CFE-Investigation Flashcards

(104 cards)

0
Q

Blue is conducting an admission-seeking interview of Red. Blue asked Red: “Did you just want extra money, or did you do this because you had financial problems?” This is called a(n):

A

An alternative question.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

During the introductory portion of an interview, the interviewer must state the purpose of the interview in a general way. This is known as:

A

Establishing the interview theme.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Simone is suspected of financial statement fraud. During an admission-seeking interview with Simone, the investigator states: “A lot of employees count on the company doing well. I know you only did this to help the company succeed. Isn’t that right?” This technique is known as:

A

Altruism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An admission-seeking interview is specifically designed to:

A

Obtain a legal admission of wrongdoing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The goal of establishing an interview theme should be to:

A

Get the respondent to make a commitment to assist before commencing serious questioning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is typically the most effective way to document chain of custody for a piece of evidence?

A

A memorandum with the custodian of the evidence when the evidence is received.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Jeff is accused of skimming money from the register. During an admission-seeking interview with Jeff, the investigator states: “This is a huge corporation with more than a hundred stores, so it’s not like a few bucks here and there is going to affect anyone personally. Is that how you saw it?” This technique is known as:

A

Depersonalizing the victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Introductory questions are designed to meet four objectives:

A

To provide an introduction, to establish rapport, to get the respondent to agree verbally to cooperate in the interview (i.e., establish the interview theme), and to observe the respondent’s reactions to questions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some types of information deemed to be public under the Freedom of Information Act (FOIA)?

A

Telephone records, stock ownership records, trust records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the term that refers to the net amount a lender disburses to a borrower under the terms of a loan agreement?

A

Loan proceeds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Where would an investigator likely find a record of a divorce?

A

County court in the jurisdiction where the divorce was granted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Able, a CFE, asked the following question: “Since you were here when the controls were developed, can you tell me how they came about?” This kind of question is called a

A

Controlled answer technique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is generally NOT a recommended practice when organizing documents/evidence?

A

File all papers chronologically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following best describes the primary purpose of the Right to Financial Privacy Act?

A

To prohibit financial institutions from disclosing financial information about individual customers to government agencies without consent or a judicial order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Bill wants to search the Internet for articles about check fraud using a search engine. Which of the following search strings will yield the best results?

A

intitle:check fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

To stimulate conversation during the information phase of the interview, the interviewer should ask:

A

Open questions that call for a monologue response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Darren is conducting a fraud examination of Cooper, at a government entity. Darren has strong reason to believe that Cooper has incriminating evidence on a personal smart phone that he brings to work. Which of the following statements is most accurate?

A

Darren may search the phone if his organization has a privacy policy informing employees that personal smart phones are subject to search.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

_____________ is a method of using software to extract usable information from unstructured data.

A

Textual analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

If permitted by law, a suspect’s Social Security number can most easily be obtained through which of the following online searches?

A

Credit bureau header search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In interviews involving anxiety and uncertainty, individuals might perform displacement activities that reduce nervousness. These types of displacement activities are known as:

A

Manipulators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a data analysis tool that is effective in identifying indirect relationships and relationships with several degrees of separation?

A

Link analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

When conducting an interview, there are five general types of questions an interviewer can ask:

A

Introductory, informational, assessment, closing, and admission-seeking. CAASII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

There is no legal requirement that a statement:

A

Be in the handwriting or wording of the declarant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Fraud examination is best described as:

A

A methodology for resolving fraud allegations from inception to disposition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
What is the facilitator of communication that refers to an individual's need for the esteem of others?
Recognition.
25
Items located at a time when they could not have existed or occurred:
Anachronisms.
26
Examples of data analysis queries that can be performed by data analysis software on payroll accounts to help detect fraud:
Summarize payroll activity by specific criteria for review, Identify changes to payroll or employee files, Compare timecard and payroll rates for possible discrepancies, Prepare check amount reports for amounts over a certain limit and check proper supervisory authorization on payroll disbursements.
27
In interview situations, ___________ are questions that often suggest an answer opposite to the correct one.
Double negative.
28
What law governs the dissemination of an individual's credit information to third parties by consumer reporting agencies?
Federal Credit Reporting Act.
29
Baker is attempting to obtain information about a fraud suspect from a local bank. The records of the bank are covered by which federal law?
Right to Financial Privacy Act.
30
What best describes the primary purpose of the Right to Financial Privacy Act?
To prohibit financial institutions from disclosing financial information about individual customers to government agencies without consent or a judicial order.
31
A fraud examiner discovers a paper document that he believes has both the suspect's indented writings and latent fingerprints on it. Which of the following is the BEST preservation method for him to use when collecting the document?
Place the document into a plastic bag while handling it with protective gloves.
32
In interview situations, ______________ communication is the use of interpersonal space to convey meaning.
Proxemic.
33
The primary concern when analyzing digital evidence is to:
maintain the integrity of the data at all times.
34
A Uniform Commercial Code (UCC) filings search can help identify:
Personal property that an individual or business has financed.
35
A fraud examiner is preparing his full case report at the conclusion of a fraud investigation. When including information regarding the interviews conducted during the examination, the fraud examiner should:
Report the details of each witness interview in a separate memorandum of interview.
36
A fraud examiner is conducting textual analytics on journal entry data and runs a keyword search using the terms override, write off, and reserve. Which leg of the fraud triangle are these fraud keywords typically associated with?
Opportunity.
37
Text-based data is typically considered:
Unstructured data.
38
Understanding the data, determining whether predication exists, and building a profile of potential frauds are all steps of which phase of the data analysis process?
The planning phase
39
What is a method of tracing illicit funds in which deposits to financial institutions are compared to legitimate income?
Bank deposit analysis method
40
The terms induction and deduction are most often associated with which inhibitor to communication?
Inferential confusion..
41
Green, a Certified Fraud Examiner, is conducting an admission-seeking interview of Brown, a fraud suspect. Brown has confessed to having committed the fraud, but he is denying anyone else was involved. However, Green knows this is untrue. What should Green do next?
Proceed as if the falsehood has been accepted as truth and return to it later.
42
Symbols and words—such as the plus sign, the minus sign, and the words "and" and "not"—that help search engines better understand exactly what the user is looking for are known as which of the following?
Boolean operators
43
Which of the following steps takes place during the preparation phase of a data analysis engagement?
Cleansing and normalizing the data
44
During which phase of the data analysis process does the fraud examiner identify, obtain, and verify the relevant or requested data?
The preparation phase
45
Graphology (or graphoanalysis) has been described as a
pseudoscience in which its practitioners have the purported ability to determine a person's character, moral traits, personality, and mental state based upon an analysis of that person's handwriting. It is is often erroneously confused with forensic document examinations, especially by the media.
46
A formal request by the courts of one country seeking judicial assistance from the courts of another country is known as a:
Letter rogatory.
47
As a general rule, the more intelligent the respondent,
the more reliable verbal and nonverbal clues will be.
48
Gamma, a CFE, is conducting an investigation involving ABC Company, a publicly traded company. If Gamma requests ABC's annual financial report from the (SEC), the information will be contained on which of the following SEC forms?
10-K
49
Surprise should be employed in any interview that is considered:
Potentially volatile.
50
Which of the data analysis functions is most useful in testing for hidden journal entries?
Gap testing.
51
Process of hiding one piece of information within an apparently innocent file is called:
Steganography.
52
Sensitive questions should be:
Scrupulously avoided until well into the interview. Even then, such questions should be asked only after careful deliberation and planning.
53
When seizing a computer that is running, the seizing party should not:
Perform a graceful shutdown by turning it off using the normal shutdown process. If a system is turned off using normal shutdown routines, a number of temporary files will be deleted and possibly overwritten during the shutdown process, and such files might be important to the investigation.
54
Most commonly, leading questions are used to:
Confirm facts already known.
55
What refers to the inhibitor to communication in which the respondent confuses the order or timeline of experiences?
Chronological confusion
56
A(n) _____________ is a type of visual aid, in the form of a grid, that shows the relationship (or points of contacts) between a number of entities.
Matrix.
57
When tracing financial transactions, the method that involves using the subject's books and records to analyze the relationship between the subject's receipt and subsequent disposition of funds or assets is called?
The direct method.
58
Multi-file processing
is a data analysis software function that allows users to relate several files by defining relationships in collected data, without the use of the join command.
59
Inferential confusion denotes:
confusion and inaccuracies resulting from errors of inference.
60
Used in or suitable to courts of law or public debate is the definition of:
Forensic.
61
The totality of circumstances that would lead a reasonable, professionally trained, and prudent individual to believe that fraud has occurred:
Predication.
62
The actions an organization will take when suspicion of fraud have arisen:
Fraud response plan.
63
The steps a company takes to employees to suspend the destruction of potentially relevant records when the duty to preserve information arises is called:
A litigation hold.
64
Protects tangible materials that are prepared in anticipation of litigation:
Work product doctrine.
65
Two types of evidence:
Direct and circumstantial.
66
Unintentional changes to a person's writing that are beyond his/her normal variations are called:
Distortions.
67
A true name signature by an individual who intends to deny that signature at a later time is called:
Autoforgery.
68
The following is a common use of public records in fraud examinations:
Tracing and recovering assets.
69
Blue, a Certified Fraud Examiner, has just begun an interview of White. After introducing himself and establishing rapport with White, what should Blue do next?
Establish the interview theme.
70
An example of a data analysis function that can be performed to help detect fraud through examination of payroll accounts?
Identify paycheck amounts over a certain limit.
71
To show that the subject's assets or expenditures exceed his reported income an investigator could use the:
Net-worth analysis.
72
Canceled checks written on a subject's account can:
reveal other bank accounts belonging to the subject.
73
The rules of admissibility for digital evidence are:
Different, but not stricter than such rules for tangible evidence.
74
Is a method of tracing illicit funds in which deposits to financial institutions are compared to legitimate income:
Bank deposit analysis method
75
Under the Fair Credit Reporting Act, an employer does not need an employee's consent to access the employee's credit report if:
the report is obtained as part of an investigation into suspected employee misconduct.
76
Suppose you need to prove a suspect's illicit income circumstantially. Which of the following methods of tracing assets would yield the best result when the suspect is spending his illicit funds on items that would not cause an increase in net worth, such as travel and entertainment?
The expenditures method.
77
Which of the following is a type of information that can be obtained from the historical Web?
Web content posted on a website that has been removed.
78
When an individual purchases real estate, he becomes a registrant in which of the following records?
Tax assessor records, real property records, and property tax records.
79
________ is a data analysis software function that allows users to relate several files by defining relationships in collected data, without the use of the join command.
Multi-file processing.
80
Suppose you suspect there is a ghost employee scheme taking place in your organization and you want to compare the payroll records to the employee master file. Which data analysis technique would you use to match these two data records?
The join function.
81
Which of the following witnesses should be interviewed by surprise?
Volatile.
82
Which of the following computer events logs records events executed on an operating system, such as starting up and shutting down, configuration updates, and system crashes?
System log.
83
It sends user requests to several other search engines and aggregate the results for display:
Metasearch engines.
84
It can be used to visually map connections between entities that share an address:
Link analysis.
85
In interviews, ______________ communication involves the use of volume, pitch, and voice quality to convey meaning.
Paralinguistic
86
The historical Web refers to archived pages that:
have since been updated or are no longer available online.
87
When preparing a room for an admission-seeking interview, the suspect's chair should be:
Within full view of the interviewer.
88
Blue, a nonunion suspect, arrived at an admission-seeking interview with his manager and insisted that the manager be allowed to sit in. Should this interview be allowed to continue?
No, because the presence of a third party could have liability consequences.
89
Using the correlation analysis function, investigators can determine the relationships between:
different variables in the raw data.
90
It is a process by which countries request and provide assistance in criminal law enforcement matters.
Mutual legal assistance (MLA)
91
These types of questions seek to establish the credibility of the respondent.
Assessment.
92
Suppose you need to prove a suspect's illicit income circumstantially. Which of the following methods of tracing assets would yield the best result when the suspect is using his illicit funds to accumulate wealth and acquire assets, thus causing his net worth to increase?
The asset method.
93
Which of the following is an example of a data analysis function that can be performed to detect fraud through examination of accounts payable?
Identify debits to expense accounts outside of set default accounts.
94
A data analysis function that determines whether company policies are met by employee transactions (EX: expenditure accounts)
Compliance verification.
95
It establishes a code of information practices that regulates the collection, maintenance, consumption, and distribution of personally identifiable information that is maintained by federal agencies
Privacy Act of 1974
96
In interview situations, ______________ is defined as a "relation marked by harmony, conformity, accord, or affinity."
Rapport
97
Suppose you suspect there is a ghost employee scheme taking place in your organization and you want to compare the payroll records to the employee master file. Which data analysis technique would you use to match these two data records
The join function.
98
Which of the following is a recommended tactic for interrupting an accused's denials during an admission-seeking interview?
Delays, interruptions, and reasoning.
99
The net-worth analysis method of tracing illicit funds is recommended as a primary method of proof when most of the subject's income is deposited in a financial institution and the subject's books and records are unavailable, withheld, incomplete, or maintained on a cash basis.
False, answered incorrectly on practice exam.
100
Which of the following is a good practice for taking notes during an interview?
Avoid making notes regarding opinions or impressions about a witness.
101
When determining a subject's net worth for asset-tracing purposes, all assets should be valued at current market value to eliminate any question about estimates.
False, answered incorrectly on practice exam.
102
In interview situations, it is usually advisable to err on the side of taking too many notes rather than too few.
False, answered incorrectly on practice exam.
103
Which of the following is a type of information that can be obtained from the deep Web?
Websites without any links pointing to them