CFE Exam- Investigations Questions And Answers Rated A+
Which of the following are query words or symbols used in search engine queries to instruct search engines to perform special actions when executing a search? A. Limiting factors B. Expansion numerals C. Boolean operators D. Search fields - Answer-C. Boolean operators Boolean operators (or advanced search operators) are query words or symbols used in search engine queries to instruct search engines to perform special actions when executing a search. Under the U.S. Fair Credit Reporting Act, an employer does not need an employee's consent to access the employee's credit report if the report is obtained as part of an investigation into suspected misconduct by the employee. A. True B. False - Answer-A. True Which of the following is a limitation of Benford's Law? A. Benford's Law cannot be applied to data sets with non-natural numbers, such as check or invoice numbers. B. Benford's Law only works on data sets with assigned numbers, such as bank account or telephone numbers. C. Benford's Law applies best to data sets with three-digit numbers. D. Benford's Law can only be applied to data sets listed in currency amounts. - Answer-A. Benford's Law cannot be applied to data sets with non-natural numbers, such as check or invoice numbers. Natural numbers are those numbers that are not ordered in a particular numbering scheme and are not human-generated or generated from a random number system. Non-natural numbers (e.g., employee identification numbers and telephone numbers) are designed systematically to convey information that restricts the natural nature of the number.Which of the following is a type of information that can be obtained from the deep Web? A. An old version of a Web page that has since been updated B. An archived version of a Web page that is no longer online C. Websites without any links pointing to them D. Web content indexed by standard search engines - Answer-C. Websites without any links pointing to them A photo posted on a website that has been removed Content, views, writing, and opinions rescinded by an author A company's old job ads, statements, affiliations, or product lines Which of the following statements concerning the U.S. Health Insurance Portability and Accountability Act (HIPAA) is FALSE? A. In many situations, HIPAA restricts access to a patient's health information held by providers without the patient's written consent. B. If information about an employee's health or payment for medical services becomes an issue, fraud examiners should immediately contact human resources. C. Under HIPAA, protected health information can include information about past, present, or future health services. D. HIPAA defines protected health information as diagnoses and health conditions, but does not cover payment information. - Answer-D. HIPAA defines protected health information as diagnoses and health conditions, but does not cover payment information. Which of the following is TRUE about using computer-created metadata in forensic investigations? A. Metadata information can help determine when a document was created B. Metadata information can help determine who received a document C. Metadata information can help determine who wrote a document D. All of the above - Answer-D. All of the above Metadata information can help determine who wrote a document; who received, opened, copied, edited, moved, or printed the document; and when these events occurred.Which of the following is the most accurate statement about trying to locate a subject using online records? A. Online records are generally not useful in locating subjects whose address is unknown. B. If an individual has moved, obtaining a past address is usually of no help. C. Obtaining a past address of the subject should be the first step in trying to locate a subject using online records. D. Efforts to locate a subject using online records should begin with a search of the suspect's vehicle records. - Answer-C. Obtaining a past address of the subject should be the first step in trying to locate a subject using online records. Why would a fraud examiner perform duplicate testing on data? A. To identify transactions with matching values in the same field B. To determine whether company policies are met by employee transactions C. To identify missing items in a sequence or series D. To determine the relationship among different variables in raw data - Answer-A. To identify transactions with matching values in the same field For example, a fraud examiner would expect fields such as check numbers, invoice numbers, and government identification numbers to contain only unique values within a data set; searching for duplicates within these fields can help the fraud examiner find anomalies that merit further examination. In interviews involving anxiety and uncertainty, individuals might perform displacement activities that reduce nervousness. These types of displacement activities are known as: A. Paralinguistics B. Illustrators C. Manipulators D. Norming - Answer-C. Manipulators
Written for
- Institution
- CFE - Investigations
- Course
- CFE - Investigations
Document information
- Uploaded on
- May 8, 2024
- Number of pages
- 17
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
Also available in package deal