ACFE CFE - Investigation Exam Practice Questions (P. 1)
- Full Access (168 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #1
Jackson, a Certified Fraud Examiner (CFE), is analyzing Elm Company’s accounts payable data to identify anomalies that might indicate fraud. Which of the following is the MOST EFFECTIVE data analysis function that Jackson could use to look for potential fraud in accounts payable?
- ACompare book and tax depreciation and indicate variances
- BIdentify paycheck amounts over a certain limit
- CSummarize large invoices by amount and vendor
- DAll of the above
send
light_mode
delete
Question #2
Which of the following BEST describes the data analytics approach known as predictive analytics?
- AThe configuration of a business program to emulate and integrate the actions of a human to execute certain business processes, thus increasing efficiency and automating repetitive manual tasks
- BThe use of historical data, along with analyses, statistics, and machine learning components, to build a mathematical model that captures important trends and creates a quantitative forecast
- CThe use of layered artificial neural networks to accommodate more data and more sophisticated algorithms to identify complex patterns.
- DThe employment of a learning algorithm that identifies similarities, patterns, or anomalies within a data set on its own without human involvement.
send
light_mode
delete
Question #3
Jade, a Certified Fraud Examiner (CFE), is conducting an internal investigation in which an employee is suspected of stealing inventory and selling it through a possible shell company called Hidden Finds, LLC. When Jade tries to check Hidden Finds’ website, a message appears that redirects customers to a web address that ends with .onion. To view the website’s consent, Jade will need to install a specialized web browser that enables her to access which of the following?
- AThe internet archives
- BThe dark web
- CThe free web
- DThe deep archives
send
light_mode
delete
Question #4
Which of the following is NOT a common use of public sources of information?
- ACorroborating or refuting witness statements
- BObtaining background information on individuals
- CLocating people and their assets
- DSearching an individual’s income tax fillings
send
light_mode
delete
Question #5
Anne used Will as a confidential informant in her investigation. Anne listed information provided by Will in her final report, referring to him using his initials. She paid Will in cash and obtained a receipt for the transaction. Which of Anne’s methods was NOT considered a best practice when using informants?
- AUsing information provided by Will in her report
- BUsing cash to pay Will
- CObtaining a receipt from Will
- DReferring to Will using his initials
send
light_mode
delete
All Pages