Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which of the following can be obtained from a wire transfer record?

A.

The name of the receiving institution's registered agent

B.

The recipient's government identification number

C.

The name of the sender or originator

D.

The sending institution's accreditation type

Full Access
Question # 5

Which of the following data is the MOST DIFFICULT to recover during a digital forensic examination?

A.

Time and date information about files

B.

Websites visited

C.

Files that have been overwritten

D.

Communications sent via instant messenger

Full Access
Question # 6

Which of the following statements is MOST ACCURATE regarding covert operations?

A.

Fraud examiners should conduct coven operations only after attempting conventional methods of evidence-gathering

B.

Mistakes in covert operations generally do not cause damage to their associated investigations

C.

Covert operations rarely prove beneficial to investigations even when planned properly.

D.

Most jurisdictions provide protections for investigators conducting covert operations that shield them from reputational, financial, and legal consequences.

Full Access
Question # 7

Shane, a Certified Fraud Examiner (CFE). is investigating Larsen. who is active on various social networking sites. Shane wants to search and extract information from Larson's social media postings so that it can be used in court as evidence Which of the following is the MOST ACCURATE statement regarding what Shane should do when conducting a social media investigation of Larsen?

A.

Shane should conduct a forensic shutdown of his computer to preserve the metadata in the social networking sites.

B.

Shane should preserve the information from the social networking sites so that it can be established as authentic if used in court.

C.

Shane should email himself the links of the postings so that he can retrieve them later.

D.

Shane should preserve the information by saving the links of the postings in his 'bookmarks"

Full Access
Question # 8

Which of the following is a purpose of an admission-seeking interview?

A.

To establish that the confessor regrets committing the act

B.

To obtain a valid confession from a culpable individual

C.

To verify that the accused mistakenly committed the act

D.

To determine whether the subject's responses are credible

Full Access
Question # 9

Which of the following is NOT true with regard to tracing the disposition of loan proceeds?

A.

Tracing loan proceeds can determine if the proceeds were deposited into hidden accounts.

B.

Tracing loan proceeds can uncover previously hidden assets

C.

Tracing loan proceeds can determine if hidden accounts were used for loan payments

D.

Tracing loan proceeds can identify the presence of internal control weaknesses.

Full Access
Question # 10

Which of the following is NOT a step a fraud examiner must take before seizing evidence in a digital forensic investigation?

A.

Obtain and become familiar with any legal orders that apply to the investigation

B.

Assemble an investigation team comprised only of outside digital forensic experts

C.

Ensure that only trained professionals employ any software used in a forensic capacity

D.

Determine whether there are privacy issues related to the item(s) to be searched.

Full Access
Question # 11

Antonio is the former boyfriend of Hannah, a fraud suspect. He approaches Ashley, a fraud examiner at Hannah's company, and offers to provide critical information about Hannah's fraud in exchange for full confidentiality. Which of the following is the MOST APPROPRIATE response for Ashley to make?

A.

Ashley should explain that Antonio may have qualified confidentiality but that she cannot make any absolute assurances

B.

Ashley should promise Antonio unqualified confidentiality over all information provided

C.

Ashley should explain that all information must be disclosed to management so nothing Antonio says will be confidential

D.

Ashley should promise Antonio that his identity will not become known.

Full Access
Question # 12

Jackson, a digital forensic examiner for a government agency, is conducting a criminal investigation into the alleged embezzlement of funds from the government's Welfare Department (WD). Ginny. a WD employee, is the prime suspect. Jackson obtains a court order authorizing him to seize Ginny's personal computer for forensic examination. Which of the following is the MOST ACCURATE statement?

A.

If Ginny's computer is running. Jackson should perform a graceful shutdown by turning it off using the normal shutdown process

B.

If Ginny’s computer is off and Jackson needs evidence that exists only in the form of volatile data, he should turn the computer on and retrieve data directly via the computer's normal interface.

C.

If Ginny's computer is off. Jackson should not turn it on unless he plans to use an encryption device that can guarantee that the system's hard drive will not be accessed during startup.

D.

If Ginny's computer is running. Jackson may retrieve data from the computer directly via its normal interface if the evidence that he needs exists only in the form of volatile data

Full Access
Question # 13

Jana. the controller of XYZ Company, notices that the company's hotel expenses increased substantially from the prior year She wants to check to see if this increase is reasonable by comparing hotel expenses from both years to the number of days XYZ"s employees traveled. Which of the following data analysis functions would be the MOST USEFUL in helping Jana analyze these two variables?

A.

Correlation analysis

B.

Duplicate testing

C.

Verifying multiples of a number

D.

Ben ford’s Law analysis

Full Access
Question # 14

Baker, a Certified Fraud Examiner (CFE). is getting prepared to conduct a lengthy and complex interview. To prepare himself. Baker should:

A.

Writs down a detailed list of questions in advance

B.

Avoid bringing any notes with him to the interview

C.

Write down key points to go over with the respondent

D.

Take only the documents he wishes to go over

Full Access
Question # 15

Jade, a Certrfied Fraud Examiner (CFE). is conducting an internal investigation in which an employee is suspected of stealing inventory and selling it through a possible shell company called Hidden Finds. LLC. When Jade tries to check Hidden Finds' website, a message appears that redirects customers to a web address that ends with onion To view the website's content. Jade will need to install a specialized web browser that enables her to access which of the following?

A.

The deep archives

B.

The free web

C.

The dark web

D.

The internet archives

Full Access
Question # 16

Which of the following is the MOST ACCURATE statement regarding a fraud examiner's ability to trace cryptocurrency transactions?

A.

Each Blockchain transaction contains a user's cryptographic address, which can help identify patterns that might link the user to criminal activity.

B.

Most jurisdictions do not require digital wallet providers to record any personal information about cryptocurrency users

C.

Cryptocurrency ownership cannot be determined through an analysis of details on a subject's bank statements.

D.

Most cryptocurrencies rely on private block chains, which allow users' transactions to be completely anonymous and therefore difficult to trace.

Full Access
Question # 17

Management at Oak Company has asked Arthur, an internal auditor, to implement a data analysis program to search for warning signs of potential fraud within the company. Which of the following steps should Arthur conduct first to MOST effectively use data analysis techniques for such an initiative?

A.

Analyze the data.

B.

Cleanse and normalize the data

C.

Build a profile of potential frauds.

D.

Obtain the data.

Full Access
Question # 18

Which of the following is the MOST ACCURATE statement regarding the analysis phase in digital forensic investigations?

A.

The analysis phase of digital forensic investigations should not commence unless it is verified that the suspect devices do not contain relevant data.

B.

During the analysis phase, it is best to use a combination of the various forensic tools that can assist h identifying, extracting, and collecting digital evidence

C.

When analyzing data for evidence, fraud examiners should look for exculpatory evidence but not exculpatory evidence

D.

The primary concern when analyzing digital evidence is to protect the collected information from seizure

Full Access
Question # 19

Which of the following is the MOST ACCURATE statement about how fraud examiners shook! approach fraud examinations?

A.

Fraud examinations should begin with general information that is known, starting at the periphery, and then move to the more specific details.

B.

When conducting fraud examinations, fraud examiners should adhere to the means-and-ends approach

C.

When conducting fraud examinations, fraud examiners should operate under the assumption that the subjects are guilty

D.

In most examinations, fraud examiners should interview those who are more involved in the matters at issue before interviewing those who are less involved.

Full Access
Question # 20

Which of the following can be obtained from a wire transfer record?

A.

The amount of the transfer in question

B.

The type of money order used to make the transfer

C.

The location of the customs port of entry for the transfer

D.

The recipient's government identification number

Full Access
Question # 21

Sam needs to obtain the most accurate court records possible in a particular jurisdiction concerning a fraud suspect. The BEST place for Sam to look is a global database that compiles court cases from various jurisdictions

A.

True

B.

False

Full Access
Question # 22

Which of the following is a common characteristic that asset hiders look for in the financial vehicles they use to conceal their assets?

A.

Accessibility

B.

Transparency

C.

Exclusivity

D.

Traceability

Full Access
Question # 23

Jackson, a Certified Fraud Examiner (CFE). is analyzing Elm Company's accounts payable data to identify anomalies that might indicate fraud. Which of the following is the MOST EFFECTIVE data analysis function that Jackson could use to look for potential fraud in accounts payable?

A.

Compare book and tax depreciation and indicate variances

B.

Identify paychecks with amounts over a certain limit

C.

Summarize large invoices by amount and vendor

D.

All of the above

Full Access
Question # 24

Which of the following statements concerning access to nonpublic records is MOST ACCURATE?

A.

Once a criminal case is filed, all records obtained by the government are considered public records

B.

Nonpublic records cannot be obtained by subpoena or legal order in a civil action

C.

In most junsdictions. banks are allowed to turn over a suspect's account information directly to a fraud victim when there is adequate evidence of wrongdoing.

D.

The government usually will not share nonpublic records with a fraud victim during an investigation into the underlying fraud.

Full Access
Question # 25

Which of the following is a unique challenge of cloud forensics that is not encountered in traditional forensic practices?

A.

Lack of corroborating evidence

B.

Lack of data control

C.

Lack of trust from cloud providers

D.

Lack of relevant data

Full Access