Questions 12

Tara. a Certified Fraud Examiner (CFE). is searching social media sites for evidence in a fraud investigation. Which of the following is the MOST ACCURATE statement regarding what Tara should do when mining social media sites for evidence of fraud?

Options:

A.

Tara should preserve the information by saving the links of the postings as bookmarks in her browser.

B.

Tara should preserve the metadata by printing out the web pages of each of the postings.

C.

Tara should conduct a forensic shutdown of the computer to preserve the metadata m the social networking sites.

D.

Tara should preserve the information from the sites so that it can be established as authentic if used in court.

Buy Now
Questions 13

Barnes, a Certified Fraud Examiner (CFE). is using data analysis to identify anomalies that might indicate fraud in XYZ Company's accounts payable transactions. Which of the following is the MOST EFFECTIVE data analysis function that Barnes could use to look for potential fraud in accounts payable?

Options:

A.

Compare book and tax depreciation and indicate variances

B.

Identify paycheck amounts over a certain limit

C.

Review recurring monthly expenses and compare to posted/paid invoices

D.

All of the above

Buy Now
Questions 14

Which of the following types of files is the most difficult to recover during a digital forensic examination?

Options:

A.

Overwritten files

B.

Deleted until

C.

Deleted link (shortcut) files

D.

Hidden files

Buy Now
Questions 15

Sam needs to obtain the most accurate court records possible in a particular jurisdiction concerning a fraud suspect. The BEST place for Sam to look is a global database that compiles court cases from various jurisdictions

Options:

A.

True

B.

False

Buy Now
Questions 16

Which of the following is FALSE regarding link analysis?

Options:

A.

Link analysis is a poor tool to use for investigating a money laundering scheme

B.

Link analysis can be used to map connections between entities that share an address

C.

Link analysis helps identify indirect relationships with several degrees of separation

D.

Link analysis is an effective tool for demonstrating complex networks

Buy Now
Questions 17

Which of the following is the MOST ACCURATE statement about trying to locate a subject using online records?

Options:

A.

Most public records services do not maintain a list of past addresses

B.

Obtaining a past address of the subject should be the first step in trying to locate a subject using online records

C.

The first step in locating someone using online records is to obtain a list of past employers

D.

Online records are generally not useful in locating subjects whose address is unknown

Buy Now
Questions 18

Which of the following is TRUE of a follow-up/recommendations section in a written fraud examination report?

Options:

A.

A follow-up/recommendations section is not a required part of every written fraud examination report

B.

A follow-up/recommendations section calculates the amount of loss caused by any misconduct identified during the investigation

C.

A follow-up/recommendations section must include a list of organizational failings that contnbuted to the fraud

D.

All of the above

Buy Now
Questions 19

All of the following are true with regard to textual analytics EXCEPT:

Options:

A.

When conducting textual analysis, the fraud examiner should come up with a list of fraud keywords to search for.

B.

Textual analytics is used to reveal patterns, sentiments, and relationships indicative of fraud

C.

The purpose of textual analytics is to search for and find an admission of fraud that can be presented in court

D.

Textual analytics provides the ability to uncover warning signs of potentially fraudulent employee behavior

Buy Now
Questions 20

Due to risks of illicit transactions, most jurisdictions require financial institutions to obtain information about which of the following from an institution with which they have a foreign correspondent relationship?

Options:

A.

The institution's ownership details

B.

The institution's investment portfolio

C.

The institution's client loan profiles

D.

The institution's tax statements

Buy Now
Questions 21

Which of the following is a common characteristic that asset hiders look for in the financial vehicles they use to conceal their assets?

Options:

A.

Accessibility

B.

Transparency

C.

Exclusivity

D.

Traceability

Buy Now
Questions 22

Why is it necessary to image a seized computer's hard drive for forensic analysis?

Options:

A.

To prohibit access to the suspect computer's hard drive by individuals not professionally trained in forensic analysis

B.

To allow for the analysis of data from a suspect computer without altering or damaging the original data in any way

C.

To create pictures of the suspect computer system and its wires and cables

D.

To enable the retrieval of data from the suspect computer directly via its operating system

Buy Now
Questions 23

Which of the following BEST describes the data analytics approach known as predictive analytics?

Options:

A.

The employment of a learning algorithm that identifies similarities, patterns, or anomalies within a data set on its own, without human involvement

B.

The configuration of a business program to emulate and integrate the actions of a human to execute certain business processes thus increasing efficiency and automating repetitive manual tasks

C.

The use of historical data, along with analyses, statistics, and machine learning components, to build a mathematical model that captures important trends and creates a quantitative forecast

D.

The use of layered artificial neural networks to accommodate more data and more sophisticated algorithms to identify complex patterns

Buy Now
Questions 24

Delta, an interviewer with little experience, asks Sigma, the respondent, the following question: "Were you aware that the signature was forged, and why didn't you tell anyone earlier?" This kind of question is called a_____________question

Options:

A.

Complex

B.

Controlled answer

C.

Free narrative

D.

Double-negative

Buy Now
Questions 25

Gamma, a Certified Fraud Examiner (CFE>, was conducting an admission-seeking interview of Delta, a fraud suspect. Gamma tells Delta, "It isn't like you took something from a friend or neighbor I can see how you could say. 'Well, this would be okay as long as it is the company and not my coworkers.' Isn't that right?" This technique seeks to establish rationalization by:

Options:

A.

Convincing DDU that the incident had suffcinet justification

B.

Reducing Delta's perception of the legal seriousness of the matter

C.

Depersonalizing the victim

D.

Developing revenge as a motive

Buy Now
Questions 26

Which of the following is the MOST ACCURATE statement about the privacy of information shared through social media?

Options:

A.

To access any user-posted information on social media sites, fraud examiners must obtain some type of legal order from the jurisdiction in which the user resides.

B.

A fraud examiner cannot be held liable for violating a user's privacy rights if they hack or break into areas of a social networking site designated as private because all social media information is public.

C.

The Privacy of Social Networks Treaty is a binding international treaty that makes it illegal for law enforcement to seek social media log-in credentials from users.

D.

Hacking or breaking into information on social media sites that is restricted as private could result in liability for fraud examiners due to violation of users' privacy rights.

Buy Now
Questions 27

Baker, a Certified Fraud Examiner (CFE). is getting prepared to conduct a lengthy and complex interview. To prepare himself. Baker should:

Options:

A.

Writs down a detailed list of questions in advance

B.

Avoid bringing any notes with him to the interview

C.

Write down key points to go over with the respondent

D.

Take only the documents he wishes to go over

Buy Now
Questions 28

Sarah is conducting an admission-seeking interview of a suspect. Throughout the interview, the suspect makes little eye contact with Sarah. Based on this information atone, can Sarah conclude that the suspect is being deceptive?

Options:

A.

Yes, because it is safe to assume that suspects who avoid eye contact are most likely being deceptive.

B.

Yes, because avoiding eye contact is a sign of deceptive.

C.

No, because this is not enough information to conclude that the suspect is being deceptive

D.

No, because avoiding eye contact is not directly linked to deception.

Buy Now
Questions 29

Antonio is the former boyfriend of Hannah, a fraud suspect. He approaches Ashley, a fraud examiner at Hannah's company, and offers to provide critical information about Hannah's fraud in exchange for full confidentiality. Which of the following is the MOST APPROPRIATE response for Ashley to make?

Options:

A.

Ashley should explain that Antonio may have qualified confidentiality but that she cannot make any absolute assurances

B.

Ashley should promise Antonio unqualified confidentiality over all information provided

C.

Ashley should explain that all information must be disclosed to management so nothing Antonio says will be confidential

D.

Ashley should promise Antonio that his identity will not become known.

Buy Now
Questions 30

Scarlett, a Certified Fraud Examiner (CFE). is assigned to the internal audit department of the ABC Company. She is getting ready to conduct an interview with another company employee who might be involved in a fraud. Which of the following is the MOST APPROPRIATE introduction for Scarlett to use with the employee?

Options:

A.

"Hello, my name is Scarlett, and I'm with the ABC Company."

B.

"Hello, my name is Scarlett. I'm an auditor with the ABC Company."

C.

"Hello, my name is Scarlett. I'm a Certified Fraud Examiner and an auditor with the ABC Company."

D.

"Hello, my name is Scarlett. I'm a Certified Fraud Examiner with the ABC Company."

Buy Now
Questions 31

A fraud examiner is based in Mexico, a non-European Union (EU) country, and is collecting personal information from their company's human resources (HR) files about an employee based in Germany, an EU country. Based on these facts, the fraud examiner would need to comply with the EU"s General Data Protection Regulation (GDPR) when conducting their internal investigation.

Options:

A.

True

B.

False

Buy Now
Questions 32

A fraud examiner is based m the United States, a non-European Union (EU) country, and is collecting personal information from their company's human resources (HR) files about an employee based in Spain, an EU country Based on these facts, the fraud examiner would need to comply with the EU's General Data Protection Regulation (GDPR) when conducting their internal investigation.

Options:

A.

True

B.

False

Buy Now
Questions 33

When planning for the interview phase of an investigation, which of the following steps should NOT be taken by the fraud examiner?

Options:

A.

Consider what the interview is intended to accomplish and state an objective.

B.

Review the case file to ensure that important information has not been overlooked

C.

Prepare a detailed list of questions to ask the subject during the interview.

D.

Ensure that the interview is held in a venue where the subject will feel Uncomfortable

Buy Now
Questions 34

Which of the following is the MOST APPROPRIATE measure when seeking to avoid alerting suspected perpetrators who are under investigation?

Options:

A.

Terminate the suspected employee.

B.

Delay taking any action.

C.

Investigate during nonbusiness hours.

D.

Disclose the investigation to all employees

Buy Now
Questions 35

Jackson, a Certified Fraud Examiner (CFE). is analyzing Elm Company's accounts payable data to identify anomalies that might indicate fraud. Which of the following is the MOST EFFECTIVE data analysis function that Jackson could use to look for potential fraud in accounts payable?

Options:

A.

Compare book and tax depreciation and indicate variances

B.

Identify paychecks with amounts over a certain limit

C.

Summarize large invoices by amount and vendor

D.

All of the above

Buy Now
Questions 36

Which of the following statements is MOST ACCURATE regarding covert operations?

Options:

A.

Fraud examiners should conduct coven operations only after attempting conventional methods of evidence-gathering

B.

Mistakes in covert operations generally do not cause damage to their associated investigations

C.

Covert operations rarely prove beneficial to investigations even when planned properly.

D.

Most jurisdictions provide protections for investigators conducting covert operations that shield them from reputational, financial, and legal consequences.

Buy Now
Questions 37

Pedro, a Certified Fraud Examiner (CFE). is conducting an admission-seeking interview of Manuel, a fraud suspect. After Pedro diffused Manuel's alibis. Manuel became withdrawn and stowty began to slouch m his chair, bowing his head and beginning to cry. What should Pedro do now?

Options:

A.

Leave the room for a short lime

B.

Ask Manuel to sit up straight

C.

Demand that Manuel stop crying.

D.

Present an alternative question.

Buy Now
Questions 38

Nobles, a digital forensic examiner for a government agency, is conducting a criminal investigation of Lucas, a construction company executive, for alleged bribery of foreign officials Nobles obtains a court order authorizing him to seize Lucas's personal computer for forensic examination. Which of the following is the MOST ACCURATE statement?

Options:

A.

If Lucas's computer is running. Nobles may retrieve data from the computer directly via its normal interface 4 the evidence that he needs exists only in the form of volatile data

B.

If Lucas's computer is off and Nobles needs evidence that exists only in the form of volatile data, he should turn the computer on and retrieve data directly via the computer's normal interlace.

C.

If Lucas's computer is off. Nobles should not turn it on unless he plans to use an encryption device that can guarantee that the system's hard drive will not be accessed during startup.

D.

If Lucas's computer is running. Nobles should perform a graceful shutdown by turning it off using the normal shutdown process

Buy Now
Questions 39

Which of the following types of data is BEST suited for a BenfordTs Law analysis?

Options:

A.

Employee identification numbers

B.

Telephone numbers

C.

A listing of payment amounts

D.

Vendor addresses

Buy Now
Questions 40

Smith, a Certified Fraud Examiner (CFE) for the Ajax Co.. observes Jones, an accounts payable clerk, driving an expensive sports car to work. Smith also has knowledge that Jones recently had extensive remodeling done on her residence. Smith has sufficient predication to:

Options:

A.

Conduct discreet inquiries into Jones's responsibilities as an accounts payable clerk

B.

Notify management of the possibility that Jones has committed fraudulent acts.

C.

Search Jones's mobile phone for evidence of misconduct

D.

Accuse Jones directly of having committed fraud.

Buy Now
Questions 41

Which of the following is NOT true with regard to tracing the disposition of loan proceeds?

Options:

A.

Tracing loan proceeds can reveal previous civil offenses committed by the subject

B.

Tracing loan proceeds can determine if the proceeds were deposited into hidden accounts

C.

Tracing loan proceeds can uncover previously unknown witnesses

D.

Tracing loan proceeds can determine if hidden accounts were used for loan payments.

Buy Now
Questions 42

Baker, a Certified Fraud Examiner (CFE). contacts Dierdre for the purpose of conducting a routine, information-gathering interview Dierdre expresses a desire that her coworker. Matthew, whom Baker also plans to interview, be interviewed at the same time Baker should:

Options:

A.

Interview Dierdre and Matthew separately.

B.

Interview Dierdre and Matthew at the same time, but bring in a second interviewer

C.

Interview Dierdre and Matthew at the same time by himself

D.

Allow Matthew to be present as a silent observer.

Buy Now
Questions 43

Which of the following is NOT one of the main limitations of conducting a search for public records using online databases?

Options:

A.

Online public records searches are limited in the jurisdictions they cover.

B.

Public records database companies are difficult to find.

C.

Online coverage of public records varies widely from jurisdiction to jurisdiction

D.

The timeliness and accuracy of information in online databases must be validated

Buy Now
Questions 44

Beta, a Certified Fraud Examiner (CFE). is conducting an admission-seeking interview of Gamma, a fraud suspect. After Beta gave Gamma an appropriate rationalization for his conduct, Gamma continued his denials, giving various alibis. These alibis can usually be diffused by all of the following techniques EXCEPT:

Options:

A.

Discussing the testimony of witnesses

B.

Displaying physical evidence

C.

Discussing Gamma's prior deceptions

D.

Downplaying the strength of the evidence

Buy Now
Questions 45

Talia has been hired by SBS Inc. to implement a new data analysis program to search for warning signs of potential fraud within the company. Which of the following steps should Talia conduct first to MOST EFFECTIVELY use data analysis techniques for such an initiative?

Options:

A.

Build a profile of potential frauds.

B.

Monitor the data.

C.

Cleanse and normalize the data.

D.

Identify the relevant data

Buy Now
Questions 46

Which of the following is a reason why a subject's credit card records are useful in tracing investigations?

Options:

A.

Credit card statements show source of the funds used to pay a credit card bill

B.

Credit card records show the movements and habits of the subject

C.

Credit card records provide insight into the subject's litigation history

D.

Credit card records contain information about the division and distribution of the subject's assets

Buy Now
Questions 47

Jade, a Certrfied Fraud Examiner (CFE). is conducting an internal investigation in which an employee is suspected of stealing inventory and selling it through a possible shell company called Hidden Finds. LLC. When Jade tries to check Hidden Finds' website, a message appears that redirects customers to a web address that ends with onion To view the website's content. Jade will need to install a specialized web browser that enables her to access which of the following?

Options:

A.

The deep archives

B.

The free web

C.

The dark web

D.

The internet archives

Buy Now
Questions 48

Which of the following is NOT true with regard to tracing the disposition of loan proceeds?

Options:

A.

Tracing loan proceeds can determine if the proceeds were deposited into hidden accounts.

B.

Tracing loan proceeds can uncover previously hidden assets

C.

Tracing loan proceeds can determine if hidden accounts were used for loan payments

D.

Tracing loan proceeds can identify the presence of internal control weaknesses.

Buy Now
Questions 49

Martin is a fraud examiner. He contacts Dianne for the purpose of conducting a routine, information-gathering interview. Dianne says that she wants her coworker. Sheila, whom Martin also plans to interview, to be present during the interview. Martin should:

Options:

A.

Interview Dianne and Sheila separately

B.

Allow Sheila to be present but only if she does not speak

C.

Interview Dianne and Sheila together by himself

D.

Interview Dianne and Sheila together, but bring in a second interviewer

Buy Now
Questions 50

A law enforcement officer receives a reliable tip from an informant that a government employee is soliciting bribes in exchange for awarding contracts to the employee's agency. To investigate, the officer poses as a potential contractor and contacts the suspect employee about the possibility of getting a contract with the agency. During the conversation, the suspect demands a cash payment for the officer to be considered for upcoming contracts. If the suspect claims entrapment at trial, then which of the following is MOST LIKELY to occur?

Options:

A.

The suspect's claim will succeed because the investigator used deceit

B.

The suspect's claim will succeed because the investigator lacked probable cause

C.

The suspect's claim will fail because the investigator had adequate predication

D.

The suspect's claim will fail because the investigator is a law enforcement agent

Buy Now
Questions 51

Which of the following is a recommended strategy when conducting admission-seeking interviews?

Options:

A.

Increase sympathy while downplaying implications of wrongdoing.

B.

Ensure that accusations are made in the presence of a third party to avoid potential liability

C.

Emphasize a lack of morality in the subject's actions to induce them into confessing.

D.

Use time constraints as a means to pressure the subject into making a confession.

Buy Now
Exam Code: CFE-Investigation
Exam Name: Certified Fraud Examiner (CFE) - Investigation
Last Update: Nov 21, 2025
Questions: 170

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now CFE-Investigation testing engine

PDF (Q&A)

$36.75  $104.99
buy now CFE-Investigation pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 21 Nov 2025