Which of the following are query words or symbols used in search engine queries to
instruct search engines to perform special actions when executing a search?
A. Limiting factors
B. Expansion numerals
C. Boolean operators
D. Search fields - answerC. Boolean operators
Boolean operators (or advanced search operators) are query words or symbols used in
search engine queries to instruct search engines to perform special actions when
executing a search.
Under the U.S. Fair Credit Reporting Act, an employer does not need an employee's
consent to access the employee's credit report if the report is obtained as part of an
investigation into suspected misconduct by the employee.
A. True
B. False - answerA. True
Which of the following is a limitation of Benford's Law?
A. Benford's Law cannot be applied to data sets with non-natural numbers, such as
check or invoice numbers.
B. Benford's Law only works on data sets with assigned numbers, such as bank
account or telephone numbers.
C. Benford's Law applies best to data sets with three-digit numbers.
D. Benford's Law can only be applied to data sets listed in currency amounts. -
answerA. Benford's Law cannot be applied to data sets with non-natural numbers, such
as check or invoice numbers.
Natural numbers are those numbers that are not ordered in a particular numbering
scheme and are not human-generated or generated from a random number system.
Non-natural numbers (e.g., employee identification numbers and telephone numbers)
are designed systematically to convey information that restricts the natural nature of the
number.
Which of the following is a type of information that can be obtained from the deep Web?
A. An old version of a Web page that has since been updated
B. An archived version of a Web page that is no longer online
C. Websites without any links pointing to them
D. Web content indexed by standard search engines - answerC. Websites without any
links pointing to them
A photo posted on a website that has been removed
Content, views, writing, and opinions rescinded by an author
, A company's old job ads, statements, affiliations, or product lines
Which of the following statements concerning the U.S. Health Insurance Portability and
Accountability Act (HIPAA) is FALSE?
A. In many situations, HIPAA restricts access to a patient's health information held by
providers without the patient's written consent.
B. If information about an employee's health or payment for medical services becomes
an issue, fraud examiners should immediately contact human resources.
C. Under HIPAA, protected health information can include information about past,
present, or future health services.
D. HIPAA defines protected health information as diagnoses and health conditions, but
does not cover payment information. - answerD. HIPAA defines protected health
information as diagnoses and health conditions, but does not cover payment
information.
Which of the following is TRUE about using computer-created metadata in forensic
investigations?
A. Metadata information can help determine when a document was created
B. Metadata information can help determine who received a document
C. Metadata information can help determine who wrote a document
D. All of the above - answerD. All of the above
Metadata information can help determine who wrote a document; who received,
opened, copied, edited, moved, or printed the document; and when these events
occurred.
Which of the following is the most accurate statement about trying to locate a subject
using online records?
A. Online records are generally not useful in locating subjects whose address is
unknown.
B. If an individual has moved, obtaining a past address is usually of no help.
C. Obtaining a past address of the subject should be the first step in trying to locate a
subject using online records.
D. Efforts to locate a subject using online records should begin with a search of the
suspect's vehicle records. - answerC. Obtaining a past address of the subject should be
the first step in trying to locate a subject using online records.
Why would a fraud examiner perform duplicate testing on data?
A. To identify transactions with matching values in the same field
B. To determine whether company policies are met by employee transactions
C. To identify missing items in a sequence or series
D. To determine the relationship among different variables in raw data - answerA. To
identify transactions with matching values in the same field
For example, a fraud examiner would expect fields such as check numbers, invoice
numbers, and government identification numbers to contain only unique values within a