Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Helping Hand Questions for CFE-Investigation

Certified Fraud Examiner (CFE) - Investigation Questions and Answers

Question 29

Christopher, a fraud examiner, is conducting an admission-seeking interview with Jennifer, an employee suspected of stealing cash. Which of the following is the LEAST EFFECTIVE phrasing for Christopher to use when posing an admission-seeking question to Jennifer?

Options:

A.

"Did you steal the money?"

B.

'What did you do with the money?"

C.

"Why did you take the money?"

D.

"How much of the money do you have left?"

Question 30

Which of the following questions would be most effective when starting the calibration process during an interview?

Options:

A.

"Did you commit any misconduct against the company?"

B.

"Do you know what the punishment is for violations like this'5"

C.

"Do you know who might have defrauded the company?"

D.

"How many jobs have you had before this one?’

Question 31

Jackson, a digital forensic examiner for a government agency, is conducting a criminal investigation into the alleged embezzlement of funds from the government's Welfare Department (WD). Ginny. a WD employee, is the prime suspect. Jackson obtains a court order authorizing him to seize Ginny's personal computer for forensic examination. Which of the following is the MOST ACCURATE statement?

Options:

A.

If Ginny's computer is running. Jackson should perform a graceful shutdown by turning it off using the normal shutdown process

B.

If Ginny’s computer is off and Jackson needs evidence that exists only in the form of volatile data, he should turn the computer on and retrieve data directly via the computer's normal interface.

C.

If Ginny's computer is off. Jackson should not turn it on unless he plans to use an encryption device that can guarantee that the system's hard drive will not be accessed during startup.

D.

If Ginny's computer is running. Jackson may retrieve data from the computer directly via its normal interface if the evidence that he needs exists only in the form of volatile data

Question 32

Which of the following is a best practice for obtaining a signed statement?

Options:

A.

Make sure that everything is included in the signed statement and that no addendum are made

B.

Have the suspect write out the entire statement in their own handwriting

C.

Have two individuals witness the signing of the document when possible.

D.

Include all of the subject's offenses, whether related or not, in a angle document.