Jackson, a Certified Fraud Examiner (CFE), is analyzing Elm Company’s accounts payable data to identify anomalies that might indicate fraud. Which of the following is the MOST EFFECTIVE data analysis function that Jackson could use to look for potential fraud in accounts payable?
Answer : B
Which of the following BEST describes the data analytics approach known as predictive analytics?
Answer : B
Jade, a Certified Fraud Examiner (CFE), is conducting an internal investigation in which an employee is suspected of stealing inventory and selling it through a possible shell company called Hidden Finds, LLC. When Jade tries to check Hidden Finds’ website, a message appears that redirects customers to a web address that ends with .onion. To view the website’s consent, Jade will need to install a specialized web browser that enables her to access which of the following?
Answer : B
Which of the following is NOT a common use of public sources of information?
Answer : A
Anne used Will as a confidential informant in her investigation. Anne listed information provided by Will in her final report, referring to him using his initials. She paid Will in cash and obtained a receipt for the transaction. Which of Anne’s methods was NOT considered a best practice when using informants?
Answer : C