ACFE CFE - Investigation - Certified Fraud Examiner - Investigation Exam

Page:    1 / 34   
Total 168 questions

Jackson, a Certified Fraud Examiner (CFE), is analyzing Elm Company’s accounts payable data to identify anomalies that might indicate fraud. Which of the following is the MOST EFFECTIVE data analysis function that Jackson could use to look for potential fraud in accounts payable?

  • A. Compare book and tax depreciation and indicate variances
  • B. Identify paycheck amounts over a certain limit
  • C. Summarize large invoices by amount and vendor
  • D. All of the above


Answer : B

Which of the following BEST describes the data analytics approach known as predictive analytics?

  • A. The configuration of a business program to emulate and integrate the actions of a human to execute certain business processes, thus increasing efficiency and automating repetitive manual tasks
  • B. The use of historical data, along with analyses, statistics, and machine learning components, to build a mathematical model that captures important trends and creates a quantitative forecast
  • C. The use of layered artificial neural networks to accommodate more data and more sophisticated algorithms to identify complex patterns.
  • D. The employment of a learning algorithm that identifies similarities, patterns, or anomalies within a data set on its own without human involvement.


Answer : B

Jade, a Certified Fraud Examiner (CFE), is conducting an internal investigation in which an employee is suspected of stealing inventory and selling it through a possible shell company called Hidden Finds, LLC. When Jade tries to check Hidden Finds’ website, a message appears that redirects customers to a web address that ends with .onion. To view the website’s consent, Jade will need to install a specialized web browser that enables her to access which of the following?

  • A. The internet archives
  • B. The dark web
  • C. The free web
  • D. The deep archives


Answer : B

Which of the following is NOT a common use of public sources of information?

  • A. Corroborating or refuting witness statements
  • B. Obtaining background information on individuals
  • C. Locating people and their assets
  • D. Searching an individual’s income tax fillings


Answer : A

Anne used Will as a confidential informant in her investigation. Anne listed information provided by Will in her final report, referring to him using his initials. She paid Will in cash and obtained a receipt for the transaction. Which of Anne’s methods was NOT considered a best practice when using informants?

  • A. Using information provided by Will in her report
  • B. Using cash to pay Will
  • C. Obtaining a receipt from Will
  • D. Referring to Will using his initials


Answer : C

Page:    1 / 34   
Total 168 questions