Which of the following is a unique challenge of cloud forensics that is not encountered in traditional forensic practices?
Answer : C
If the following statements were included in a fraud examination report of a qualified expert, which of them would be IMPROPER?
Answer : D
A law enforcement officer receives a reliable tip form an informant that a government employee is soliciting bribes in exchange for awarding contracts to the employee’s agency. To investigate, the officer poses as a potential contractor and contacts the suspect employee about the possibility of getting a contract with the agency. In the course of the conversation, the suspect demands a cash payment for the officer to be considered for upcoming contracts. If the suspect claims entrapment at trial, then which of the following is MOST LIKELY to occur?
Answer : A
Which of the following is NOT a function of a fraud examination report?
Answer : D
Jackson, a digital forensic examiner for a government agency, is conducting a criminal investigation into the alleged embezzlement of funds from the government’s Welfare Department (WD). Ginny, a WD employee, is the prime suspect. Jackson obtains a court order authorizing him to seize Ginny’s personal computer for forensic examination. Which of the following is the MOST ACCURATE statement?
Answer : A
Which of the following is the MOST ACCURATE statement about trying to locate a subject using online records?
Answer : D
Which of the following data analysis functions is used to determine whether company policies are met by employee transactions, such as verifying that traveling employees book their accommodations at approved hotels?
Answer : B
Which of the following statements about fraud response plans is FALSE?
Answer : C
Which of the following is the LEAST ACCURATE statement about seizing a computer for examination?
Answer : D
Marilyn, a Certified Fraud Examiner (CFE), is reasonably sure that Shelly, her primary suspect, committed the fraud in question. Before scheduling an admission-seeking interview with Shelly, Marilyn should be reasonably sure of all of the following EXCEPT:
Answer : D
Gunn, a Certified Fraud Examiner (CFE), was hired to trace Kelly’s financial transactions. During his investigation, Gunn obtains records of electronic payments that Kelly made during the past three years. Which of the following are these records MOST LIKELY to reveal?
Answer : D
If an important witness becomes hostile and argumentative during an interview, the interviewer should generally:
Answer : A
Leslie, a fraud examiner for ACME Corporation, suspects that a salesperson for another company has defrauded ACME. Leslie wants to obtain a copy of the suspect individual’s credit report and personal data from a third-party information broker. If Leslie works in a jurisdiction that regulates the distribution of personal credit information, she generally can obtain the information if she has the consent of the individual.
Answer : B
Beta, a Certified Fraud Examiner (CFE), is conducting an admission-seeking interview of Delta, a fraud suspect. In establishing a rationalization, Beta says to Delta, “I know you didn’t do this for yourself, it was for your family. “This technique seeks to establish rationalization by:
Answer : A
If you are seizing a computer for forensic analysis, why is it generally necessary to seize any copiers connected to it?
Answer : D
Have any questions or issues ? Please dont hesitate to contact us