{"id":125802,"date":"2026-05-11T09:22:24","date_gmt":"2026-05-11T09:22:24","guid":{"rendered":"https:\/\/www.dumpsbase.com\/freedumps\/?p=125802"},"modified":"2026-05-11T09:22:27","modified_gmt":"2026-05-11T09:22:27","slug":"cfe-investigation-free-dumps-part-2-q41-q70-of-v11-03-are-available-today-find-good-materials-to-prepare-for-your-cfe-investigation-exam","status":"publish","type":"post","link":"https:\/\/www.dumpsbase.com\/freedumps\/cfe-investigation-free-dumps-part-2-q41-q70-of-v11-03-are-available-today-find-good-materials-to-prepare-for-your-cfe-investigation-exam.html","title":{"rendered":"CFE Investigation Free Dumps (Part 2, Q41-Q70) of V11.03 Are Available Today &#8211; Find Good Materials to Prepare for Your CFE Investigation Exam"},"content":{"rendered":"\n<p>Have you read our <strong><em><a href=\"https:\/\/www.dumpsbase.com\/freedumps\/updated-cfe-investigation-dumps-v11-03-for-preparation-check-cfe-investigation-free-dumps-part-1-q1-q40-today.html\">CFE Investigation free dumps (Part 1, Q1-Q40) of V11.03<\/a><\/em><\/strong>? It is one part of our free demos, helping you check the quality of the CFE Investigation dumps (V11.03). After testing the free questions online, you can find that DumpsBase offers structured and easy-to-follow CFE Investigation dump questions that help you study smarter. These exam questions are reviewed for accuracy and updated regularly to stay aligned with the latest exam content. By practicing with these CFE Investigation exam questions and answers in V11.03, you can strengthen your problem-solving skills, improve time management, and reduce exam stress. Today, we will continue to share more free demo questions, helping you verify the CFE Investigation dumps (V11.03) again.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">CFE Investigation free dumps (Part 2, Q41-Q70) of V11.03 are below for reading:<\/h2>\n\n\n<script>\n\t  window.fbAsyncInit = function() {\n\t    FB.init({\n\t      appId            : '622169541470367',\n\t      autoLogAppEvents : true,\n\t      xfbml            : true,\n\t      version          : 'v3.1'\n\t    });\n\t  };\n\t\n\t  (function(d, s, id){\n\t     var js, fjs = d.getElementsByTagName(s)[0];\n\t     if (d.getElementById(id)) {return;}\n\t     js = d.createElement(s); js.id = id;\n\t     js.src = \"https:\/\/connect.facebook.net\/en_US\/sdk.js\";\n\t     fjs.parentNode.insertBefore(js, fjs);\n\t   }(document, 'script', 'facebook-jssdk'));\n\t<\/script><script type=\"text\/javascript\" >\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \nif(!window.jQuery) alert(\"The important jQuery library is not properly loaded in your site. Your WordPress theme is probably missing the essential wp_head() call. You can switch to another theme and you will see that the plugin works fine and this notice disappears. If you are still not sure what to do you can contact us for help.\");\n});\n<\/script>  \n  \n<div  id=\"watupro_quiz\" class=\"quiz-area single-page-quiz\">\n<p id=\"submittingExam11875\" style=\"display:none;text-align:center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\"><\/p>\n\n<div class=\"watupro-exam-description\" id=\"description-quiz-11875\"><\/div>\n\n<form action=\"\" method=\"post\" class=\"quiz-form\" id=\"quiz-11875\"  enctype=\"multipart\/form-data\" >\n<div class='watu-question ' id='question-1' style=';'><div id='questionWrap-1'  class='   watupro-question-id-465261'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>1. <\/span>Which of the following BEST describes the data analytics approach known as predictive analytics?<\/div><input type='hidden' name='question_id[]' id='qID_1' value='465261' \/><input type='hidden' id='answerType465261' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465261[]' id='answer-id-1798349' class='answer   answerof-465261 ' value='1798349'   \/><label for='answer-id-1798349' id='answer-label-1798349' class=' answer'><span>The employment of a learning algorithm that identifies similarities, patterns, or anomalies within a data set on its own, without human involvement<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465261[]' id='answer-id-1798350' class='answer   answerof-465261 ' value='1798350'   \/><label for='answer-id-1798350' id='answer-label-1798350' class=' answer'><span>The configuration of a business program to emulate and integrate the actions of a human to execute certain business processes thus increasing efficiency and automating repetitive manual tasks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465261[]' id='answer-id-1798351' class='answer   answerof-465261 ' value='1798351'   \/><label for='answer-id-1798351' id='answer-label-1798351' class=' answer'><span>The use of historical data, along with analyses, statistics, and machine learning components, to build a mathematical model that captures important trends and creates a quantitative forecast<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465261[]' id='answer-id-1798352' class='answer   answerof-465261 ' value='1798352'   \/><label for='answer-id-1798352' id='answer-label-1798352' class=' answer'><span>The use of layered artificial neural networks to accommodate more data and more sophisticated algorithms to identify complex patterns<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-2' style=';'><div id='questionWrap-2'  class='   watupro-question-id-465262'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>2. <\/span>Which of the following situations would MOST LIKELY require access to nonpublic records to develop evidence?<\/div><input type='hidden' name='question_id[]' id='qID_2' value='465262' \/><input type='hidden' id='answerType465262' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465262[]' id='answer-id-1798353' class='answer   answerof-465262 ' value='1798353'   \/><label for='answer-id-1798353' id='answer-label-1798353' class=' answer'><span>Finding out where a person lives<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465262[]' id='answer-id-1798354' class='answer   answerof-465262 ' value='1798354'   \/><label for='answer-id-1798354' id='answer-label-1798354' class=' answer'><span>Reviewing an individual's personal mobile phone records<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465262[]' id='answer-id-1798355' class='answer   answerof-465262 ' value='1798355'   \/><label for='answer-id-1798355' id='answer-label-1798355' class=' answer'><span>Obtaining a company's business filings<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465262[]' id='answer-id-1798356' class='answer   answerof-465262 ' value='1798356'   \/><label for='answer-id-1798356' id='answer-label-1798356' class=' answer'><span>Determining who owns a piece of real estate<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-3' style=';'><div id='questionWrap-3'  class='   watupro-question-id-465263'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>3. <\/span>Which of the following is NOT one of the main limitations of conducting a search for public records using online databases?<\/div><input type='hidden' name='question_id[]' id='qID_3' value='465263' \/><input type='hidden' id='answerType465263' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465263[]' id='answer-id-1798357' class='answer   answerof-465263 ' value='1798357'   \/><label for='answer-id-1798357' id='answer-label-1798357' class=' answer'><span>Online public records searches are limited in the jurisdictions they cover.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465263[]' id='answer-id-1798358' class='answer   answerof-465263 ' value='1798358'   \/><label for='answer-id-1798358' id='answer-label-1798358' class=' answer'><span>Public records database companies are difficult to find.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465263[]' id='answer-id-1798359' class='answer   answerof-465263 ' value='1798359'   \/><label for='answer-id-1798359' id='answer-label-1798359' class=' answer'><span>Online coverage of public records varies widely from jurisdiction to jurisdiction<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465263[]' id='answer-id-1798360' class='answer   answerof-465263 ' value='1798360'   \/><label for='answer-id-1798360' id='answer-label-1798360' class=' answer'><span>The timeliness and accuracy of information in online databases must be validated<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-4' style=';'><div id='questionWrap-4'  class='   watupro-question-id-465264'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>4. <\/span>Which of the following is the MOST ACCURATE statement about the privacy of information shared through social media?<\/div><input type='hidden' name='question_id[]' id='qID_4' value='465264' \/><input type='hidden' id='answerType465264' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465264[]' id='answer-id-1798361' class='answer   answerof-465264 ' value='1798361'   \/><label for='answer-id-1798361' id='answer-label-1798361' class=' answer'><span>To access any user-posted information on social media sites, fraud examiners must obtain some type of legal order from the jurisdiction in which the user resides.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465264[]' id='answer-id-1798362' class='answer   answerof-465264 ' value='1798362'   \/><label for='answer-id-1798362' id='answer-label-1798362' class=' answer'><span>A fraud examiner cannot be held liable for violating a user's privacy rights if they hack or break into areas of a social networking site designated as private because all social media information is public.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465264[]' id='answer-id-1798363' class='answer   answerof-465264 ' value='1798363'   \/><label for='answer-id-1798363' id='answer-label-1798363' class=' answer'><span>The Privacy of Social Networks Treaty is a binding international treaty that makes it illegal for law enforcement to seek social media log-in credentials from users.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465264[]' id='answer-id-1798364' class='answer   answerof-465264 ' value='1798364'   \/><label for='answer-id-1798364' id='answer-label-1798364' class=' answer'><span>Hacking or breaking into information on social media sites that is restricted as private could result in liability for fraud examiners due to violation of users' privacy rights.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-5' style=';'><div id='questionWrap-5'  class='   watupro-question-id-465265'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>5. <\/span>Which of the following statements is MOST ACCURATE regarding how a fraud examiner should prepare for an interview with a subject from a different jurisdiction?<\/div><input type='hidden' name='question_id[]' id='qID_5' value='465265' \/><input type='hidden' id='answerType465265' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465265[]' id='answer-id-1798365' class='answer   answerof-465265 ' value='1798365'   \/><label for='answer-id-1798365' id='answer-label-1798365' class=' answer'><span>A fraud examiner does not need to research cultural considerations such as personal space and eye contact.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465265[]' id='answer-id-1798366' class='answer   answerof-465265 ' value='1798366'   \/><label for='answer-id-1798366' id='answer-label-1798366' class=' answer'><span>A fraud examiner should find out whether there are limitations on the use of information obtained during an interview<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465265[]' id='answer-id-1798367' class='answer   answerof-465265 ' value='1798367'   \/><label for='answer-id-1798367' id='answer-label-1798367' class=' answer'><span>Failing to observe cultural norms is not a concern if the interviewer is from a different country than the interviewee<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465265[]' id='answer-id-1798368' class='answer   answerof-465265 ' value='1798368'   \/><label for='answer-id-1798368' id='answer-label-1798368' class=' answer'><span>Consulting with legal counsel is only necessary when an investigation spans multiple junsdictions<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-6' style=';'><div id='questionWrap-6'  class='   watupro-question-id-465266'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>6. <\/span>Which of the following statements concerning a well-written fraud examination report is MOST ACCURATE?<\/div><input type='hidden' name='question_id[]' id='qID_6' value='465266' \/><input type='hidden' id='answerType465266' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465266[]' id='answer-id-1798369' class='answer   answerof-465266 ' value='1798369'   \/><label for='answer-id-1798369' id='answer-label-1798369' class=' answer'><span>The report should convey all Information provided by witnesses<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465266[]' id='answer-id-1798370' class='answer   answerof-465266 ' value='1798370'   \/><label for='answer-id-1798370' id='answer-label-1798370' class=' answer'><span>Only relevant facts that support the fraud allegation should be included in the report<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465266[]' id='answer-id-1798371' class='answer   answerof-465266 ' value='1798371'   \/><label for='answer-id-1798371' id='answer-label-1798371' class=' answer'><span>The report writer should avoid technical jargon where possible<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465266[]' id='answer-id-1798372' class='answer   answerof-465266 ' value='1798372'   \/><label for='answer-id-1798372' id='answer-label-1798372' class=' answer'><span>Signed copies of the fraud examiner's interview notes should be used to report interview details<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-7' style=';'><div id='questionWrap-7'  class='   watupro-question-id-465267'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>7. <\/span>Caroline, a fraud examiner, is conducting an admission-seeking interview with John, an employee suspected of stealing cash. <br \/>\r<br>Which of the following is the MOST effective phrasing for Caroline to use when posing an admission-seeking question to John?<\/div><input type='hidden' name='question_id[]' id='qID_7' value='465267' \/><input type='hidden' id='answerType465267' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465267[]' id='answer-id-1798373' class='answer   answerof-465267 ' value='1798373'   \/><label for='answer-id-1798373' id='answer-label-1798373' class=' answer'><span>&quot;Why did you take the money?&quot;<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465267[]' id='answer-id-1798374' class='answer   answerof-465267 ' value='1798374'   \/><label for='answer-id-1798374' id='answer-label-1798374' class=' answer'><span>&quot;What do you know about the stolen money?&quot;<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465267[]' id='answer-id-1798375' class='answer   answerof-465267 ' value='1798375'   \/><label for='answer-id-1798375' id='answer-label-1798375' class=' answer'><span>&quot;Do you know who took the money''&quot;<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465267[]' id='answer-id-1798376' class='answer   answerof-465267 ' value='1798376'   \/><label for='answer-id-1798376' id='answer-label-1798376' class=' answer'><span>&quot;Did you steal the money?&quot;<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-8' style=';'><div id='questionWrap-8'  class='   watupro-question-id-465268'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>8. <\/span>Tara. a Certified Fraud Examiner (CFE). is searching social media sites for evidence in a fraud investigation. <br \/>\r<br>Which of the following is the MOST ACCURATE statement regarding what Tara should do when mining social media sites for evidence of fraud?<\/div><input type='hidden' name='question_id[]' id='qID_8' value='465268' \/><input type='hidden' id='answerType465268' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465268[]' id='answer-id-1798377' class='answer   answerof-465268 ' value='1798377'   \/><label for='answer-id-1798377' id='answer-label-1798377' class=' answer'><span>Tara should preserve the information by saving the links of the postings as bookmarks in her browser.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465268[]' id='answer-id-1798378' class='answer   answerof-465268 ' value='1798378'   \/><label for='answer-id-1798378' id='answer-label-1798378' class=' answer'><span>Tara should preserve the metadata by printing out the web pages of each of the postings.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465268[]' id='answer-id-1798379' class='answer   answerof-465268 ' value='1798379'   \/><label for='answer-id-1798379' id='answer-label-1798379' class=' answer'><span>Tara should conduct a forensic shutdown of the computer to preserve the metadata m the social networking sites.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465268[]' id='answer-id-1798380' class='answer   answerof-465268 ' value='1798380'   \/><label for='answer-id-1798380' id='answer-label-1798380' class=' answer'><span>Tara should preserve the information from the sites so that it can be established as authentic if used in court.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-9' style=';'><div id='questionWrap-9'  class='   watupro-question-id-465269'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>9. <\/span>Al needs to know the location of the principal office and the initial shareholders of a company he is investigating. <br \/>\r<br>Which of the following would be the BEST source of this reformation?<\/div><input type='hidden' name='question_id[]' id='qID_9' value='465269' \/><input type='hidden' id='answerType465269' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465269[]' id='answer-id-1798381' class='answer   answerof-465269 ' value='1798381'   \/><label for='answer-id-1798381' id='answer-label-1798381' class=' answer'><span>The organizational filings with the government of the jurisdiction in which the company is incorporated<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465269[]' id='answer-id-1798382' class='answer   answerof-465269 ' value='1798382'   \/><label for='answer-id-1798382' id='answer-label-1798382' class=' answer'><span>The contractual documents regarding real properly owned by the corporation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465269[]' id='answer-id-1798383' class='answer   answerof-465269 ' value='1798383'   \/><label for='answer-id-1798383' id='answer-label-1798383' class=' answer'><span>The utility records in the municipality where the corporation has its principal office<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465269[]' id='answer-id-1798384' class='answer   answerof-465269 ' value='1798384'   \/><label for='answer-id-1798384' id='answer-label-1798384' class=' answer'><span>The shareholder data form filed with the World Bank<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-10' style=';'><div id='questionWrap-10'  class='   watupro-question-id-465270'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>10. <\/span>Eugene is conducting an admission-seeking interview of a suspect. During the interview, the suspect frequently looks away from Eugene while responding to questions. Eugene can safely conclude that the suspect is dishonest due to his failure to maintain eye contact.<\/div><input type='hidden' name='question_id[]' id='qID_10' value='465270' \/><input type='hidden' id='answerType465270' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465270[]' id='answer-id-1798385' class='answer   answerof-465270 ' value='1798385'   \/><label for='answer-id-1798385' id='answer-label-1798385' class=' answer'><span>True<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465270[]' id='answer-id-1798386' class='answer   answerof-465270 ' value='1798386'   \/><label for='answer-id-1798386' id='answer-label-1798386' class=' answer'><span>False<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-11' style=';'><div id='questionWrap-11'  class='   watupro-question-id-465271'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>11. <\/span>Due to risks of illicit transactions, most jurisdictions require financial institutions to obtain information about which of the following from an institution with which they have a foreign correspondent relationship?<\/div><input type='hidden' name='question_id[]' id='qID_11' value='465271' \/><input type='hidden' id='answerType465271' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465271[]' id='answer-id-1798387' class='answer   answerof-465271 ' value='1798387'   \/><label for='answer-id-1798387' id='answer-label-1798387' class=' answer'><span>The institution's branch addresses<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465271[]' id='answer-id-1798388' class='answer   answerof-465271 ' value='1798388'   \/><label for='answer-id-1798388' id='answer-label-1798388' class=' answer'><span>The institution's licenses or certifications<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465271[]' id='answer-id-1798389' class='answer   answerof-465271 ' value='1798389'   \/><label for='answer-id-1798389' id='answer-label-1798389' class=' answer'><span>The institution's tax statements<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465271[]' id='answer-id-1798390' class='answer   answerof-465271 ' value='1798390'   \/><label for='answer-id-1798390' id='answer-label-1798390' class=' answer'><span>The institution's client loan profiles<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-12' style=';'><div id='questionWrap-12'  class='   watupro-question-id-465272'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>12. <\/span>When reporting the results of a fraud examination, it is BEST to include copies (not originals) of important documents in the formal report.<\/div><input type='hidden' name='question_id[]' id='qID_12' value='465272' \/><input type='hidden' id='answerType465272' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465272[]' id='answer-id-1798391' class='answer   answerof-465272 ' value='1798391'   \/><label for='answer-id-1798391' id='answer-label-1798391' class=' answer'><span>True<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465272[]' id='answer-id-1798392' class='answer   answerof-465272 ' value='1798392'   \/><label for='answer-id-1798392' id='answer-label-1798392' class=' answer'><span>False<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-13' style=';'><div id='questionWrap-13'  class='   watupro-question-id-465273'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>13. <\/span>Butler, a Certified Fraud Examiner (CFE), needs to obtain a copy of a statement that the chief executive officer (CEO) of Accord Investments, a venture capital firm, posted on the firm's website sometime last year. Unfortunately, the quote has been removed from the website. <br \/>\r<br>Which of the following resources would be the BEST choice for Butler to consult to find an earlier version of the web page that he needs?<\/div><input type='hidden' name='question_id[]' id='qID_13' value='465273' \/><input type='hidden' id='answerType465273' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465273[]' id='answer-id-1798393' class='answer   answerof-465273 ' value='1798393'   \/><label for='answer-id-1798393' id='answer-label-1798393' class=' answer'><span>The invisible archives<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465273[]' id='answer-id-1798394' class='answer   answerof-465273 ' value='1798394'   \/><label for='answer-id-1798394' id='answer-label-1798394' class=' answer'><span>The free web<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465273[]' id='answer-id-1798395' class='answer   answerof-465273 ' value='1798395'   \/><label for='answer-id-1798395' id='answer-label-1798395' class=' answer'><span>The internet archives<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465273[]' id='answer-id-1798396' class='answer   answerof-465273 ' value='1798396'   \/><label for='answer-id-1798396' id='answer-label-1798396' class=' answer'><span>The deep web<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-14' style=';'><div id='questionWrap-14'  class='   watupro-question-id-465274'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>14. <\/span>The term_____________refers to a process of resolving allegations of fraud from inception to disposition.<\/div><input type='hidden' name='question_id[]' id='qID_14' value='465274' \/><input type='hidden' id='answerType465274' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465274[]' id='answer-id-1798397' class='answer   answerof-465274 ' value='1798397'   \/><label for='answer-id-1798397' id='answer-label-1798397' class=' answer'><span>Fraud theory<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465274[]' id='answer-id-1798398' class='answer   answerof-465274 ' value='1798398'   \/><label for='answer-id-1798398' id='answer-label-1798398' class=' answer'><span>Forensic investigation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465274[]' id='answer-id-1798399' class='answer   answerof-465274 ' value='1798399'   \/><label for='answer-id-1798399' id='answer-label-1798399' class=' answer'><span>Fraud management<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465274[]' id='answer-id-1798400' class='answer   answerof-465274 ' value='1798400'   \/><label for='answer-id-1798400' id='answer-label-1798400' class=' answer'><span>Fraud examination<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-15' style=';'><div id='questionWrap-15'  class='   watupro-question-id-465275'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>15. <\/span>Shane, a Certified Fraud Examiner (CFE). is investigating Larsen. who is active on various social networking sites. Shane wants to search and extract information from Larson's social media postings so that it can be used in court as evidence. <br \/>\r<br>Which of the following is the MOST ACCURATE statement regarding what Shane should do when conducting a social media investigation of Larsen?<\/div><input type='hidden' name='question_id[]' id='qID_15' value='465275' \/><input type='hidden' id='answerType465275' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465275[]' id='answer-id-1798401' class='answer   answerof-465275 ' value='1798401'   \/><label for='answer-id-1798401' id='answer-label-1798401' class=' answer'><span>Shane should conduct a forensic shutdown of his computer to preserve the metadata in the social networking sites.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465275[]' id='answer-id-1798402' class='answer   answerof-465275 ' value='1798402'   \/><label for='answer-id-1798402' id='answer-label-1798402' class=' answer'><span>Shane should preserve the information from the social networking sites so that it can be established as authentic if used in court.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465275[]' id='answer-id-1798403' class='answer   answerof-465275 ' value='1798403'   \/><label for='answer-id-1798403' id='answer-label-1798403' class=' answer'><span>Shane should email himself the links of the postings so that he can retrieve them later.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465275[]' id='answer-id-1798404' class='answer   answerof-465275 ' value='1798404'   \/><label for='answer-id-1798404' id='answer-label-1798404' class=' answer'><span>Shane should preserve the information by saving the links of the postings in his 'bookmarks&quot;<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-16' style=';'><div id='questionWrap-16'  class='   watupro-question-id-465276'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>16. <\/span>Susan, a Certified Fraud Examiner (CFE). is conducting an ad mission-seeking interview of Beth, a fraud suspect. After Susan gave Beth a suitable rationalization for her conduct. Beth continued her denials, giving various alibis. <br \/>\r<br>Which of the following would be the LEAST EFFECTIVE technique for Susan to use in this situation?<\/div><input type='hidden' name='question_id[]' id='qID_16' value='465276' \/><input type='hidden' id='answerType465276' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465276[]' id='answer-id-1798405' class='answer   answerof-465276 ' value='1798405'   \/><label for='answer-id-1798405' id='answer-label-1798405' class=' answer'><span>Displaying evidence that specifically contradicts Beth's alibis<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465276[]' id='answer-id-1798406' class='answer   answerof-465276 ' value='1798406'   \/><label for='answer-id-1798406' id='answer-label-1798406' class=' answer'><span>Discussing some of Beth's prior deceptions<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465276[]' id='answer-id-1798407' class='answer   answerof-465276 ' value='1798407'   \/><label for='answer-id-1798407' id='answer-label-1798407' class=' answer'><span>Discussing the testimony of other witnesses<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465276[]' id='answer-id-1798408' class='answer   answerof-465276 ' value='1798408'   \/><label for='answer-id-1798408' id='answer-label-1798408' class=' answer'><span>Displaying all the evidence she has against Beth at once<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-17' style=';'><div id='questionWrap-17'  class='   watupro-question-id-465277'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>17. <\/span>Which of the following data analysis functions is used to determine whether company policies are met by employee transactions, such as verifying that traveling employees book their accommodations at approved hotels?<\/div><input type='hidden' name='question_id[]' id='qID_17' value='465277' \/><input type='hidden' id='answerType465277' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465277[]' id='answer-id-1798409' class='answer   answerof-465277 ' value='1798409'   \/><label for='answer-id-1798409' id='answer-label-1798409' class=' answer'><span>The correlation analysis function<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465277[]' id='answer-id-1798410' class='answer   answerof-465277 ' value='1798410'   \/><label for='answer-id-1798410' id='answer-label-1798410' class=' answer'><span>The Join function<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465277[]' id='answer-id-1798411' class='answer   answerof-465277 ' value='1798411'   \/><label for='answer-id-1798411' id='answer-label-1798411' class=' answer'><span>The gap testing function<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465277[]' id='answer-id-1798412' class='answer   answerof-465277 ' value='1798412'   \/><label for='answer-id-1798412' id='answer-label-1798412' class=' answer'><span>The compliance verification function<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-18' style=';'><div id='questionWrap-18'  class='   watupro-question-id-465278'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>18. <\/span>Which of the following is NOT a step a fraud examiner must take before seizing evidence in a digital forensic investigation?<\/div><input type='hidden' name='question_id[]' id='qID_18' value='465278' \/><input type='hidden' id='answerType465278' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465278[]' id='answer-id-1798413' class='answer   answerof-465278 ' value='1798413'   \/><label for='answer-id-1798413' id='answer-label-1798413' class=' answer'><span>Obtain and become familiar with any legal orders that apply to the investigation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465278[]' id='answer-id-1798414' class='answer   answerof-465278 ' value='1798414'   \/><label for='answer-id-1798414' id='answer-label-1798414' class=' answer'><span>Assemble an investigation team comprised only of outside digital forensic experts<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465278[]' id='answer-id-1798415' class='answer   answerof-465278 ' value='1798415'   \/><label for='answer-id-1798415' id='answer-label-1798415' class=' answer'><span>Ensure that only trained professionals employ any software used in a forensic capacity<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465278[]' id='answer-id-1798416' class='answer   answerof-465278 ' value='1798416'   \/><label for='answer-id-1798416' id='answer-label-1798416' class=' answer'><span>Determine whether there are privacy issues related to the item(s) to be searched.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-19' style=';'><div id='questionWrap-19'  class='   watupro-question-id-465279'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>19. <\/span>When planning for the interview phase of an investigation, which of the following steps should NOT be taken by the fraud examiner?<\/div><input type='hidden' name='question_id[]' id='qID_19' value='465279' \/><input type='hidden' id='answerType465279' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465279[]' id='answer-id-1798417' class='answer   answerof-465279 ' value='1798417'   \/><label for='answer-id-1798417' id='answer-label-1798417' class=' answer'><span>Consider what the interview is intended to accomplish and state an objective.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465279[]' id='answer-id-1798418' class='answer   answerof-465279 ' value='1798418'   \/><label for='answer-id-1798418' id='answer-label-1798418' class=' answer'><span>Review the case file to ensure that important information has not been overlooked<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465279[]' id='answer-id-1798419' class='answer   answerof-465279 ' value='1798419'   \/><label for='answer-id-1798419' id='answer-label-1798419' class=' answer'><span>Prepare a detailed list of questions to ask the subject during the interview.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465279[]' id='answer-id-1798420' class='answer   answerof-465279 ' value='1798420'   \/><label for='answer-id-1798420' id='answer-label-1798420' class=' answer'><span>Ensure that the interview is held in a venue where the subject will feel Uncomfortable<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-20' style=';'><div id='questionWrap-20'  class='   watupro-question-id-465280'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>20. <\/span>Which of the following statements is MOST ACCURATE regarding covert operations?<\/div><input type='hidden' name='question_id[]' id='qID_20' value='465280' \/><input type='hidden' id='answerType465280' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465280[]' id='answer-id-1798421' class='answer   answerof-465280 ' value='1798421'   \/><label for='answer-id-1798421' id='answer-label-1798421' class=' answer'><span>Fraud examiners should conduct coven operations only after attempting conventional methods of evidence-gathering<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465280[]' id='answer-id-1798422' class='answer   answerof-465280 ' value='1798422'   \/><label for='answer-id-1798422' id='answer-label-1798422' class=' answer'><span>Mistakes in covert operations generally do not cause damage to their associated investigations<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465280[]' id='answer-id-1798423' class='answer   answerof-465280 ' value='1798423'   \/><label for='answer-id-1798423' id='answer-label-1798423' class=' answer'><span>Covert operations rarely prove beneficial to investigations even when planned properly.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465280[]' id='answer-id-1798424' class='answer   answerof-465280 ' value='1798424'   \/><label for='answer-id-1798424' id='answer-label-1798424' class=' answer'><span>Most jurisdictions provide protections for investigators conducting covert operations that shield them from reputational, financial, and legal consequences.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-21' style=';'><div id='questionWrap-21'  class='   watupro-question-id-465281'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>21. <\/span>Elizabeth, a Certified Fraud Examiner (CFE), is conducting an admission-seeking interview with Shannon, a fraud suspect. Shannon is seated approximately five feet away from Elizabeth in an empty room. The room has several pictures and posters on the wall, and the door is closed. <br \/>\r<br>According to admission-seeking interview best practices, what change should Elizabeth make to the interview environment to increase the chances of the interview's success?<\/div><input type='hidden' name='question_id[]' id='qID_21' value='465281' \/><input type='hidden' id='answerType465281' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465281[]' id='answer-id-1798425' class='answer   answerof-465281 ' value='1798425'   \/><label for='answer-id-1798425' id='answer-label-1798425' class=' answer'><span>Move the interview to a room without pictures or wall hangings to prevent distractions<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465281[]' id='answer-id-1798426' class='answer   answerof-465281 ' value='1798426'   \/><label for='answer-id-1798426' id='answer-label-1798426' class=' answer'><span>Open the door so that Shannon feels free to leave at any time<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465281[]' id='answer-id-1798427' class='answer   answerof-465281 ' value='1798427'   \/><label for='answer-id-1798427' id='answer-label-1798427' class=' answer'><span>Place a table between her and Shannon to create a psychological barrier<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465281[]' id='answer-id-1798428' class='answer   answerof-465281 ' value='1798428'   \/><label for='answer-id-1798428' id='answer-label-1798428' class=' answer'><span>All of the above<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-22' style=';'><div id='questionWrap-22'  class='   watupro-question-id-465282'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>22. <\/span>Jackson, a digital forensic examiner for a government agency, is conducting a criminal investigation into the alleged embezzlement of funds from the government's Welfare Department (WD). Ginny. a WD employee, is the prime suspect. Jackson obtains a court order authorizing him to seize Ginny's personal computer for forensic examination. <br \/>\r<br>Which of the following is the MOST ACCURATE statement?<\/div><input type='hidden' name='question_id[]' id='qID_22' value='465282' \/><input type='hidden' id='answerType465282' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465282[]' id='answer-id-1798429' class='answer   answerof-465282 ' value='1798429'   \/><label for='answer-id-1798429' id='answer-label-1798429' class=' answer'><span>If Ginny's computer is running. Jackson should perform a graceful shutdown by turning it off using the normal shutdown process<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465282[]' id='answer-id-1798430' class='answer   answerof-465282 ' value='1798430'   \/><label for='answer-id-1798430' id='answer-label-1798430' class=' answer'><span>If Ginny\u2019s computer is off and Jackson needs evidence that exists only in the form of volatile data, he should turn the computer on and retrieve data directly via the computer's normal interface.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465282[]' id='answer-id-1798431' class='answer   answerof-465282 ' value='1798431'   \/><label for='answer-id-1798431' id='answer-label-1798431' class=' answer'><span>If Ginny's computer is off. Jackson should not turn it on unless he plans to use an encryption device that can guarantee that the system's hard drive will not be accessed during startup.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465282[]' id='answer-id-1798432' class='answer   answerof-465282 ' value='1798432'   \/><label for='answer-id-1798432' id='answer-label-1798432' class=' answer'><span>If Ginny's computer is running. Jackson may retrieve data from the computer directly via its normal interface if the evidence that he needs exists only in the form of volatile data<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-23' style=';'><div id='questionWrap-23'  class='   watupro-question-id-465283'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>23. <\/span>Charles, a fraud examiner, accuses George of fraud during an admission-seeking <br \/>\r<br>interview. George immediately denies the charge How should Charles respond to George's denial?<\/div><input type='hidden' name='question_id[]' id='qID_23' value='465283' \/><input type='hidden' id='answerType465283' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465283[]' id='answer-id-1798433' class='answer   answerof-465283 ' value='1798433'   \/><label for='answer-id-1798433' id='answer-label-1798433' class=' answer'><span>Counter the denial by arguing with George until further denials are futile<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465283[]' id='answer-id-1798434' class='answer   answerof-465283 ' value='1798434'   \/><label for='answer-id-1798434' id='answer-label-1798434' class=' answer'><span>Use a delaying tactic to interrupt the denial<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465283[]' id='answer-id-1798435' class='answer   answerof-465283 ' value='1798435'   \/><label for='answer-id-1798435' id='answer-label-1798435' class=' answer'><span>Remind George he has to tell the truth or face perjury.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465283[]' id='answer-id-1798436' class='answer   answerof-465283 ' value='1798436'   \/><label for='answer-id-1798436' id='answer-label-1798436' class=' answer'><span>Allow George to continue denying the charge.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-24' style=';'><div id='questionWrap-24'  class='   watupro-question-id-465284'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>24. <\/span>Vishal, a Certified Fraud Examiner (CFE). has just initiated an interview with Steve, a fraud suspect. After a short introduction. Vishal jokes about the fact that he and Steve are wearing the same tie and then proceeds to ask Steve about the previous night's major sporting event Vishal is attempting to<\/div><input type='hidden' name='question_id[]' id='qID_24' value='465284' \/><input type='hidden' id='answerType465284' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465284[]' id='answer-id-1798437' class='answer   answerof-465284 ' value='1798437'   \/><label for='answer-id-1798437' id='answer-label-1798437' class=' answer'><span>Establish the interview theme<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465284[]' id='answer-id-1798438' class='answer   answerof-465284 ' value='1798438'   \/><label for='answer-id-1798438' id='answer-label-1798438' class=' answer'><span>Condition the witness.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465284[]' id='answer-id-1798439' class='answer   answerof-465284 ' value='1798439'   \/><label for='answer-id-1798439' id='answer-label-1798439' class=' answer'><span>Establish rapport<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465284[]' id='answer-id-1798440' class='answer   answerof-465284 ' value='1798440'   \/><label for='answer-id-1798440' id='answer-label-1798440' class=' answer'><span>Exhibit passive listening.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-25' style=';'><div id='questionWrap-25'  class='   watupro-question-id-465285'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>25. <\/span>Scarlett, a Certified Fraud Examiner (CFE), is conducting an admission-seeking interview of Plum, a fraud suspect. After Scarlett defused Plum's alibis. Plum became withdrawn and slowly began to slouch in her chair, bowing her head. <br \/>\r<br>What should Scarlett do now?<\/div><input type='hidden' name='question_id[]' id='qID_25' value='465285' \/><input type='hidden' id='answerType465285' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465285[]' id='answer-id-1798441' class='answer   answerof-465285 ' value='1798441'   \/><label for='answer-id-1798441' id='answer-label-1798441' class=' answer'><span>Discourage Plum from showing any emotion.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465285[]' id='answer-id-1798442' class='answer   answerof-465285 ' value='1798442'   \/><label for='answer-id-1798442' id='answer-label-1798442' class=' answer'><span>Remain silent until Plum makes a confession.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465285[]' id='answer-id-1798443' class='answer   answerof-465285 ' value='1798443'   \/><label for='answer-id-1798443' id='answer-label-1798443' class=' answer'><span>Insist that Plum sit up straight in her chair<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465285[]' id='answer-id-1798444' class='answer   answerof-465285 ' value='1798444'   \/><label for='answer-id-1798444' id='answer-label-1798444' class=' answer'><span>Continue to display evidence that implicates Plum<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-26' style=';'><div id='questionWrap-26'  class='   watupro-question-id-465286'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>26. <\/span>Which of the following is the MOST ACCURATE statement about trying to locate a subject using online records?<\/div><input type='hidden' name='question_id[]' id='qID_26' value='465286' \/><input type='hidden' id='answerType465286' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465286[]' id='answer-id-1798445' class='answer   answerof-465286 ' value='1798445'   \/><label for='answer-id-1798445' id='answer-label-1798445' class=' answer'><span>Most public records services do not maintain a list of past addresses<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465286[]' id='answer-id-1798446' class='answer   answerof-465286 ' value='1798446'   \/><label for='answer-id-1798446' id='answer-label-1798446' class=' answer'><span>Obtaining a past address of the subject should be the first step in trying to locate a subject using online records<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465286[]' id='answer-id-1798447' class='answer   answerof-465286 ' value='1798447'   \/><label for='answer-id-1798447' id='answer-label-1798447' class=' answer'><span>The first step in locating someone using online records is to obtain a list of past employers<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465286[]' id='answer-id-1798448' class='answer   answerof-465286 ' value='1798448'   \/><label for='answer-id-1798448' id='answer-label-1798448' class=' answer'><span>Online records are generally not useful in locating subjects whose address is unknown<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-27' style=';'><div id='questionWrap-27'  class='   watupro-question-id-465287'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>27. <\/span>Gunn, a Certified Fraud Examiner (CFE). was hired to trace Kelly's financial transactions. During his investigation. Gunn obtains records of electronic payments that Kelly made during the past three years. <br \/>\r<br>Which of the following are these records MOST LIKELY to reveal?<\/div><input type='hidden' name='question_id[]' id='qID_27' value='465287' \/><input type='hidden' id='answerType465287' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465287[]' id='answer-id-1798449' class='answer   answerof-465287 ' value='1798449'   \/><label for='answer-id-1798449' id='answer-label-1798449' class=' answer'><span>If Kelly has been skimming funds<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465287[]' id='answer-id-1798450' class='answer   answerof-465287 ' value='1798450'   \/><label for='answer-id-1798450' id='answer-label-1798450' class=' answer'><span>The cities and countries in which Kelly conducts business<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465287[]' id='answer-id-1798451' class='answer   answerof-465287 ' value='1798451'   \/><label for='answer-id-1798451' id='answer-label-1798451' class=' answer'><span>The division and distribution of Kelly's assets<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465287[]' id='answer-id-1798452' class='answer   answerof-465287 ' value='1798452'   \/><label for='answer-id-1798452' id='answer-label-1798452' class=' answer'><span>The market value of any real property Kelly owns<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-28' style=';'><div id='questionWrap-28'  class='   watupro-question-id-465288'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>28. <\/span>Cynthia is preparing to conduct a covert investigation. Prior to conducting surveillance of her subject, she creates a memorandum outlining the basis for her operation. <br \/>\r<br>Which of the following pieces of information should she include in her memorandum?<\/div><input type='hidden' name='question_id[]' id='qID_28' value='465288' \/><input type='hidden' id='answerType465288' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465288[]' id='answer-id-1798453' class='answer   answerof-465288 ' value='1798453'   \/><label for='answer-id-1798453' id='answer-label-1798453' class=' answer'><span>The name of the subject she will be observing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465288[]' id='answer-id-1798454' class='answer   answerof-465288 ' value='1798454'   \/><label for='answer-id-1798454' id='answer-label-1798454' class=' answer'><span>Her first impression regarding the subject's culpability<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465288[]' id='answer-id-1798455' class='answer   answerof-465288 ' value='1798455'   \/><label for='answer-id-1798455' id='answer-label-1798455' class=' answer'><span>The identities of any confidential sources to be used in the operation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465288[]' id='answer-id-1798456' class='answer   answerof-465288 ' value='1798456'   \/><label for='answer-id-1798456' id='answer-label-1798456' class=' answer'><span>All of the above<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-29' style=';'><div id='questionWrap-29'  class='   watupro-question-id-465289'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>29. <\/span>Assuming that a jurisdiction has prohibited pretexting against financial institutions, which of the following actions would constitute illegal pretexting?<\/div><input type='hidden' name='question_id[]' id='qID_29' value='465289' \/><input type='hidden' id='answerType465289' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465289[]' id='answer-id-1798457' class='answer   answerof-465289 ' value='1798457'   \/><label for='answer-id-1798457' id='answer-label-1798457' class=' answer'><span>Intentionally making false statements on loan applications<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465289[]' id='answer-id-1798458' class='answer   answerof-465289 ' value='1798458'   \/><label for='answer-id-1798458' id='answer-label-1798458' class=' answer'><span>Stealing a person's mail lo obtain the person's bank account number<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465289[]' id='answer-id-1798459' class='answer   answerof-465289 ' value='1798459'   \/><label for='answer-id-1798459' id='answer-label-1798459' class=' answer'><span>Impersonating an account holder to access their bank records<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465289[]' id='answer-id-1798460' class='answer   answerof-465289 ' value='1798460'   \/><label for='answer-id-1798460' id='answer-label-1798460' class=' answer'><span>Setting up a bank account in an assumed name<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-30' style=';'><div id='questionWrap-30'  class='   watupro-question-id-465290'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>30. <\/span>Assuming that a jurisdiction has prohibited pretexting with financial institutes, which of the following actions would constitute illegal pretexting?<\/div><input type='hidden' name='question_id[]' id='qID_30' value='465290' \/><input type='hidden' id='answerType465290' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465290[]' id='answer-id-1798461' class='answer   answerof-465290 ' value='1798461'   \/><label for='answer-id-1798461' id='answer-label-1798461' class=' answer'><span>Withdrawing another person's funds using a stolen bank account number and PIN<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465290[]' id='answer-id-1798462' class='answer   answerof-465290 ' value='1798462'   \/><label for='answer-id-1798462' id='answer-label-1798462' class=' answer'><span>Digging through a person's trash to obtain their bank account information<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465290[]' id='answer-id-1798463' class='answer   answerof-465290 ' value='1798463'   \/><label for='answer-id-1798463' id='answer-label-1798463' class=' answer'><span>Making purchases with a credit card account under a fictitious identity<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-465290[]' id='answer-id-1798464' class='answer   answerof-465290 ' value='1798464'   \/><label for='answer-id-1798464' id='answer-label-1798464' class=' answer'><span>Falsely claiming to be the spouse of an account holder to access bank records<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div style='display:none' id='question-31'>\n\t<div class='question-content'>\n\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\" alt=\"Loading...\" title=\"Loading...\" \/>&nbsp;Loading...\t<\/div>\n<\/div>\n\n<br \/>\n\t\n\t\t\t<div class=\"watupro_buttons flex \" id=\"watuPROButtons11875\" >\n\t\t  <div id=\"prev-question\" style=\"display:none;\"><input type=\"button\" value=\"&lt; Previous\" onclick=\"WatuPRO.nextQuestion(event, 'previous');\"\/><\/div>\t\t  \t\t  \t\t   \n\t\t   \t  \t\t<div><input type=\"button\" name=\"action\" class=\"watupro-submit-button\" onclick=\"WatuPRO.submitResult(event)\" id=\"action-button\" value=\"View Results\"  \/>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\n\t<input type=\"hidden\" name=\"quiz_id\" value=\"11875\" id=\"watuPROExamID\"\/>\n\t<input type=\"hidden\" name=\"start_time\" id=\"startTime\" value=\"2026-05-11 11:21:44\" \/>\n\t<input type=\"hidden\" name=\"start_timestamp\" id=\"startTimeStamp\" value=\"1778498504\" \/>\n\t<input type=\"hidden\" name=\"question_ids\" value=\"\" \/>\n\t<input type=\"hidden\" name=\"watupro_questions\" value=\"465261:1798349,1798350,1798351,1798352 | 465262:1798353,1798354,1798355,1798356 | 465263:1798357,1798358,1798359,1798360 | 465264:1798361,1798362,1798363,1798364 | 465265:1798365,1798366,1798367,1798368 | 465266:1798369,1798370,1798371,1798372 | 465267:1798373,1798374,1798375,1798376 | 465268:1798377,1798378,1798379,1798380 | 465269:1798381,1798382,1798383,1798384 | 465270:1798385,1798386 | 465271:1798387,1798388,1798389,1798390 | 465272:1798391,1798392 | 465273:1798393,1798394,1798395,1798396 | 465274:1798397,1798398,1798399,1798400 | 465275:1798401,1798402,1798403,1798404 | 465276:1798405,1798406,1798407,1798408 | 465277:1798409,1798410,1798411,1798412 | 465278:1798413,1798414,1798415,1798416 | 465279:1798417,1798418,1798419,1798420 | 465280:1798421,1798422,1798423,1798424 | 465281:1798425,1798426,1798427,1798428 | 465282:1798429,1798430,1798431,1798432 | 465283:1798433,1798434,1798435,1798436 | 465284:1798437,1798438,1798439,1798440 | 465285:1798441,1798442,1798443,1798444 | 465286:1798445,1798446,1798447,1798448 | 465287:1798449,1798450,1798451,1798452 | 465288:1798453,1798454,1798455,1798456 | 465289:1798457,1798458,1798459,1798460 | 465290:1798461,1798462,1798463,1798464\" \/>\n\t<input type=\"hidden\" name=\"no_ajax\" value=\"0\">\t\t\t<\/form>\n\t<p>&nbsp;<\/p>\n<\/div>\n\n<script type=\"text\/javascript\">\n\/\/jQuery(document).ready(function(){\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \t\nvar question_ids = \"465261,465262,465263,465264,465265,465266,465267,465268,465269,465270,465271,465272,465273,465274,465275,465276,465277,465278,465279,465280,465281,465282,465283,465284,465285,465286,465287,465288,465289,465290\";\nWatuPROSettings[11875] = {};\nWatuPRO.qArr = question_ids.split(',');\nWatuPRO.exam_id = 11875;\t    \nWatuPRO.post_id = 125802;\nWatuPRO.store_progress = 0;\nWatuPRO.curCatPage = 1;\nWatuPRO.requiredIDs=\"0\".split(\",\");\nWatuPRO.hAppID = \"0.13529600 1778498504\";\nvar url = \"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/show_exam.php\";\nWatuPRO.examMode = 1;\nWatuPRO.siteURL=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-admin\/admin-ajax.php\";\nWatuPRO.emailIsNotRequired = 0;\nWatuPROIntel.init(11875);\nWatuPRO.inCategoryPages=1;});    \t \n<\/script>\n","protected":false},"excerpt":{"rendered":"<p>Have you read our CFE Investigation free dumps (Part 1, Q1-Q40) of V11.03? It is one part of our free demos, helping you check the quality of the CFE Investigation dumps (V11.03). After testing the free questions online, you can find that DumpsBase offers structured and easy-to-follow CFE Investigation dump questions that help you study [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11529,11530],"tags":[11531],"class_list":["post-125802","post","type-post","status-publish","format-standard","hentry","category-acfe","category-certified-fraud-examiner","tag-cfe-investigation"],"_links":{"self":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/125802","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/comments?post=125802"}],"version-history":[{"count":1,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/125802\/revisions"}],"predecessor-version":[{"id":125803,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/125802\/revisions\/125803"}],"wp:attachment":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/media?parent=125802"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/categories?post=125802"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/tags?post=125802"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}