{"id":44042,"date":"2022-09-02T02:09:54","date_gmt":"2022-09-02T02:09:54","guid":{"rendered":"https:\/\/www.dumpsbase.com\/freedumps\/?p=44042"},"modified":"2022-09-02T02:10:57","modified_gmt":"2022-09-02T02:10:57","slug":"updated-cfe-investigation-dumps-are-available-for-your-acfe-certified-fraud-examiner-cfe-certification","status":"publish","type":"post","link":"https:\/\/www.dumpsbase.com\/freedumps\/updated-cfe-investigation-dumps-are-available-for-your-acfe-certified-fraud-examiner-cfe-certification.html","title":{"rendered":"Updated CFE Investigation Dumps Are Available For Your ACFE Certified Fraud Examiner (CFE) Certification"},"content":{"rendered":"\n<p>When planning to get the ACFE Certified Fraud Examiner (CFE) certification, you need to complete four parts:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.dumpsbase.com\/cfe-financial-transactions-and-fraud-schemes.html\"><strong>CFE Financial Transactions and Fraud Schemes<\/strong><\/a> &#8211; including the different types of fraudulent financial transactions hiding in accounting records.<\/li>\n<li><a href=\"https:\/\/www.dumpsbase.com\/cfe-law.html\"><strong>CFE Law<\/strong><\/a> &#8211; including the legal ramifications of fraud examinations, rules of evidence, rights of the accused and accuser and expert witness concerns.<\/li>\n<li><a href=\"https:\/\/www.dumpsbase.com\/cfe-investigation.html\"><strong>CFE Investigation<\/strong><\/a> &#8211; including questions about interviewing, taking statements, obtaining info from public records, tracing transactions, evaluating deception and writing reports.<\/li>\n<li><a href=\"https:\/\/www.dumpsbase.com\/cfe-fraud-prevention-and-deterrence.html\"><strong>CFE Fraud Prevention and Deterrence<\/strong><\/a> &#8211; including why people commit fraud and how to prevent it, white-collar crime, occupational fraud, risk assessment and the ACFE Code of Professional Ethics.<\/li>\n<\/ul>\n<p>To all, the updated CFE Investigation dumps are available for your ACFE Certified Fraud Examiner (CFE) certification. The real CFE Investigation dumps questions and answers of DumpsBase will ensure that you can pass the CFE Investigation exam successfully.<\/p>\n<h2>Read The Sample OF CFE Investigation Dumps Questions To Check The Details<\/h2>\n<script>\n\t  window.fbAsyncInit = function() {\n\t    FB.init({\n\t      appId            : '622169541470367',\n\t      autoLogAppEvents : true,\n\t      xfbml            : true,\n\t      version          : 'v3.1'\n\t    });\n\t  };\n\t\n\t  (function(d, s, id){\n\t     var js, fjs = d.getElementsByTagName(s)[0];\n\t     if (d.getElementById(id)) {return;}\n\t     js = d.createElement(s); js.id = id;\n\t     js.src = \"https:\/\/connect.facebook.net\/en_US\/sdk.js\";\n\t     fjs.parentNode.insertBefore(js, fjs);\n\t   }(document, 'script', 'facebook-jssdk'));\n\t<\/script><script type=\"text\/javascript\" >\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \nif(!window.jQuery) alert(\"The important jQuery library is not properly loaded in your site. Your WordPress theme is probably missing the essential wp_head() call. You can switch to another theme and you will see that the plugin works fine and this notice disappears. If you are still not sure what to do you can contact us for help.\");\n});\n<\/script>  \n  \n<div  id=\"watupro_quiz\" class=\"quiz-area single-page-quiz\">\n<p id=\"submittingExam6493\" style=\"display:none;text-align:center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\"><\/p>\n\n<div class=\"watupro-exam-description\" id=\"description-quiz-6493\"><\/div>\n\n<form action=\"\" method=\"post\" class=\"quiz-form\" id=\"quiz-6493\"  enctype=\"multipart\/form-data\" >\n<div class='watu-question ' id='question-1' style=';'><div id='questionWrap-1'  class='   watupro-question-id-229658'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>1. <\/span>Which of the following types of information would LEAST LIKELY be found when searching external sources without the subject's consent or a legal order?<\/div><input type='hidden' name='question_id[]' id='qID_1' value='229658' \/><input type='hidden' id='answerType229658' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229658[]' id='answer-id-912266' class='answer   answerof-229658 ' value='912266'   \/><label for='answer-id-912266' id='answer-label-912266' class=' answer'><span>A witness's address<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229658[]' id='answer-id-912267' class='answer   answerof-229658 ' value='912267'   \/><label for='answer-id-912267' id='answer-label-912267' class=' answer'><span>Assets owned by a subject<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229658[]' id='answer-id-912268' class='answer   answerof-229658 ' value='912268'   \/><label for='answer-id-912268' id='answer-label-912268' class=' answer'><span>A subject's employee personnel file<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229658[]' id='answer-id-912269' class='answer   answerof-229658 ' value='912269'   \/><label for='answer-id-912269' id='answer-label-912269' class=' answer'><span>A competitor's ownership information<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-2' style=';'><div id='questionWrap-2'  class='   watupro-question-id-229659'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>2. <\/span>Which of the following data analysis functions is used to determine whether company policies are met by employee transactions, such as verifying that traveling employees book their accommodations at approved hotels?<\/div><input type='hidden' name='question_id[]' id='qID_2' value='229659' \/><input type='hidden' id='answerType229659' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229659[]' id='answer-id-912270' class='answer   answerof-229659 ' value='912270'   \/><label for='answer-id-912270' id='answer-label-912270' class=' answer'><span>The correlation analysis function<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229659[]' id='answer-id-912271' class='answer   answerof-229659 ' value='912271'   \/><label for='answer-id-912271' id='answer-label-912271' class=' answer'><span>The Join function<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229659[]' id='answer-id-912272' class='answer   answerof-229659 ' value='912272'   \/><label for='answer-id-912272' id='answer-label-912272' class=' answer'><span>The gap testing function<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229659[]' id='answer-id-912273' class='answer   answerof-229659 ' value='912273'   \/><label for='answer-id-912273' id='answer-label-912273' class=' answer'><span>The compliance verification function<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-3' style=';'><div id='questionWrap-3'  class='   watupro-question-id-229660'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>3. <\/span>Sam needs to obtain the most accurate court records possible in a particular jurisdiction concerning a fraud suspect. The BEST place for Sam to look is a global database that compiles court cases from various jurisdictions<\/div><input type='hidden' name='question_id[]' id='qID_3' value='229660' \/><input type='hidden' id='answerType229660' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229660[]' id='answer-id-912274' class='answer   answerof-229660 ' value='912274'   \/><label for='answer-id-912274' id='answer-label-912274' class=' answer'><span>True<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229660[]' id='answer-id-912275' class='answer   answerof-229660 ' value='912275'   \/><label for='answer-id-912275' id='answer-label-912275' class=' answer'><span>False<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-4' style=';'><div id='questionWrap-4'  class='   watupro-question-id-229661'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>4. <\/span>Orlando is conducting a fraud examination regarding Fast Freight, a large publicly traded corporation, and wants to find the current officers and directors of the company . <br \/>\r<br>Which of the following would be the best source of information for this purpose?<\/div><input type='hidden' name='question_id[]' id='qID_4' value='229661' \/><input type='hidden' id='answerType229661' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229661[]' id='answer-id-912276' class='answer   answerof-229661 ' value='912276'   \/><label for='answer-id-912276' id='answer-label-912276' class=' answer'><span>Commercial filings<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229661[]' id='answer-id-912277' class='answer   answerof-229661 ' value='912277'   \/><label for='answer-id-912277' id='answer-label-912277' class=' answer'><span>Real property records<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229661[]' id='answer-id-912278' class='answer   answerof-229661 ' value='912278'   \/><label for='answer-id-912278' id='answer-label-912278' class=' answer'><span>The company's corporate bylaws<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229661[]' id='answer-id-912279' class='answer   answerof-229661 ' value='912279'   \/><label for='answer-id-912279' id='answer-label-912279' class=' answer'><span>Regulatory securities records<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-5' style=';'><div id='questionWrap-5'  class='   watupro-question-id-229662'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>5. <\/span>Caroline, a fraud examiner, is conducting an admission-seeking interview with John, an employee suspected of stealing cash . <br \/>\r<br>Which of the following is the MOST effective phrasing for Caroline to use when posing an admission-seeking question to John?<\/div><input type='hidden' name='question_id[]' id='qID_5' value='229662' \/><input type='hidden' id='answerType229662' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229662[]' id='answer-id-912280' class='answer   answerof-229662 ' value='912280'   \/><label for='answer-id-912280' id='answer-label-912280' class=' answer'><span>&quot;Why did you take the money?&quot;<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229662[]' id='answer-id-912281' class='answer   answerof-229662 ' value='912281'   \/><label for='answer-id-912281' id='answer-label-912281' class=' answer'><span>&quot;What do you know about the stolen money?&quot;<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229662[]' id='answer-id-912282' class='answer   answerof-229662 ' value='912282'   \/><label for='answer-id-912282' id='answer-label-912282' class=' answer'><span>&quot;Do you know who took the money''&quot;<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229662[]' id='answer-id-912283' class='answer   answerof-229662 ' value='912283'   \/><label for='answer-id-912283' id='answer-label-912283' class=' answer'><span>&quot;Did you steal the money?&quot;<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-6' style=';'><div id='questionWrap-6'  class='   watupro-question-id-229663'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>6. <\/span>Assuming that a jurisdiction has prohibited pretexting with financial institutes, which of the following actions would constitute illegal pretexting?<\/div><input type='hidden' name='question_id[]' id='qID_6' value='229663' \/><input type='hidden' id='answerType229663' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229663[]' id='answer-id-912284' class='answer   answerof-229663 ' value='912284'   \/><label for='answer-id-912284' id='answer-label-912284' class=' answer'><span>Withdrawing another person's funds using a stolen bank account number and PIN<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229663[]' id='answer-id-912285' class='answer   answerof-229663 ' value='912285'   \/><label for='answer-id-912285' id='answer-label-912285' class=' answer'><span>Digging through a person's trash to obtain their bank account information<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229663[]' id='answer-id-912286' class='answer   answerof-229663 ' value='912286'   \/><label for='answer-id-912286' id='answer-label-912286' class=' answer'><span>Making purchases with a credit card account under a fictitious identity<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229663[]' id='answer-id-912287' class='answer   answerof-229663 ' value='912287'   \/><label for='answer-id-912287' id='answer-label-912287' class=' answer'><span>Falsely claiming to be the spouse of an account holder to access bank records<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-7' style=';'><div id='questionWrap-7'  class='   watupro-question-id-229664'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>7. <\/span>Which of the following data is the MOST DIFFICULT to recover during a digital forensic examination?<\/div><input type='hidden' name='question_id[]' id='qID_7' value='229664' \/><input type='hidden' id='answerType229664' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229664[]' id='answer-id-912288' class='answer   answerof-229664 ' value='912288'   \/><label for='answer-id-912288' id='answer-label-912288' class=' answer'><span>Time and date information about files<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229664[]' id='answer-id-912289' class='answer   answerof-229664 ' value='912289'   \/><label for='answer-id-912289' id='answer-label-912289' class=' answer'><span>Websites visited<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229664[]' id='answer-id-912290' class='answer   answerof-229664 ' value='912290'   \/><label for='answer-id-912290' id='answer-label-912290' class=' answer'><span>Files that have been overwritten<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229664[]' id='answer-id-912291' class='answer   answerof-229664 ' value='912291'   \/><label for='answer-id-912291' id='answer-label-912291' class=' answer'><span>Communications sent via instant messenger<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-8' style=';'><div id='questionWrap-8'  class='   watupro-question-id-229665'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>8. <\/span>Which of the following is INCORRECT with regard to locating individuals using online records?<\/div><input type='hidden' name='question_id[]' id='qID_8' value='229665' \/><input type='hidden' id='answerType229665' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229665[]' id='answer-id-912292' class='answer   answerof-229665 ' value='912292'   \/><label for='answer-id-912292' id='answer-label-912292' class=' answer'><span>Before engaging in a search the fraud examine' should know the mod powerful and useful '&gt;Des of searches<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229665[]' id='answer-id-912293' class='answer   answerof-229665 ' value='912293'   \/><label for='answer-id-912293' id='answer-label-912293' class=' answer'><span>If an individual has moved, obtaining a past address is usually of no help<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229665[]' id='answer-id-912294' class='answer   answerof-229665 ' value='912294'   \/><label for='answer-id-912294' id='answer-label-912294' class=' answer'><span>Online records are very useful in locating subjects whose whereabouts are unknown<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229665[]' id='answer-id-912295' class='answer   answerof-229665 ' value='912295'   \/><label for='answer-id-912295' id='answer-label-912295' class=' answer'><span>Obtaining a past address of the subject should be the first step in trying to locate a subject using online records.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-9' style=';'><div id='questionWrap-9'  class='   watupro-question-id-229666'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>9. <\/span>Which of the following statements is MOST ACCURATE regarding covert operations?<\/div><input type='hidden' name='question_id[]' id='qID_9' value='229666' \/><input type='hidden' id='answerType229666' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229666[]' id='answer-id-912296' class='answer   answerof-229666 ' value='912296'   \/><label for='answer-id-912296' id='answer-label-912296' class=' answer'><span>Fraud examiners should conduct coven operations only after attempting conventional methods of evidence-gathering<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229666[]' id='answer-id-912297' class='answer   answerof-229666 ' value='912297'   \/><label for='answer-id-912297' id='answer-label-912297' class=' answer'><span>Mistakes in covert operations generally do not cause damage to their associated investigations<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229666[]' id='answer-id-912298' class='answer   answerof-229666 ' value='912298'   \/><label for='answer-id-912298' id='answer-label-912298' class=' answer'><span>Covert operations rarely prove beneficial to investigations even when planned properly.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229666[]' id='answer-id-912299' class='answer   answerof-229666 ' value='912299'   \/><label for='answer-id-912299' id='answer-label-912299' class=' answer'><span>Most jurisdictions provide protections for investigators conducting covert operations that shield them from reputational, financial, and legal consequences.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-10' style=';'><div id='questionWrap-10'  class='   watupro-question-id-229667'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>10. <\/span>Which of the following sources of information is usually considered to be the MOST IMPORTANT in tracing a subject's assets?<\/div><input type='hidden' name='question_id[]' id='qID_10' value='229667' \/><input type='hidden' id='answerType229667' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229667[]' id='answer-id-912300' class='answer   answerof-229667 ' value='912300'   \/><label for='answer-id-912300' id='answer-label-912300' class=' answer'><span>Credit card statements<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229667[]' id='answer-id-912301' class='answer   answerof-229667 ' value='912301'   \/><label for='answer-id-912301' id='answer-label-912301' class=' answer'><span>PaystuDs<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229667[]' id='answer-id-912302' class='answer   answerof-229667 ' value='912302'   \/><label for='answer-id-912302' id='answer-label-912302' class=' answer'><span>Surveillance footage<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229667[]' id='answer-id-912303' class='answer   answerof-229667 ' value='912303'   \/><label for='answer-id-912303' id='answer-label-912303' class=' answer'><span>Financial institution records<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-11' style=';'><div id='questionWrap-11'  class='   watupro-question-id-229668'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>11. <\/span>Arnold, a Certified Fraud Examiner (CFE) for Integra Wealth, learns that Elizabeth, an accounts payable clerk, recently purchased an expensive ski boat Arnold also knows that Elizabeth recently purchased a vacation home on a nearby lake Arnold has sufficient predication to:<\/div><input type='hidden' name='question_id[]' id='qID_11' value='229668' \/><input type='hidden' id='answerType229668' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229668[]' id='answer-id-912304' class='answer   answerof-229668 ' value='912304'   \/><label for='answer-id-912304' id='answer-label-912304' class=' answer'><span>Notify management of the possibility that Elizabeth has committed fraudulent acts<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229668[]' id='answer-id-912305' class='answer   answerof-229668 ' value='912305'   \/><label for='answer-id-912305' id='answer-label-912305' class=' answer'><span>Search Elizabeth's mobile phone for evidence of misconduct.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229668[]' id='answer-id-912306' class='answer   answerof-229668 ' value='912306'   \/><label for='answer-id-912306' id='answer-label-912306' class=' answer'><span>Accuse Elizabeth directly of having committed fraud<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229668[]' id='answer-id-912307' class='answer   answerof-229668 ' value='912307'   \/><label for='answer-id-912307' id='answer-label-912307' class=' answer'><span>Conduct discreet inquiries into Elizabeth's responsibilities as an accounts payable clerk<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-12' style=';'><div id='questionWrap-12'  class='   watupro-question-id-229669'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>12. <\/span>Which of the following is the MOST ACCURATE statement regarding the analysis phase in digital forensic investigations?<\/div><input type='hidden' name='question_id[]' id='qID_12' value='229669' \/><input type='hidden' id='answerType229669' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229669[]' id='answer-id-912308' class='answer   answerof-229669 ' value='912308'   \/><label for='answer-id-912308' id='answer-label-912308' class=' answer'><span>The analysis phase of digital forensic investigations should not commence unless it is verified that the suspect devices do not contain relevant data.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229669[]' id='answer-id-912309' class='answer   answerof-229669 ' value='912309'   \/><label for='answer-id-912309' id='answer-label-912309' class=' answer'><span>During the analysis phase, it is best to use a combination of the various forensic tools that can assist h identifying, extracting, and collecting digital evidence<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229669[]' id='answer-id-912310' class='answer   answerof-229669 ' value='912310'   \/><label for='answer-id-912310' id='answer-label-912310' class=' answer'><span>When analyzing data for evidence, fraud examiners should look for exculpatory evidence but not exculpatory evidence<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229669[]' id='answer-id-912311' class='answer   answerof-229669 ' value='912311'   \/><label for='answer-id-912311' id='answer-label-912311' class=' answer'><span>The primary concern when analyzing digital evidence is to protect the collected information from seizure<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-13' style=';'><div id='questionWrap-13'  class='   watupro-question-id-229670'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>13. <\/span>Which of the following should be done to prepare an organization for a formal fraud investigation?<\/div><input type='hidden' name='question_id[]' id='qID_13' value='229670' \/><input type='hidden' id='answerType229670' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229670[]' id='answer-id-912312' class='answer   answerof-229670 ' value='912312'   \/><label for='answer-id-912312' id='answer-label-912312' class=' answer'><span>Inform the subject that they are under investigation.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229670[]' id='answer-id-912313' class='answer   answerof-229670 ' value='912313'   \/><label for='answer-id-912313' id='answer-label-912313' class=' answer'><span>Issue an organization-wide communication that notifies all employees about the investigation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229670[]' id='answer-id-912314' class='answer   answerof-229670 ' value='912314'   \/><label for='answer-id-912314' id='answer-label-912314' class=' answer'><span>Notify all managers about the investigation, explaining why it is happening and who is involved.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229670[]' id='answer-id-912315' class='answer   answerof-229670 ' value='912315'   \/><label for='answer-id-912315' id='answer-label-912315' class=' answer'><span>Prepare the managers of the employees who will be involved in the investigation<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-14' style=';'><div id='questionWrap-14'  class='   watupro-question-id-229671'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>14. <\/span>When planning for the interview phase of an investigation, which of the following steps should NOT be taken by the fraud examiner?<\/div><input type='hidden' name='question_id[]' id='qID_14' value='229671' \/><input type='hidden' id='answerType229671' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229671[]' id='answer-id-912316' class='answer   answerof-229671 ' value='912316'   \/><label for='answer-id-912316' id='answer-label-912316' class=' answer'><span>Consider what the interview is intended to accomplish and state an objective.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229671[]' id='answer-id-912317' class='answer   answerof-229671 ' value='912317'   \/><label for='answer-id-912317' id='answer-label-912317' class=' answer'><span>Review the case file to ensure that important information has not been overlooked<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229671[]' id='answer-id-912318' class='answer   answerof-229671 ' value='912318'   \/><label for='answer-id-912318' id='answer-label-912318' class=' answer'><span>Prepare a detailed list of questions to ask the subject during the interview.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229671[]' id='answer-id-912319' class='answer   answerof-229671 ' value='912319'   \/><label for='answer-id-912319' id='answer-label-912319' class=' answer'><span>Ensure that the interview is held in a venue where the subject will feel Uncomfortable<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-15' style=';'><div id='questionWrap-15'  class='   watupro-question-id-229672'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>15. <\/span>Eugene is conducting an admission-seeking interview of a suspect. During the interview, the suspect frequently looks away from Eugene while responding to questions. Eugene can safely conclude that the suspect is dishonest due to his failure to maintain eye contact.<\/div><input type='hidden' name='question_id[]' id='qID_15' value='229672' \/><input type='hidden' id='answerType229672' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229672[]' id='answer-id-912320' class='answer   answerof-229672 ' value='912320'   \/><label for='answer-id-912320' id='answer-label-912320' class=' answer'><span>True<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229672[]' id='answer-id-912321' class='answer   answerof-229672 ' value='912321'   \/><label for='answer-id-912321' id='answer-label-912321' class=' answer'><span>False<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-16' style=';'><div id='questionWrap-16'  class='   watupro-question-id-229673'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>16. <\/span>During an interview, Alex asked a fraud suspect if he could retrieve the suspect's account records from her bank. The suspect said, &quot;yes.&quot; but she did not provide consent in writing <br \/>\r<br>Although the suspect orally consented, the suspect's bank is NOT required to allow Alex to access the suspect's account records at this point.<\/div><input type='hidden' name='question_id[]' id='qID_16' value='229673' \/><input type='hidden' id='answerType229673' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229673[]' id='answer-id-912322' class='answer   answerof-229673 ' value='912322'   \/><label for='answer-id-912322' id='answer-label-912322' class=' answer'><span>True<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229673[]' id='answer-id-912323' class='answer   answerof-229673 ' value='912323'   \/><label for='answer-id-912323' id='answer-label-912323' class=' answer'><span>False<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-17' style=';'><div id='questionWrap-17'  class='   watupro-question-id-229674'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>17. <\/span>Elizabeth, a Certified Fraud Examiner (CFE), is conducting an admission-seeking interview with Shannon, a fraud suspect. Shannon is seated approximately five feet away from Elizabeth in an empty room. The room has several pictures and posters on the wall, and the door is closed. <br \/>\r<br>According to admission-seeking interview best practices, what change should Elizabeth make to the interview environment to increase the chances of the interview's success?<\/div><input type='hidden' name='question_id[]' id='qID_17' value='229674' \/><input type='hidden' id='answerType229674' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229674[]' id='answer-id-912324' class='answer   answerof-229674 ' value='912324'   \/><label for='answer-id-912324' id='answer-label-912324' class=' answer'><span>Move the interview to a room without pictures or wall hangings to prevent distractions<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229674[]' id='answer-id-912325' class='answer   answerof-229674 ' value='912325'   \/><label for='answer-id-912325' id='answer-label-912325' class=' answer'><span>Open the door so that Shannon feels free to leave at any time<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229674[]' id='answer-id-912326' class='answer   answerof-229674 ' value='912326'   \/><label for='answer-id-912326' id='answer-label-912326' class=' answer'><span>Place a table between her and Shannon to create a psychological barrier<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229674[]' id='answer-id-912327' class='answer   answerof-229674 ' value='912327'   \/><label for='answer-id-912327' id='answer-label-912327' class=' answer'><span>All of the above<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-18' style=';'><div id='questionWrap-18'  class='   watupro-question-id-229675'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>18. <\/span>Why is it necessary to image a seized computer's hard drive for forensic analysis?<\/div><input type='hidden' name='question_id[]' id='qID_18' value='229675' \/><input type='hidden' id='answerType229675' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229675[]' id='answer-id-912328' class='answer   answerof-229675 ' value='912328'   \/><label for='answer-id-912328' id='answer-label-912328' class=' answer'><span>To prohibit access to the suspect computer's hard drive by individuals not professionally trained in forensic analysis<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229675[]' id='answer-id-912329' class='answer   answerof-229675 ' value='912329'   \/><label for='answer-id-912329' id='answer-label-912329' class=' answer'><span>To allow for the analysis of data from a suspect computer without altering or damaging the original data in any way<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229675[]' id='answer-id-912330' class='answer   answerof-229675 ' value='912330'   \/><label for='answer-id-912330' id='answer-label-912330' class=' answer'><span>To create pictures of the suspect computer system and its wires and cables<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229675[]' id='answer-id-912331' class='answer   answerof-229675 ' value='912331'   \/><label for='answer-id-912331' id='answer-label-912331' class=' answer'><span>To enable the retrieval of data from the suspect computer directly via its operating system<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-19' style=';'><div id='questionWrap-19'  class='   watupro-question-id-229676'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>19. <\/span>A fraud examiner believes that a suspect might have used illicit funds to construct a commercial building to fit a restaurant . <br \/>\r<br>Which of the following records would be the MOST helpful in confirming the owner of the building?<\/div><input type='hidden' name='question_id[]' id='qID_19' value='229676' \/><input type='hidden' id='answerType229676' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229676[]' id='answer-id-912332' class='answer   answerof-229676 ' value='912332'   \/><label for='answer-id-912332' id='answer-label-912332' class=' answer'><span>Local court records<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229676[]' id='answer-id-912333' class='answer   answerof-229676 ' value='912333'   \/><label for='answer-id-912333' id='answer-label-912333' class=' answer'><span>Commercial filings<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229676[]' id='answer-id-912334' class='answer   answerof-229676 ' value='912334'   \/><label for='answer-id-912334' id='answer-label-912334' class=' answer'><span>Building permit records<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229676[]' id='answer-id-912335' class='answer   answerof-229676 ' value='912335'   \/><label for='answer-id-912335' id='answer-label-912335' class=' answer'><span>Voter registration records<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-20' style=';'><div id='questionWrap-20'  class='   watupro-question-id-229677'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>20. <\/span>Cynthia is preparing to conduct a covert investigation. Prior to conducting surveillance of her subject, she creates a memorandum outlining the basis for her operation. <br \/>\r<br>Which of the following pieces of information should she include in her memorandum?<\/div><input type='hidden' name='question_id[]' id='qID_20' value='229677' \/><input type='hidden' id='answerType229677' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229677[]' id='answer-id-912336' class='answer   answerof-229677 ' value='912336'   \/><label for='answer-id-912336' id='answer-label-912336' class=' answer'><span>The name of the subject she will be observing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229677[]' id='answer-id-912337' class='answer   answerof-229677 ' value='912337'   \/><label for='answer-id-912337' id='answer-label-912337' class=' answer'><span>Her first impression regarding the subject's culpability<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229677[]' id='answer-id-912338' class='answer   answerof-229677 ' value='912338'   \/><label for='answer-id-912338' id='answer-label-912338' class=' answer'><span>The identities of any confidential sources to be used in the operation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229677[]' id='answer-id-912339' class='answer   answerof-229677 ' value='912339'   \/><label for='answer-id-912339' id='answer-label-912339' class=' answer'><span>All of the above<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-21' style=';'><div id='questionWrap-21'  class='   watupro-question-id-229678'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>21. <\/span>Which of the following statements is MOST ACCURATE regarding how a fraud examiner should prepare for an interview with a subject from a different jurisdiction?<\/div><input type='hidden' name='question_id[]' id='qID_21' value='229678' \/><input type='hidden' id='answerType229678' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229678[]' id='answer-id-912340' class='answer   answerof-229678 ' value='912340'   \/><label for='answer-id-912340' id='answer-label-912340' class=' answer'><span>A fraud examiner does not need to research cultural considerations such as personal space and eye contact.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229678[]' id='answer-id-912341' class='answer   answerof-229678 ' value='912341'   \/><label for='answer-id-912341' id='answer-label-912341' class=' answer'><span>A fraud examiner should find out whether there are limitations on the use of information obtained during an interview<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229678[]' id='answer-id-912342' class='answer   answerof-229678 ' value='912342'   \/><label for='answer-id-912342' id='answer-label-912342' class=' answer'><span>Failing to observe cultural norms is not a concern if the interviewer is from a different country than the interviewee<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229678[]' id='answer-id-912343' class='answer   answerof-229678 ' value='912343'   \/><label for='answer-id-912343' id='answer-label-912343' class=' answer'><span>Consulting with legal counsel is only necessary when an investigation spans multiple junsdictions<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-22' style=';'><div id='questionWrap-22'  class='   watupro-question-id-229679'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>22. <\/span>Jackson, a digital forensic examiner for a government agency, is conducting a criminal investigation into the alleged embezzlement of funds from the government's Welfare Department (WD). Ginny. a WD employee, is the prime suspect. Jackson obtains a court order authorizing him to seize Ginny's personal computer for forensic examination . <br \/>\r<br>Which of the following is the MOST ACCURATE statement?<\/div><input type='hidden' name='question_id[]' id='qID_22' value='229679' \/><input type='hidden' id='answerType229679' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229679[]' id='answer-id-912344' class='answer   answerof-229679 ' value='912344'   \/><label for='answer-id-912344' id='answer-label-912344' class=' answer'><span>If Ginny's computer is running. Jackson should perform a graceful shutdown by turning it off using the normal shutdown process<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229679[]' id='answer-id-912345' class='answer   answerof-229679 ' value='912345'   \/><label for='answer-id-912345' id='answer-label-912345' class=' answer'><span>If Ginny\u2019s computer is off and Jackson needs evidence that exists only in the form of volatile data, he should turn the computer on and retrieve data directly via the computer's normal interface.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229679[]' id='answer-id-912346' class='answer   answerof-229679 ' value='912346'   \/><label for='answer-id-912346' id='answer-label-912346' class=' answer'><span>If Ginny's computer is off. Jackson should not turn it on unless he plans to use an encryption device that can guarantee that the system's hard drive will not be accessed during startup.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229679[]' id='answer-id-912347' class='answer   answerof-229679 ' value='912347'   \/><label for='answer-id-912347' id='answer-label-912347' class=' answer'><span>If Ginny's computer is running. Jackson may retrieve data from the computer directly via its normal interface if the evidence that he needs exists only in the form of volatile data<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-23' style=';'><div id='questionWrap-23'  class='   watupro-question-id-229680'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>23. <\/span>Which of the following is the MOST ACCURATE statement about trying to locate a subject using online records?<\/div><input type='hidden' name='question_id[]' id='qID_23' value='229680' \/><input type='hidden' id='answerType229680' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229680[]' id='answer-id-912348' class='answer   answerof-229680 ' value='912348'   \/><label for='answer-id-912348' id='answer-label-912348' class=' answer'><span>Most public records services do not maintain a list of past addresses<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229680[]' id='answer-id-912349' class='answer   answerof-229680 ' value='912349'   \/><label for='answer-id-912349' id='answer-label-912349' class=' answer'><span>Obtaining a past address of the subject should be the first step in trying to locate a subject using online records<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229680[]' id='answer-id-912350' class='answer   answerof-229680 ' value='912350'   \/><label for='answer-id-912350' id='answer-label-912350' class=' answer'><span>The first step in locating someone using online records is to obtain a list of past employers<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229680[]' id='answer-id-912351' class='answer   answerof-229680 ' value='912351'   \/><label for='answer-id-912351' id='answer-label-912351' class=' answer'><span>Online records are generally not useful in locating subjects whose address is unknown<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-24' style=';'><div id='questionWrap-24'  class='   watupro-question-id-229681'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>24. <\/span>The term_____________refers to a process of resolving allegations of fraud from inception to disposition.<\/div><input type='hidden' name='question_id[]' id='qID_24' value='229681' \/><input type='hidden' id='answerType229681' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229681[]' id='answer-id-912352' class='answer   answerof-229681 ' value='912352'   \/><label for='answer-id-912352' id='answer-label-912352' class=' answer'><span>Fraud theory<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229681[]' id='answer-id-912353' class='answer   answerof-229681 ' value='912353'   \/><label for='answer-id-912353' id='answer-label-912353' class=' answer'><span>Forensic investigation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229681[]' id='answer-id-912354' class='answer   answerof-229681 ' value='912354'   \/><label for='answer-id-912354' id='answer-label-912354' class=' answer'><span>Fraud management<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229681[]' id='answer-id-912355' class='answer   answerof-229681 ' value='912355'   \/><label for='answer-id-912355' id='answer-label-912355' class=' answer'><span>Fraud examination<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-25' style=';'><div id='questionWrap-25'  class='   watupro-question-id-229682'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>25. <\/span>Which of the following can be obtained from a wire transfer record?<\/div><input type='hidden' name='question_id[]' id='qID_25' value='229682' \/><input type='hidden' id='answerType229682' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229682[]' id='answer-id-912356' class='answer   answerof-229682 ' value='912356'   \/><label for='answer-id-912356' id='answer-label-912356' class=' answer'><span>The name of the receiving institution's registered agent<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229682[]' id='answer-id-912357' class='answer   answerof-229682 ' value='912357'   \/><label for='answer-id-912357' id='answer-label-912357' class=' answer'><span>The recipient's government identification number<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229682[]' id='answer-id-912358' class='answer   answerof-229682 ' value='912358'   \/><label for='answer-id-912358' id='answer-label-912358' class=' answer'><span>The name of the sender or originator<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229682[]' id='answer-id-912359' class='answer   answerof-229682 ' value='912359'   \/><label for='answer-id-912359' id='answer-label-912359' class=' answer'><span>The sending institution's accreditation type<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-26' style=';'><div id='questionWrap-26'  class='   watupro-question-id-229683'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>26. <\/span>Which of the following is TRUE of a follow-up\/recommendations section in a written fraud examination report?<\/div><input type='hidden' name='question_id[]' id='qID_26' value='229683' \/><input type='hidden' id='answerType229683' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229683[]' id='answer-id-912360' class='answer   answerof-229683 ' value='912360'   \/><label for='answer-id-912360' id='answer-label-912360' class=' answer'><span>A follow-up\/recommendations section is not a required part of every written fraud examination report<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229683[]' id='answer-id-912361' class='answer   answerof-229683 ' value='912361'   \/><label for='answer-id-912361' id='answer-label-912361' class=' answer'><span>A follow-up\/recommendations section calculates the amount of loss caused by any misconduct identified during the investigation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229683[]' id='answer-id-912362' class='answer   answerof-229683 ' value='912362'   \/><label for='answer-id-912362' id='answer-label-912362' class=' answer'><span>A follow-up\/recommendations section must include a list of organizational failings that contnbuted to the fraud<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229683[]' id='answer-id-912363' class='answer   answerof-229683 ' value='912363'   \/><label for='answer-id-912363' id='answer-label-912363' class=' answer'><span>All of the above<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-27' style=';'><div id='questionWrap-27'  class='   watupro-question-id-229684'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>27. <\/span>Which of the following is a reason why a person or organization might engage a fraud examiner to trace illicit transactions?<\/div><input type='hidden' name='question_id[]' id='qID_27' value='229684' \/><input type='hidden' id='answerType229684' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229684[]' id='answer-id-912364' class='answer   answerof-229684 ' value='912364'   \/><label for='answer-id-912364' id='answer-label-912364' class=' answer'><span>A victim of fraud wants to facilitate the recovery of criminal proceeds.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229684[]' id='answer-id-912365' class='answer   answerof-229684 ' value='912365'   \/><label for='answer-id-912365' id='answer-label-912365' class=' answer'><span>An employer wants to know if an employee is falsifying regulatory reports<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229684[]' id='answer-id-912366' class='answer   answerof-229684 ' value='912366'   \/><label for='answer-id-912366' id='answer-label-912366' class=' answer'><span>An attorney wants to evaluate an expert's financial report<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229684[]' id='answer-id-912367' class='answer   answerof-229684 ' value='912367'   \/><label for='answer-id-912367' id='answer-label-912367' class=' answer'><span>An entity needs to find hidden relationships in big data that otherwise would not be discovered.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-28' style=';'><div id='questionWrap-28'  class='   watupro-question-id-229685'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>28. <\/span>Susan, a Certified Fraud Examiner (CFE). is conducting an ad mission-seeking interview of Beth, a fraud suspect. After Susan gave Beth a suitable rationalization for her conduct. Beth continued her denials, giving various alibis . <br \/>\r<br>Which of the following would be the LEAST EFFECTIVE technique for Susan to use in this situation?<\/div><input type='hidden' name='question_id[]' id='qID_28' value='229685' \/><input type='hidden' id='answerType229685' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229685[]' id='answer-id-912368' class='answer   answerof-229685 ' value='912368'   \/><label for='answer-id-912368' id='answer-label-912368' class=' answer'><span>Displaying evidence that specifically contradicts Beth's alibis<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229685[]' id='answer-id-912369' class='answer   answerof-229685 ' value='912369'   \/><label for='answer-id-912369' id='answer-label-912369' class=' answer'><span>Discussing some of Beth's prior deceptions<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229685[]' id='answer-id-912370' class='answer   answerof-229685 ' value='912370'   \/><label for='answer-id-912370' id='answer-label-912370' class=' answer'><span>Discussing the testimony of other witnesses<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229685[]' id='answer-id-912371' class='answer   answerof-229685 ' value='912371'   \/><label for='answer-id-912371' id='answer-label-912371' class=' answer'><span>Displaying all the evidence she has against Beth at once<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-29' style=';'><div id='questionWrap-29'  class='   watupro-question-id-229686'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>29. <\/span>Charles, a fraud examiner, accuses George of fraud during an admission-seeking <br \/>\r<br>interview. George immediately denies the charge How should Charles respond to George's denial?<\/div><input type='hidden' name='question_id[]' id='qID_29' value='229686' \/><input type='hidden' id='answerType229686' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229686[]' id='answer-id-912372' class='answer   answerof-229686 ' value='912372'   \/><label for='answer-id-912372' id='answer-label-912372' class=' answer'><span>Counter the denial by arguing with George until further denials are futile<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229686[]' id='answer-id-912373' class='answer   answerof-229686 ' value='912373'   \/><label for='answer-id-912373' id='answer-label-912373' class=' answer'><span>Use a delaying tactic to interrupt the denial<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229686[]' id='answer-id-912374' class='answer   answerof-229686 ' value='912374'   \/><label for='answer-id-912374' id='answer-label-912374' class=' answer'><span>Remind George he has to tell the truth or face perjury.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229686[]' id='answer-id-912375' class='answer   answerof-229686 ' value='912375'   \/><label for='answer-id-912375' id='answer-label-912375' class=' answer'><span>Allow George to continue denying the charge.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-30' style=';'><div id='questionWrap-30'  class='   watupro-question-id-229687'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>30. <\/span>Nobles, a digital forensic examiner for a government agency, is conducting a criminal investigation of Lucas, a construction company executive, for alleged bribery of foreign officials Nobles obtains a court order authorizing him to seize Lucas's personal computer for forensic examination . <br \/>\r<br>Which of the following is the MOST ACCURATE statement?<\/div><input type='hidden' name='question_id[]' id='qID_30' value='229687' \/><input type='hidden' id='answerType229687' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229687[]' id='answer-id-912376' class='answer   answerof-229687 ' value='912376'   \/><label for='answer-id-912376' id='answer-label-912376' class=' answer'><span>If Lucas's computer is running. Nobles may retrieve data from the computer directly via its normal interface 4 the evidence that he needs exists only in the form of volatile data<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229687[]' id='answer-id-912377' class='answer   answerof-229687 ' value='912377'   \/><label for='answer-id-912377' id='answer-label-912377' class=' answer'><span>If Lucas's computer is off and Nobles needs evidence that exists only in the form of volatile data, he should turn the computer on and retrieve data directly via the computer's normal interlace.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229687[]' id='answer-id-912378' class='answer   answerof-229687 ' value='912378'   \/><label for='answer-id-912378' id='answer-label-912378' class=' answer'><span>If Lucas's computer is off. Nobles should not turn it on unless he plans to use an encryption device that can guarantee that the system's hard drive will not be accessed during startup.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229687[]' id='answer-id-912379' class='answer   answerof-229687 ' value='912379'   \/><label for='answer-id-912379' id='answer-label-912379' class=' answer'><span>If Lucas's computer is running. Nobles should perform a graceful shutdown by turning it off using the normal shutdown process<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-31' style=';'><div id='questionWrap-31'  class='   watupro-question-id-229688'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>31. <\/span>Which of the following BEST describes the data analytics approach known as predictive analytics?<\/div><input type='hidden' name='question_id[]' id='qID_31' value='229688' \/><input type='hidden' id='answerType229688' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229688[]' id='answer-id-912380' class='answer   answerof-229688 ' value='912380'   \/><label for='answer-id-912380' id='answer-label-912380' class=' answer'><span>The employment of a learning algorithm that identifies similarities, patterns, or anomalies within a data set on its own, without human involvement<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229688[]' id='answer-id-912381' class='answer   answerof-229688 ' value='912381'   \/><label for='answer-id-912381' id='answer-label-912381' class=' answer'><span>The configuration of a business program to emulate and integrate the actions of a human to execute certain business processes thus increasing efficiency and automating repetitive manual tasks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229688[]' id='answer-id-912382' class='answer   answerof-229688 ' value='912382'   \/><label for='answer-id-912382' id='answer-label-912382' class=' answer'><span>The use of historical data, along with analyses, statistics, and machine learning components, to build a mathematical model that captures important trends and creates a quantitative forecast<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229688[]' id='answer-id-912383' class='answer   answerof-229688 ' value='912383'   \/><label for='answer-id-912383' id='answer-label-912383' class=' answer'><span>The use of layered artificial neural networks to accommodate more data and more sophisticated algorithms to identify complex patterns<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-32' style=';'><div id='questionWrap-32'  class='   watupro-question-id-229689'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>32. <\/span>Which of the following types of files is the most difficult to recover during a digital forensic examination?<\/div><input type='hidden' name='question_id[]' id='qID_32' value='229689' \/><input type='hidden' id='answerType229689' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229689[]' id='answer-id-912384' class='answer   answerof-229689 ' value='912384'   \/><label for='answer-id-912384' id='answer-label-912384' class=' answer'><span>Overwritten files<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229689[]' id='answer-id-912385' class='answer   answerof-229689 ' value='912385'   \/><label for='answer-id-912385' id='answer-label-912385' class=' answer'><span>Deleted until<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229689[]' id='answer-id-912386' class='answer   answerof-229689 ' value='912386'   \/><label for='answer-id-912386' id='answer-label-912386' class=' answer'><span>Deleted link (shortcut) files<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229689[]' id='answer-id-912387' class='answer   answerof-229689 ' value='912387'   \/><label for='answer-id-912387' id='answer-label-912387' class=' answer'><span>Hidden files<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-33' style=';'><div id='questionWrap-33'  class='   watupro-question-id-229690'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>33. <\/span>Which of the following situations would MOST LIKELY require access to nonpublic records to develop evidence?<\/div><input type='hidden' name='question_id[]' id='qID_33' value='229690' \/><input type='hidden' id='answerType229690' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229690[]' id='answer-id-912388' class='answer   answerof-229690 ' value='912388'   \/><label for='answer-id-912388' id='answer-label-912388' class=' answer'><span>Finding out where a person lives<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229690[]' id='answer-id-912389' class='answer   answerof-229690 ' value='912389'   \/><label for='answer-id-912389' id='answer-label-912389' class=' answer'><span>Reviewing an individual's personal mobile phone records<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229690[]' id='answer-id-912390' class='answer   answerof-229690 ' value='912390'   \/><label for='answer-id-912390' id='answer-label-912390' class=' answer'><span>Obtaining a company's business filings<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229690[]' id='answer-id-912391' class='answer   answerof-229690 ' value='912391'   \/><label for='answer-id-912391' id='answer-label-912391' class=' answer'><span>Determining who owns a piece of real estate<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-34' style=';'><div id='questionWrap-34'  class='   watupro-question-id-229691'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>34. <\/span>Jade, a Certrfied Fraud Examiner (CFE). is conducting an internal investigation in which an employee is suspected of stealing inventory and selling it through a possible shell company called Hidden Finds. LLC. When Jade tries to check Hidden Finds' website, a message appears that redirects customers to a web address that ends with onion. <br \/>\r<br>To view the website's content. Jade will need to install a specialized web browser that enables her to access which of the following?<\/div><input type='hidden' name='question_id[]' id='qID_34' value='229691' \/><input type='hidden' id='answerType229691' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229691[]' id='answer-id-912392' class='answer   answerof-229691 ' value='912392'   \/><label for='answer-id-912392' id='answer-label-912392' class=' answer'><span>The deep archives<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229691[]' id='answer-id-912393' class='answer   answerof-229691 ' value='912393'   \/><label for='answer-id-912393' id='answer-label-912393' class=' answer'><span>The free web<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229691[]' id='answer-id-912394' class='answer   answerof-229691 ' value='912394'   \/><label for='answer-id-912394' id='answer-label-912394' class=' answer'><span>The dark web<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229691[]' id='answer-id-912395' class='answer   answerof-229691 ' value='912395'   \/><label for='answer-id-912395' id='answer-label-912395' class=' answer'><span>The internet archives<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-35' style=';'><div id='questionWrap-35'  class='   watupro-question-id-229692'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>35. <\/span>Gunn, a Certified Fraud Examiner (CFE). was hired to trace Kelly's financial transactions. During his investigation. Gunn obtains records of electronic payments that Kelly made during the past three years . <br \/>\r<br>Which of the following are these records MOST LIKELY to reveal?<\/div><input type='hidden' name='question_id[]' id='qID_35' value='229692' \/><input type='hidden' id='answerType229692' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229692[]' id='answer-id-912396' class='answer   answerof-229692 ' value='912396'   \/><label for='answer-id-912396' id='answer-label-912396' class=' answer'><span>If Kelly has been skimming funds<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229692[]' id='answer-id-912397' class='answer   answerof-229692 ' value='912397'   \/><label for='answer-id-912397' id='answer-label-912397' class=' answer'><span>The cities and countries in which Kelly conducts business<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229692[]' id='answer-id-912398' class='answer   answerof-229692 ' value='912398'   \/><label for='answer-id-912398' id='answer-label-912398' class=' answer'><span>The division and distribution of Kelly's assets<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229692[]' id='answer-id-912399' class='answer   answerof-229692 ' value='912399'   \/><label for='answer-id-912399' id='answer-label-912399' class=' answer'><span>The market value of any real property Kelly owns<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-36' style=';'><div id='questionWrap-36'  class='   watupro-question-id-229693'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>36. <\/span>Anne used Will as a confidential informant in her investigation Anne listed information provided by Will in her final report, referring to him using his initials. She paid Will in cash and obtained a receipt for the transaction . <br \/>\r<br>Which of Anne's methods was NOT considered a best practice when using informants?<\/div><input type='hidden' name='question_id[]' id='qID_36' value='229693' \/><input type='hidden' id='answerType229693' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229693[]' id='answer-id-912400' class='answer   answerof-229693 ' value='912400'   \/><label for='answer-id-912400' id='answer-label-912400' class=' answer'><span>Referring to Will using his initials<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229693[]' id='answer-id-912401' class='answer   answerof-229693 ' value='912401'   \/><label for='answer-id-912401' id='answer-label-912401' class=' answer'><span>Obtaining a receipt from Will<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229693[]' id='answer-id-912402' class='answer   answerof-229693 ' value='912402'   \/><label for='answer-id-912402' id='answer-label-912402' class=' answer'><span>Using information provided by Will in her report<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229693[]' id='answer-id-912403' class='answer   answerof-229693 ' value='912403'   \/><label for='answer-id-912403' id='answer-label-912403' class=' answer'><span>Using cash to pay Will<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-37' style=';'><div id='questionWrap-37'  class='   watupro-question-id-229694'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>37. <\/span>Which of the following is a reason why a subject's credit card records are useful in tracing investigations?<\/div><input type='hidden' name='question_id[]' id='qID_37' value='229694' \/><input type='hidden' id='answerType229694' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229694[]' id='answer-id-912404' class='answer   answerof-229694 ' value='912404'   \/><label for='answer-id-912404' id='answer-label-912404' class=' answer'><span>Credit card statements show source of the funds used to pay a credit card bill<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229694[]' id='answer-id-912405' class='answer   answerof-229694 ' value='912405'   \/><label for='answer-id-912405' id='answer-label-912405' class=' answer'><span>Credit card records show the movements and habits of the subject<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229694[]' id='answer-id-912406' class='answer   answerof-229694 ' value='912406'   \/><label for='answer-id-912406' id='answer-label-912406' class=' answer'><span>Credit card records provide insight into the subject's litigation history<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229694[]' id='answer-id-912407' class='answer   answerof-229694 ' value='912407'   \/><label for='answer-id-912407' id='answer-label-912407' class=' answer'><span>Credit card records contain information about the division and distribution of the subject's assets<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-38' style=';'><div id='questionWrap-38'  class='   watupro-question-id-229695'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>38. <\/span>Vishal, a Certified Fraud Examiner (CFE). has just initiated an interview with Steve, a fraud suspect. After a short introduction. Vishal jokes about the fact that he and Steve are wearing the same tie and then proceeds to ask Steve about the previous night's major sporting event Vishal is attempting to<\/div><input type='hidden' name='question_id[]' id='qID_38' value='229695' \/><input type='hidden' id='answerType229695' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229695[]' id='answer-id-912408' class='answer   answerof-229695 ' value='912408'   \/><label for='answer-id-912408' id='answer-label-912408' class=' answer'><span>Establish the interview theme<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229695[]' id='answer-id-912409' class='answer   answerof-229695 ' value='912409'   \/><label for='answer-id-912409' id='answer-label-912409' class=' answer'><span>Condition the witness.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229695[]' id='answer-id-912410' class='answer   answerof-229695 ' value='912410'   \/><label for='answer-id-912410' id='answer-label-912410' class=' answer'><span>Establish rapport<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229695[]' id='answer-id-912411' class='answer   answerof-229695 ' value='912411'   \/><label for='answer-id-912411' id='answer-label-912411' class=' answer'><span>Exhibit passive listening.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-39' style=';'><div id='questionWrap-39'  class='   watupro-question-id-229696'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>39. <\/span>Which of the following is the MOST IMPORTANT question for a fraud examiner to ask before commencing a legal action to recover assets?<\/div><input type='hidden' name='question_id[]' id='qID_39' value='229696' \/><input type='hidden' id='answerType229696' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229696[]' id='answer-id-912412' class='answer   answerof-229696 ' value='912412'   \/><label for='answer-id-912412' id='answer-label-912412' class=' answer'><span>&quot;Is there a relevant statute of limitations9&quot;<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229696[]' id='answer-id-912413' class='answer   answerof-229696 ' value='912413'   \/><label for='answer-id-912413' id='answer-label-912413' class=' answer'><span>&quot;Does the suspect already have a criminal record?&quot;<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229696[]' id='answer-id-912414' class='answer   answerof-229696 ' value='912414'   \/><label for='answer-id-912414' id='answer-label-912414' class=' answer'><span>&quot;Is the suspect guilty of the fraudulent act?''<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229696[]' id='answer-id-912415' class='answer   answerof-229696 ' value='912415'   \/><label for='answer-id-912415' id='answer-label-912415' class=' answer'><span>&quot;Are nonlegal recovery methods or remedies available?''<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-40' style=';'><div id='questionWrap-40'  class='   watupro-question-id-229697'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>40. <\/span>Shane, a Certified Fraud Examiner (CFE). is investigating Larsen. who is active on various social networking sites. Shane wants to search and extract information from Larson's social media postings so that it can be used in court as evidence. <br \/>\r<br>Which of the following is the MOST ACCURATE statement regarding what Shane should do when conducting a social media investigation of Larsen?<\/div><input type='hidden' name='question_id[]' id='qID_40' value='229697' \/><input type='hidden' id='answerType229697' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229697[]' id='answer-id-912416' class='answer   answerof-229697 ' value='912416'   \/><label for='answer-id-912416' id='answer-label-912416' class=' answer'><span>Shane should conduct a forensic shutdown of his computer to preserve the metadata in the social networking sites.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229697[]' id='answer-id-912417' class='answer   answerof-229697 ' value='912417'   \/><label for='answer-id-912417' id='answer-label-912417' class=' answer'><span>Shane should preserve the information from the social networking sites so that it can be established as authentic if used in court.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229697[]' id='answer-id-912418' class='answer   answerof-229697 ' value='912418'   \/><label for='answer-id-912418' id='answer-label-912418' class=' answer'><span>Shane should email himself the links of the postings so that he can retrieve them later.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229697[]' id='answer-id-912419' class='answer   answerof-229697 ' value='912419'   \/><label for='answer-id-912419' id='answer-label-912419' class=' answer'><span>Shane should preserve the information by saving the links of the postings in his 'bookmarks&quot;<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-41' style=';'><div id='questionWrap-41'  class='   watupro-question-id-229698'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>41. <\/span>Baker, a Certified Fraud Examiner (CFE). contacts Dierdre for the purpose of conducting a routine, information-gathering interview Dierdre expresses a desire that her coworker. <br \/>\r<br>Matthew, whom Baker also plans to interview, be interviewed at the same time Baker should:<\/div><input type='hidden' name='question_id[]' id='qID_41' value='229698' \/><input type='hidden' id='answerType229698' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229698[]' id='answer-id-912420' class='answer   answerof-229698 ' value='912420'   \/><label for='answer-id-912420' id='answer-label-912420' class=' answer'><span>Interview Dierdre and Matthew separately.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229698[]' id='answer-id-912421' class='answer   answerof-229698 ' value='912421'   \/><label for='answer-id-912421' id='answer-label-912421' class=' answer'><span>Interview Dierdre and Matthew at the same time, but bring in a second interviewer<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229698[]' id='answer-id-912422' class='answer   answerof-229698 ' value='912422'   \/><label for='answer-id-912422' id='answer-label-912422' class=' answer'><span>Interview Dierdre and Matthew at the same time by himself<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229698[]' id='answer-id-912423' class='answer   answerof-229698 ' value='912423'   \/><label for='answer-id-912423' id='answer-label-912423' class=' answer'><span>Allow Matthew to be present as a silent observer.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-42' style=';'><div id='questionWrap-42'  class='   watupro-question-id-229699'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>42. <\/span>Which of the following is NOT a step a fraud examiner must take before seizing evidence in a digital forensic investigation?<\/div><input type='hidden' name='question_id[]' id='qID_42' value='229699' \/><input type='hidden' id='answerType229699' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229699[]' id='answer-id-912424' class='answer   answerof-229699 ' value='912424'   \/><label for='answer-id-912424' id='answer-label-912424' class=' answer'><span>Obtain and become familiar with any legal orders that apply to the investigation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229699[]' id='answer-id-912425' class='answer   answerof-229699 ' value='912425'   \/><label for='answer-id-912425' id='answer-label-912425' class=' answer'><span>Assemble an investigation team comprised only of outside digital forensic experts<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229699[]' id='answer-id-912426' class='answer   answerof-229699 ' value='912426'   \/><label for='answer-id-912426' id='answer-label-912426' class=' answer'><span>Ensure that only trained professionals employ any software used in a forensic capacity<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229699[]' id='answer-id-912427' class='answer   answerof-229699 ' value='912427'   \/><label for='answer-id-912427' id='answer-label-912427' class=' answer'><span>Determine whether there are privacy issues related to the item(s) to be searched.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-43' style=';'><div id='questionWrap-43'  class='   watupro-question-id-229700'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>43. <\/span>Al needs to know the location of the principal office and the initial shareholders of a company he is investigating . <br \/>\r<br>Which of the following would be the BEST source of this reformation?<\/div><input type='hidden' name='question_id[]' id='qID_43' value='229700' \/><input type='hidden' id='answerType229700' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229700[]' id='answer-id-912428' class='answer   answerof-229700 ' value='912428'   \/><label for='answer-id-912428' id='answer-label-912428' class=' answer'><span>The organizational filings with the government of the jurisdiction in which the company is incorporated<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229700[]' id='answer-id-912429' class='answer   answerof-229700 ' value='912429'   \/><label for='answer-id-912429' id='answer-label-912429' class=' answer'><span>The contractual documents regarding real properly owned by the corporation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229700[]' id='answer-id-912430' class='answer   answerof-229700 ' value='912430'   \/><label for='answer-id-912430' id='answer-label-912430' class=' answer'><span>The utility records in the municipality where the corporation has its principal office<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229700[]' id='answer-id-912431' class='answer   answerof-229700 ' value='912431'   \/><label for='answer-id-912431' id='answer-label-912431' class=' answer'><span>The shareholder data form filed with the World Bank<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-44' style=';'><div id='questionWrap-44'  class='   watupro-question-id-229701'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>44. <\/span>If your suspect is spending suspected illicit funds on consumables (e.g.. travel and entertainment) and you need to prove their illicit income circumstantially, which of the following methods of tracing assets would yield the BEST result?<\/div><input type='hidden' name='question_id[]' id='qID_44' value='229701' \/><input type='hidden' id='answerType229701' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229701[]' id='answer-id-912432' class='answer   answerof-229701 ' value='912432'   \/><label for='answer-id-912432' id='answer-label-912432' class=' answer'><span>expenditures method<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229701[]' id='answer-id-912433' class='answer   answerof-229701 ' value='912433'   \/><label for='answer-id-912433' id='answer-label-912433' class=' answer'><span>The consumables method<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229701[]' id='answer-id-912434' class='answer   answerof-229701 ' value='912434'   \/><label for='answer-id-912434' id='answer-label-912434' class=' answer'><span>The income method<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229701[]' id='answer-id-912435' class='answer   answerof-229701 ' value='912435'   \/><label for='answer-id-912435' id='answer-label-912435' class=' answer'><span>The asset method<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-45' style=';'><div id='questionWrap-45'  class='   watupro-question-id-229702'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>45. <\/span>Marilyn, a Certified Fraud Examiner (CFE). is reasonably sure that Shelly, her primary suspect, committed the fraud in question Before scheduling an admission-seeking interview with Shelly. Marilyn should be reasonably sure of all of the following EXCEPT:<\/div><input type='hidden' name='question_id[]' id='qID_45' value='229702' \/><input type='hidden' id='answerType229702' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229702[]' id='answer-id-912436' class='answer   answerof-229702 ' value='912436'   \/><label for='answer-id-912436' id='answer-label-912436' class=' answer'><span>That all reasonable investigative steps have been taken<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229702[]' id='answer-id-912437' class='answer   answerof-229702 ' value='912437'   \/><label for='answer-id-912437' id='answer-label-912437' class=' answer'><span>That the interview's time and location can be controlled<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229702[]' id='answer-id-912438' class='answer   answerof-229702 ' value='912438'   \/><label for='answer-id-912438' id='answer-label-912438' class=' answer'><span>That no other person was involved in the fraud in question<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229702[]' id='answer-id-912439' class='answer   answerof-229702 ' value='912439'   \/><label for='answer-id-912439' id='answer-label-912439' class=' answer'><span>That the interview's subject matter can be controlled<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-46' style=';'><div id='questionWrap-46'  class='   watupro-question-id-229703'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>46. <\/span>Tara. a Certified Fraud Examiner (CFE). is searching social media sites for evidence in a fraud investigation . <br \/>\r<br>Which of the following is the MOST ACCURATE statement regarding what Tara should do when mining social media sites for evidence of fraud?<\/div><input type='hidden' name='question_id[]' id='qID_46' value='229703' \/><input type='hidden' id='answerType229703' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229703[]' id='answer-id-912440' class='answer   answerof-229703 ' value='912440'   \/><label for='answer-id-912440' id='answer-label-912440' class=' answer'><span>Tara should preserve the information by saving the links of the postings as bookmarks in her browser.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229703[]' id='answer-id-912441' class='answer   answerof-229703 ' value='912441'   \/><label for='answer-id-912441' id='answer-label-912441' class=' answer'><span>Tara should preserve the metadata by printing out the web pages of each of the postings.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229703[]' id='answer-id-912442' class='answer   answerof-229703 ' value='912442'   \/><label for='answer-id-912442' id='answer-label-912442' class=' answer'><span>Tara should conduct a forensic shutdown of the computer to preserve the metadata m the social networking sites.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229703[]' id='answer-id-912443' class='answer   answerof-229703 ' value='912443'   \/><label for='answer-id-912443' id='answer-label-912443' class=' answer'><span>Tara should preserve the information from the sites so that it can be established as authentic if used in court.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-47' style=';'><div id='questionWrap-47'  class='   watupro-question-id-229704'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>47. <\/span>Andrew wants to use a confidential informant in his investigation. He plans to compensate the informant with cash and obtain a receipt. He also plans to identify his source in a memorandum and his final report using only the informant's initials . <br \/>\r<br>Which of Andrew's plans is NOT considered a best practice when using an informant?<\/div><input type='hidden' name='question_id[]' id='qID_47' value='229704' \/><input type='hidden' id='answerType229704' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229704[]' id='answer-id-912444' class='answer   answerof-229704 ' value='912444'   \/><label for='answer-id-912444' id='answer-label-912444' class=' answer'><span>Referring to the informant in the memorandum using the informant's initials<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229704[]' id='answer-id-912445' class='answer   answerof-229704 ' value='912445'   \/><label for='answer-id-912445' id='answer-label-912445' class=' answer'><span>Using information from the informant in his final report<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229704[]' id='answer-id-912446' class='answer   answerof-229704 ' value='912446'   \/><label for='answer-id-912446' id='answer-label-912446' class=' answer'><span>Creating a receipt regarding the cash payment<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229704[]' id='answer-id-912447' class='answer   answerof-229704 ' value='912447'   \/><label for='answer-id-912447' id='answer-label-912447' class=' answer'><span>Compensating the informant with cash<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-48' style=';'><div id='questionWrap-48'  class='   watupro-question-id-229705'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>48. <\/span>Which of the following is NOT one of the main limitations of conducting a search for public records using online databases?<\/div><input type='hidden' name='question_id[]' id='qID_48' value='229705' \/><input type='hidden' id='answerType229705' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229705[]' id='answer-id-912448' class='answer   answerof-229705 ' value='912448'   \/><label for='answer-id-912448' id='answer-label-912448' class=' answer'><span>Online public records searches are limited in the jurisdictions they cover.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229705[]' id='answer-id-912449' class='answer   answerof-229705 ' value='912449'   \/><label for='answer-id-912449' id='answer-label-912449' class=' answer'><span>Public records database companies are difficult to find.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229705[]' id='answer-id-912450' class='answer   answerof-229705 ' value='912450'   \/><label for='answer-id-912450' id='answer-label-912450' class=' answer'><span>Online coverage of public records varies widely from jurisdiction to jurisdiction<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229705[]' id='answer-id-912451' class='answer   answerof-229705 ' value='912451'   \/><label for='answer-id-912451' id='answer-label-912451' class=' answer'><span>The timeliness and accuracy of information in online databases must be validated<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-49' style=';'><div id='questionWrap-49'  class='   watupro-question-id-229706'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>49. <\/span>Which of the following is the MOST ACCURATE statement about the privacy of information shared through social media?<\/div><input type='hidden' name='question_id[]' id='qID_49' value='229706' \/><input type='hidden' id='answerType229706' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229706[]' id='answer-id-912452' class='answer   answerof-229706 ' value='912452'   \/><label for='answer-id-912452' id='answer-label-912452' class=' answer'><span>To access any user-posted information on social media sites, fraud examiners must obtain some type of legal order from the jurisdiction in which the user resides.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229706[]' id='answer-id-912453' class='answer   answerof-229706 ' value='912453'   \/><label for='answer-id-912453' id='answer-label-912453' class=' answer'><span>A fraud examiner cannot be held liable for violating a user's privacy rights if they hack or break into areas of a social networking site designated as private because all social media information is public.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229706[]' id='answer-id-912454' class='answer   answerof-229706 ' value='912454'   \/><label for='answer-id-912454' id='answer-label-912454' class=' answer'><span>The Privacy of Social Networks Treaty is a binding international treaty that makes it illegal for law enforcement to seek social media log-in credentials from users.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229706[]' id='answer-id-912455' class='answer   answerof-229706 ' value='912455'   \/><label for='answer-id-912455' id='answer-label-912455' class=' answer'><span>Hacking or breaking into information on social media sites that is restricted as private could result in liability for fraud examiners due to violation of users' privacy rights.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-50' style=';'><div id='questionWrap-50'  class='   watupro-question-id-229707'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>50. <\/span>Which of the following statements concerning access to nonpublic records is MOST ACCURATE?<\/div><input type='hidden' name='question_id[]' id='qID_50' value='229707' \/><input type='hidden' id='answerType229707' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229707[]' id='answer-id-912456' class='answer   answerof-229707 ' value='912456'   \/><label for='answer-id-912456' id='answer-label-912456' class=' answer'><span>Once a criminal case is filed, all records obtained by the government are considered public records<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229707[]' id='answer-id-912457' class='answer   answerof-229707 ' value='912457'   \/><label for='answer-id-912457' id='answer-label-912457' class=' answer'><span>Nonpublic records cannot be obtained by subpoena or legal order in a civil action<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229707[]' id='answer-id-912458' class='answer   answerof-229707 ' value='912458'   \/><label for='answer-id-912458' id='answer-label-912458' class=' answer'><span>In most junsdictions. banks are allowed to turn over a suspect's account information directly to a fraud victim when there is adequate evidence of wrongdoing.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229707[]' id='answer-id-912459' class='answer   answerof-229707 ' value='912459'   \/><label for='answer-id-912459' id='answer-label-912459' class=' answer'><span>The government usually will not share nonpublic records with a fraud victim during an investigation into the underlying fraud.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-51' style=';'><div id='questionWrap-51'  class='   watupro-question-id-229708'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>51. <\/span>Which of the following is a measure that can help avoid alerting suspected perpetrators who are under investigation?<\/div><input type='hidden' name='question_id[]' id='qID_51' value='229708' \/><input type='hidden' id='answerType229708' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229708[]' id='answer-id-912460' class='answer   answerof-229708 ' value='912460'   \/><label for='answer-id-912460' id='answer-label-912460' class=' answer'><span>Terminate the suspected employee.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229708[]' id='answer-id-912461' class='answer   answerof-229708 ' value='912461'   \/><label for='answer-id-912461' id='answer-label-912461' class=' answer'><span>Notify everyone in the affected department<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229708[]' id='answer-id-912462' class='answer   answerof-229708 ' value='912462'   \/><label for='answer-id-912462' id='answer-label-912462' class=' answer'><span>Delay taking any action.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229708[]' id='answer-id-912463' class='answer   answerof-229708 ' value='912463'   \/><label for='answer-id-912463' id='answer-label-912463' class=' answer'><span>Inform only those who need to know.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-52' style=';'><div id='questionWrap-52'  class='   watupro-question-id-229709'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>52. <\/span>Management at Oak Company has asked Arthur, an internal auditor, to implement a data analysis program to search for warning signs of potential fraud within the company . <br \/>\r<br>Which of the following steps should Arthur conduct first to MOST effectively use data analysis techniques for such an initiative?<\/div><input type='hidden' name='question_id[]' id='qID_52' value='229709' \/><input type='hidden' id='answerType229709' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229709[]' id='answer-id-912464' class='answer   answerof-229709 ' value='912464'   \/><label for='answer-id-912464' id='answer-label-912464' class=' answer'><span>Analyze the data.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229709[]' id='answer-id-912465' class='answer   answerof-229709 ' value='912465'   \/><label for='answer-id-912465' id='answer-label-912465' class=' answer'><span>Cleanse and normalize the data<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229709[]' id='answer-id-912466' class='answer   answerof-229709 ' value='912466'   \/><label for='answer-id-912466' id='answer-label-912466' class=' answer'><span>Build a profile of potential frauds.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229709[]' id='answer-id-912467' class='answer   answerof-229709 ' value='912467'   \/><label for='answer-id-912467' id='answer-label-912467' class=' answer'><span>Obtain the data.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-53' style=';'><div id='questionWrap-53'  class='   watupro-question-id-229710'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>53. <\/span>Which of the following is the MOST ACCURATE statement about how fraud examiners shook! approach fraud examinations?<\/div><input type='hidden' name='question_id[]' id='qID_53' value='229710' \/><input type='hidden' id='answerType229710' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229710[]' id='answer-id-912468' class='answer   answerof-229710 ' value='912468'   \/><label for='answer-id-912468' id='answer-label-912468' class=' answer'><span>Fraud examinations should begin with general information that is known, starting at the periphery, and then move to the more specific details.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229710[]' id='answer-id-912469' class='answer   answerof-229710 ' value='912469'   \/><label for='answer-id-912469' id='answer-label-912469' class=' answer'><span>When conducting fraud examinations, fraud examiners should adhere to the means-and-ends approach<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229710[]' id='answer-id-912470' class='answer   answerof-229710 ' value='912470'   \/><label for='answer-id-912470' id='answer-label-912470' class=' answer'><span>When conducting fraud examinations, fraud examiners should operate under the assumption that the subjects are guilty<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229710[]' id='answer-id-912471' class='answer   answerof-229710 ' value='912471'   \/><label for='answer-id-912471' id='answer-label-912471' class=' answer'><span>In most examinations, fraud examiners should interview those who are more involved in the matters at issue before interviewing those who are less involved.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-54' style=';'><div id='questionWrap-54'  class='   watupro-question-id-229711'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>54. <\/span>Due to risks of illicit transactions, most jurisdictions require financial institutions to obtain information about which of the following from an institution with which they have a foreign correspondent relationship?<\/div><input type='hidden' name='question_id[]' id='qID_54' value='229711' \/><input type='hidden' id='answerType229711' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229711[]' id='answer-id-912472' class='answer   answerof-229711 ' value='912472'   \/><label for='answer-id-912472' id='answer-label-912472' class=' answer'><span>The institution's branch addresses<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229711[]' id='answer-id-912473' class='answer   answerof-229711 ' value='912473'   \/><label for='answer-id-912473' id='answer-label-912473' class=' answer'><span>The institution's licenses or certifications<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229711[]' id='answer-id-912474' class='answer   answerof-229711 ' value='912474'   \/><label for='answer-id-912474' id='answer-label-912474' class=' answer'><span>The institution's tax statements<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229711[]' id='answer-id-912475' class='answer   answerof-229711 ' value='912475'   \/><label for='answer-id-912475' id='answer-label-912475' class=' answer'><span>The institution's client loan profiles<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-55' style=';'><div id='questionWrap-55'  class='   watupro-question-id-229712'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>55. <\/span>Butler, a Certified Fraud Examiner (CFE), needs to obtain a copy of a statement that the chief executive officer (CEO) of Accord Investments, a venture capital firm, posted on the firm's website sometime last year. Unfortunately, the quote has been removed from the website . <br \/>\r<br>Which of the following resources would be the BEST choice for Butler to consult to find an earlier version of the web page that he needs?<\/div><input type='hidden' name='question_id[]' id='qID_55' value='229712' \/><input type='hidden' id='answerType229712' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229712[]' id='answer-id-912476' class='answer   answerof-229712 ' value='912476'   \/><label for='answer-id-912476' id='answer-label-912476' class=' answer'><span>The invisible archives<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229712[]' id='answer-id-912477' class='answer   answerof-229712 ' value='912477'   \/><label for='answer-id-912477' id='answer-label-912477' class=' answer'><span>The free web<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229712[]' id='answer-id-912478' class='answer   answerof-229712 ' value='912478'   \/><label for='answer-id-912478' id='answer-label-912478' class=' answer'><span>The internet archives<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229712[]' id='answer-id-912479' class='answer   answerof-229712 ' value='912479'   \/><label for='answer-id-912479' id='answer-label-912479' class=' answer'><span>The deep web<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-56' style=';'><div id='questionWrap-56'  class='   watupro-question-id-229713'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>56. <\/span>Which of the following statements is MOST ACCURATE regarding how a fraud examiner should prepare for an interview with a subject from a different jurisdiction?<\/div><input type='hidden' name='question_id[]' id='qID_56' value='229713' \/><input type='hidden' id='answerType229713' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229713[]' id='answer-id-912480' class='answer   answerof-229713 ' value='912480'   \/><label for='answer-id-912480' id='answer-label-912480' class=' answer'><span>Failing to observe cultural norms is not a concern if the interviewer is from a different country than the interviewee.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229713[]' id='answer-id-912481' class='answer   answerof-229713 ' value='912481'   \/><label for='answer-id-912481' id='answer-label-912481' class=' answer'><span>Consulting with legal counsel is only necessary when an investigation spans multiple<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229713[]' id='answer-id-912482' class='answer   answerof-229713 ' value='912482'   \/><label for='answer-id-912482' id='answer-label-912482' class=' answer'><span>A fraud examiner should find out whether the interviewee can insist upon the presence of a legal representative<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229713[]' id='answer-id-912483' class='answer   answerof-229713 ' value='912483'   \/><label for='answer-id-912483' id='answer-label-912483' class=' answer'><span>A fraud examiner does not need to research cultural considerations such as appropriate greetings and eye contact.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-57' style=';'><div id='questionWrap-57'  class='   watupro-question-id-229714'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>57. <\/span>Gilbert is preparing to conduct a covert investigation. Before acting, he wants to wnte a memorandum documenting his plan . <br \/>\r<br>Which of the following pieces of information should he include in this memorandum?<\/div><input type='hidden' name='question_id[]' id='qID_57' value='229714' \/><input type='hidden' id='answerType229714' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229714[]' id='answer-id-912484' class='answer   answerof-229714 ' value='912484'   \/><label for='answer-id-912484' id='answer-label-912484' class=' answer'><span>The information expected to be gained from the operation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229714[]' id='answer-id-912485' class='answer   answerof-229714 ' value='912485'   \/><label for='answer-id-912485' id='answer-label-912485' class=' answer'><span>The identities of any confidential sources to be used in the operation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229714[]' id='answer-id-912486' class='answer   answerof-229714 ' value='912486'   \/><label for='answer-id-912486' id='answer-label-912486' class=' answer'><span>His first impression regarding the subject's culpability<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229714[]' id='answer-id-912487' class='answer   answerof-229714 ' value='912487'   \/><label for='answer-id-912487' id='answer-label-912487' class=' answer'><span>All of the above<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-58' style=';'><div id='questionWrap-58'  class='   watupro-question-id-229715'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>58. <\/span>Which of the following would be MOST USEFUL m determining who created a specrfic document file?<\/div><input type='hidden' name='question_id[]' id='qID_58' value='229715' \/><input type='hidden' id='answerType229715' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229715[]' id='answer-id-912488' class='answer   answerof-229715 ' value='912488'   \/><label for='answer-id-912488' id='answer-label-912488' class=' answer'><span>Operating system partition<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229715[]' id='answer-id-912489' class='answer   answerof-229715 ' value='912489'   \/><label for='answer-id-912489' id='answer-label-912489' class=' answer'><span>Internet activity data<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229715[]' id='answer-id-912490' class='answer   answerof-229715 ' value='912490'   \/><label for='answer-id-912490' id='answer-label-912490' class=' answer'><span>The system log<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229715[]' id='answer-id-912491' class='answer   answerof-229715 ' value='912491'   \/><label for='answer-id-912491' id='answer-label-912491' class=' answer'><span>The document's metadata<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-59' style=';'><div id='questionWrap-59'  class='   watupro-question-id-229716'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>59. <\/span>Which of the following statements about the process of obtaining a verbal confession is TRUE?<\/div><input type='hidden' name='question_id[]' id='qID_59' value='229716' \/><input type='hidden' id='answerType229716' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229716[]' id='answer-id-912492' class='answer   answerof-229716 ' value='912492'   \/><label for='answer-id-912492' id='answer-label-912492' class=' answer'><span>The only acceptable approaches to obtaining a verbal confession are chronologically or by transaction<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229716[]' id='answer-id-912493' class='answer   answerof-229716 ' value='912493'   \/><label for='answer-id-912493' id='answer-label-912493' class=' answer'><span>The transition from the accusation to the confession should occur when the accused supplies the first detailed information about the offense.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229716[]' id='answer-id-912494' class='answer   answerof-229716 ' value='912494'   \/><label for='answer-id-912494' id='answer-label-912494' class=' answer'><span>If the subject lies about an aspect of the offense in the process of confessing, it is best to correct the records immediately before proceeding<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229716[]' id='answer-id-912495' class='answer   answerof-229716 ' value='912495'   \/><label for='answer-id-912495' id='answer-label-912495' class=' answer'><span>Fraudsters tend to overestimate the amount of funds involved in the offense to relieve themselves of the guilt of their dishonest actions.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-60' style=';'><div id='questionWrap-60'  class='   watupro-question-id-229717'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>60. <\/span>Assuming that a jurisdiction has prohibited pretexting against financial institutions, which of the following actions would constitute illegal pretexting?<\/div><input type='hidden' name='question_id[]' id='qID_60' value='229717' \/><input type='hidden' id='answerType229717' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229717[]' id='answer-id-912496' class='answer   answerof-229717 ' value='912496'   \/><label for='answer-id-912496' id='answer-label-912496' class=' answer'><span>Intentionally making false statements on loan applications<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229717[]' id='answer-id-912497' class='answer   answerof-229717 ' value='912497'   \/><label for='answer-id-912497' id='answer-label-912497' class=' answer'><span>Stealing a person's mail lo obtain the person's bank account number<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229717[]' id='answer-id-912498' class='answer   answerof-229717 ' value='912498'   \/><label for='answer-id-912498' id='answer-label-912498' class=' answer'><span>Impersonating an account holder to access their bank records<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-229717[]' id='answer-id-912499' class='answer   answerof-229717 ' value='912499'   \/><label for='answer-id-912499' id='answer-label-912499' class=' answer'><span>Setting up a bank account in an assumed name<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div style='display:none' id='question-61'>\n\t<div class='question-content'>\n\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\" alt=\"Loading...\" title=\"Loading...\" \/>&nbsp;Loading...\t<\/div>\n<\/div>\n\n<br \/>\n\t\n\t\t\t<div class=\"watupro_buttons flex \" id=\"watuPROButtons6493\" >\n\t\t  <div id=\"prev-question\" style=\"display:none;\"><input type=\"button\" value=\"&lt; Previous\" onclick=\"WatuPRO.nextQuestion(event, 'previous');\"\/><\/div>\t\t  \t\t  \t\t   \n\t\t   \t  \t\t<div><input type=\"button\" name=\"action\" class=\"watupro-submit-button\" onclick=\"WatuPRO.submitResult(event)\" id=\"action-button\" value=\"View Results\"  \/>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\n\t<input type=\"hidden\" name=\"quiz_id\" value=\"6493\" id=\"watuPROExamID\"\/>\n\t<input type=\"hidden\" name=\"start_time\" id=\"startTime\" value=\"2026-04-15 16:47:02\" \/>\n\t<input type=\"hidden\" name=\"start_timestamp\" id=\"startTimeStamp\" value=\"1776271622\" \/>\n\t<input type=\"hidden\" name=\"question_ids\" value=\"\" \/>\n\t<input type=\"hidden\" name=\"watupro_questions\" value=\"229658:912266,912267,912268,912269 | 229659:912270,912271,912272,912273 | 229660:912274,912275 | 229661:912276,912277,912278,912279 | 229662:912280,912281,912282,912283 | 229663:912284,912285,912286,912287 | 229664:912288,912289,912290,912291 | 229665:912292,912293,912294,912295 | 229666:912296,912297,912298,912299 | 229667:912300,912301,912302,912303 | 229668:912304,912305,912306,912307 | 229669:912308,912309,912310,912311 | 229670:912312,912313,912314,912315 | 229671:912316,912317,912318,912319 | 229672:912320,912321 | 229673:912322,912323 | 229674:912324,912325,912326,912327 | 229675:912328,912329,912330,912331 | 229676:912332,912333,912334,912335 | 229677:912336,912337,912338,912339 | 229678:912340,912341,912342,912343 | 229679:912344,912345,912346,912347 | 229680:912348,912349,912350,912351 | 229681:912352,912353,912354,912355 | 229682:912356,912357,912358,912359 | 229683:912360,912361,912362,912363 | 229684:912364,912365,912366,912367 | 229685:912368,912369,912370,912371 | 229686:912372,912373,912374,912375 | 229687:912376,912377,912378,912379 | 229688:912380,912381,912382,912383 | 229689:912384,912385,912386,912387 | 229690:912388,912389,912390,912391 | 229691:912392,912393,912394,912395 | 229692:912396,912397,912398,912399 | 229693:912400,912401,912402,912403 | 229694:912404,912405,912406,912407 | 229695:912408,912409,912410,912411 | 229696:912412,912413,912414,912415 | 229697:912416,912417,912418,912419 | 229698:912420,912421,912422,912423 | 229699:912424,912425,912426,912427 | 229700:912428,912429,912430,912431 | 229701:912432,912433,912434,912435 | 229702:912436,912437,912438,912439 | 229703:912440,912441,912442,912443 | 229704:912444,912445,912446,912447 | 229705:912448,912449,912450,912451 | 229706:912452,912453,912454,912455 | 229707:912456,912457,912458,912459 | 229708:912460,912461,912462,912463 | 229709:912464,912465,912466,912467 | 229710:912468,912469,912470,912471 | 229711:912472,912473,912474,912475 | 229712:912476,912477,912478,912479 | 229713:912480,912481,912482,912483 | 229714:912484,912485,912486,912487 | 229715:912488,912489,912490,912491 | 229716:912492,912493,912494,912495 | 229717:912496,912497,912498,912499\" \/>\n\t<input type=\"hidden\" name=\"no_ajax\" value=\"0\">\t\t\t<\/form>\n\t<p>&nbsp;<\/p>\n<\/div>\n\n<script type=\"text\/javascript\">\n\/\/jQuery(document).ready(function(){\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \t\nvar question_ids = \"229658,229659,229660,229661,229662,229663,229664,229665,229666,229667,229668,229669,229670,229671,229672,229673,229674,229675,229676,229677,229678,229679,229680,229681,229682,229683,229684,229685,229686,229687,229688,229689,229690,229691,229692,229693,229694,229695,229696,229697,229698,229699,229700,229701,229702,229703,229704,229705,229706,229707,229708,229709,229710,229711,229712,229713,229714,229715,229716,229717\";\nWatuPROSettings[6493] = {};\nWatuPRO.qArr = question_ids.split(',');\nWatuPRO.exam_id = 6493;\t    \nWatuPRO.post_id = 44042;\nWatuPRO.store_progress = 0;\nWatuPRO.curCatPage = 1;\nWatuPRO.requiredIDs=\"0\".split(\",\");\nWatuPRO.hAppID = \"0.51547600 1776271622\";\nvar url = \"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/show_exam.php\";\nWatuPRO.examMode = 1;\nWatuPRO.siteURL=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-admin\/admin-ajax.php\";\nWatuPRO.emailIsNotRequired = 0;\nWatuPROIntel.init(6493);\nWatuPRO.inCategoryPages=1;});    \t \n<\/script>\n\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11529,11530],"tags":[11531,11532,11533,11536],"class_list":["post-44042","post","type-post","status-publish","format-standard","hentry","category-acfe","category-certified-fraud-examiner","tag-cfe-investigation","tag-cfe-investigation-dumps","tag-cfe-investigation-exam-dumps","tag-cfe-investigation-free-dumps"],"_links":{"self":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/44042","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/comments?post=44042"}],"version-history":[{"count":2,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/44042\/revisions"}],"predecessor-version":[{"id":44046,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/44042\/revisions\/44046"}],"wp:attachment":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/media?parent=44042"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/categories?post=44042"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/tags?post=44042"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}