Quiz-summary
0 of 30 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
Information
Premium Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- Answered
- Review
-
Question 1 of 30
1. Question
What are individuals who specialize in identifying, recovering, collecting, preserving, processing, and producing digital data for use in investigations and litigation known as?
Correct
Individuals who specialize in identifying, recovering, collecting, preserving, processing, and producing digital data for use in investigations and litigation are known as digital forensic experts. Fraud examiners would determine whether a digital forensic expert is needed when conducting an examination involving computers.
Incorrect
Individuals who specialize in identifying, recovering, collecting, preserving, processing, and producing digital data for use in investigations and litigation are known as digital forensic experts. Fraud examiners would determine whether a digital forensic expert is needed when conducting an examination involving computers.
-
Question 2 of 30
2. Question
A peripheral device is an auxiliary device that is connected to, but not part of, a host computer. Which of the following is not an example of a peripheral device?
Correct
A peripheral device is an auxiliary device that is connected to, but not part of, a host computer. Peripheral devices include printers, fax machines, copiers, scanners, and storage devices. As data moves to and from peripheral devices, it leaves evidence of its presence and sometimes leaves full copies of its contents.
Incorrect
A peripheral device is an auxiliary device that is connected to, but not part of, a host computer. Peripheral devices include printers, fax machines, copiers, scanners, and storage devices. As data moves to and from peripheral devices, it leaves evidence of its presence and sometimes leaves full copies of its contents.
-
Question 3 of 30
3. Question
Many printers have internal hard drives that could contain information relevant to a fraud examination. Generally, any information sent to and stored by a printer is recoverable. When is information sent to and stored by a printer no longer recoverable?
Correct
Printers might contain valuable evidence. Many printers have internal hard drives that could contain information relevant to a fraud examination. Generally, any information sent to and stored by a printer is recoverable unless the printer has overwritten the data.
Incorrect
Printers might contain valuable evidence. Many printers have internal hard drives that could contain information relevant to a fraud examination. Generally, any information sent to and stored by a printer is recoverable unless the printer has overwritten the data.
-
Question 4 of 30
4. Question
Organizations and individuals are increasingly storing data and applications on the cloud. What statement best describes the term “cloud storage?”
Correct
Cloud storage refers to information stored by a third-party host that is accessible online. The cloud is a metaphor for the storage and utilization of data online rather than locally.
Incorrect
Cloud storage refers to information stored by a third-party host that is accessible online. The cloud is a metaphor for the storage and utilization of data online rather than locally.
-
Question 5 of 30
5. Question
Cloud computing offers numerous benefits. Which of the following is least likely to be an advantage of storing data and applications on the cloud?
Correct
Cloud computing offers numerous benefits. These benefits include the following:
– The cloud can provide savings on hardware, software, or licensing fees.
– Cloud services offer a cost-effective alternative to building out IT infrastructure.
– The cloud improves accessibility because users can access the cloud anytime and anywhere.
– With cloud computing, organizations can easily scale information technology resources up or down to suit their business needs.Incorrect
Cloud computing offers numerous benefits. These benefits include the following:
– The cloud can provide savings on hardware, software, or licensing fees.
– Cloud services offer a cost-effective alternative to building out IT infrastructure.
– The cloud improves accessibility because users can access the cloud anytime and anywhere.
– With cloud computing, organizations can easily scale information technology resources up or down to suit their business needs. -
Question 6 of 30
6. Question
Information relevant to a fraud examination might be stored in the cloud. Which of the following is the most likely reason why fraudsters might save records or other key evidence to cloud storage?
Correct
Virtually anything that can be stored on a hard drive can be uploaded to the cloud. Accordingly, information relevant to a fraud examination might be stored in the cloud. Fraudsters might save records or other key evidence to cloud storage in order to avoid possessing a copy on their own storage devices, therefore, fraud examiners would need to search these places, if possible.
Incorrect
Virtually anything that can be stored on a hard drive can be uploaded to the cloud. Accordingly, information relevant to a fraud examination might be stored in the cloud. Fraudsters might save records or other key evidence to cloud storage in order to avoid possessing a copy on their own storage devices, therefore, fraud examiners would need to search these places, if possible.
-
Question 7 of 30
7. Question
Fraudsters might save records or other key evidence to cloud storage to avoid possessing a copy on their own storage devices. Which of the following is least likely to be a way of finding out if a suspect uses cloud storage to store information?
Correct
Determining whether a subject uses cloud storage can be done by searching for payments made to cloud services, browser history (for types of cloud storage accessed via browsers), smartphone applications linked to cloud services, or making a request through discovery in litigation.
Incorrect
Determining whether a subject uses cloud storage can be done by searching for payments made to cloud services, browser history (for types of cloud storage accessed via browsers), smartphone applications linked to cloud services, or making a request through discovery in litigation.
-
Question 8 of 30
8. Question
Investigations involving computers typically involve certain phases. Which of the following is not one of the phases that make up the process for conducting investigations involving computers?
Correct
Investigations involving computer forensics typically involve the following phases: Planning, seizing, imaging, processing, analyzing, reporting and testifying.
Incorrect
Investigations involving computer forensics typically involve the following phases: Planning, seizing, imaging, processing, analyzing, reporting and testifying.
-
Question 9 of 30
9. Question
During the planning phase of investigations involving computers, the fraud examiner needs to take certain steps. Which of the following is least likely to be a step involved in the planning phase of computer forensics for investigations involving computers?
Correct
Before the fraud examiner can seize evidence, he must take certain steps to help ensure that the evidence will be admissible. These steps involved in the planning phase of investigations involving computers include:
– Determining whether there are any privacy interests in the item(s) to be searched.
– Making appropriate preparations if the investigation involves the use of a legal order.
– Ensuring that all equipment used in a forensic capacity is legitimate and reliable.
– Ensuring that the fraud examiner is properly trained to employ relevant digital forensic tools.
– Ensuring that equipment is employed in the manner for which it was designed.Incorrect
Before the fraud examiner can seize evidence, he must take certain steps to help ensure that the evidence will be admissible. These steps involved in the planning phase of investigations involving computers include:
– Determining whether there are any privacy interests in the item(s) to be searched.
– Making appropriate preparations if the investigation involves the use of a legal order.
– Ensuring that all equipment used in a forensic capacity is legitimate and reliable.
– Ensuring that the fraud examiner is properly trained to employ relevant digital forensic tools.
– Ensuring that equipment is employed in the manner for which it was designed. -
Question 10 of 30
10. Question
What statement best describes the term “fraud examination?”
Correct
Fraud examination refers to a process of resolving allegations of fraud from inception to disposition. Fraud examination is the primary function of the anti-fraud professional. Fraud examinations are conducted to determine if fraud has occurred and if so to gather evidence of the crime.
Incorrect
Fraud examination refers to a process of resolving allegations of fraud from inception to disposition. Fraud examination is the primary function of the anti-fraud professional. Fraud examinations are conducted to determine if fraud has occurred and if so to gather evidence of the crime.
-
Question 11 of 30
11. Question
The fraud examination process involves a variety of tasks. Which of the following is least likely to be a task involved in fraud examination?
Correct
The fraud examination process involves a variety of tasks. These tasks include:
– Obtaining evidence.
– Taking statements and writing reports.
– Testifying to findings.
– Assisting in the detection and prevention of fraud.Incorrect
The fraud examination process involves a variety of tasks. These tasks include:
– Obtaining evidence.
– Taking statements and writing reports.
– Testifying to findings.
– Assisting in the detection and prevention of fraud. -
Question 12 of 30
12. Question
What name is given to the part of the cognitive interview in which the investigator seeks to track down who was involved and obtain specific details about the suspect?
Correct
The portion of the cognitive interview in which the investigator seeks to track down who was involved and obtain specific details about the suspect is known as the specific-detail phase. In this phase, the investigator seeks to get additional information about the event by asking the witness to describe the suspect with specific details.
Incorrect
The portion of the cognitive interview in which the investigator seeks to track down who was involved and obtain specific details about the suspect is known as the specific-detail phase. In this phase, the investigator seeks to get additional information about the event by asking the witness to describe the suspect with specific details.
-
Question 13 of 30
13. Question
When carrying out forensic handwriting examinations and comparisons, Which of the following types of writing samples are written by the individual during the everyday course of business?
Correct
A non-dictated writing sample includes materials that are written by the individual during the everyday course of business. Non-dictated writing tends to reveal an individual’s normal writing habits.
Incorrect
A non-dictated writing sample includes materials that are written by the individual during the everyday course of business. Non-dictated writing tends to reveal an individual’s normal writing habits.
-
Question 14 of 30
14. Question
What is the process that an organization uses to preserve all forms of potentially relevant information when litigation is pending or reasonably anticipated known as?
Correct
The steps that an organization takes to instruct employees not to delete or destroy potentially relevant records to a new or imminent legal case is known as a litigation hold. Litigation hold procedures are necessary to ensure that potentially responsive documents are not destroyed once evidence of misconduct arises.
Incorrect
The steps that an organization takes to instruct employees not to delete or destroy potentially relevant records to a new or imminent legal case is known as a litigation hold. Litigation hold procedures are necessary to ensure that potentially responsive documents are not destroyed once evidence of misconduct arises.
-
Question 15 of 30
15. Question
What is the form that documents the fact that permission was given to the fraud examiner by an individual to record specific conversations called?
Correct
The form that documents the fact that permission was given to the fraud examiner by an individual to record specific conversations is known as the consent to record form. The consent to record form must be signed and witnessed.
Incorrect
The form that documents the fact that permission was given to the fraud examiner by an individual to record specific conversations is known as the consent to record form. The consent to record form must be signed and witnessed.
-
Question 16 of 30
16. Question
Which of the following are documents that a governmental agency is required to keep by law or that are necessary to discharge the duties imposed by law?
Correct
Documents that a governmental agency is required to keep by law or that are necessary to discharge the duties imposed by law are known as public records. Public records can be accessed by the general public and therefore, are available to anyone who wishes to use them.
Incorrect
Documents that a governmental agency is required to keep by law or that are necessary to discharge the duties imposed by law are known as public records. Public records can be accessed by the general public and therefore, are available to anyone who wishes to use them.
-
Question 17 of 30
17. Question
Fraud examiners use different techniques when trying to gather relevant information from various sources, some of which require legal authorization while others do not. Which of the following techniques of gathering information does not require legal authorization?
Correct
Once a fraud examiner has basic information about the subject, he can use it to search public records and gain information to trace the transactions. He can gather relevant information from various sources including online sources, government agency databases, public databases, and the use of other special investigative techniques. Some techniques might not require legal authorization (e.g., physical surveillance or witness interviews), while others might (e.g., electronic surveillance, search and seizure orders, legal orders to produce information, or account monitoring orders).
Incorrect
Once a fraud examiner has basic information about the subject, he can use it to search public records and gain information to trace the transactions. He can gather relevant information from various sources including online sources, government agency databases, public databases, and the use of other special investigative techniques. Some techniques might not require legal authorization (e.g., physical surveillance or witness interviews), while others might (e.g., electronic surveillance, search and seizure orders, legal orders to produce information, or account monitoring orders).
-
Question 18 of 30
18. Question
What statement best describes chronemic communication?
Correct
Chronemic communication is the use of time in nonverbal communication and interpersonal relationships to convey meaning, attitudes, and desires. Chronemics is a type of communication where time is used as a message system, including punctuality, amount of time spent with another, and waiting time.
Incorrect
Chronemic communication is the use of time in nonverbal communication and interpersonal relationships to convey meaning, attitudes, and desires. Chronemics is a type of communication where time is used as a message system, including punctuality, amount of time spent with another, and waiting time.
-
Question 19 of 30
19. Question
Which of the following interview techniques involves the act of remaining quiet and waiting for a respondent to continue?
Correct
The silent probe is a technique that involves just remaining quiet and waiting for a respondent to continue. The silent probe sometimes produces more information than direct questioning does.
Incorrect
The silent probe is a technique that involves just remaining quiet and waiting for a respondent to continue. The silent probe sometimes produces more information than direct questioning does.
-
Question 20 of 30
20. Question
What statement best describes kinetic communication?
Correct
Kinetic communication involves the use of body movement to convey meaning. Interviewers tend to focus attention on the face. Interviewers are more accurate in their judgments of others if they can see facial movements and expressions.
Incorrect
Kinetic communication involves the use of body movement to convey meaning. Interviewers tend to focus attention on the face. Interviewers are more accurate in their judgments of others if they can see facial movements and expressions.
-
Question 21 of 30
21. Question
What is the term given to an outline of the course of action that the team members expect to take throughout the fraud investigation?
Correct
An outline of the course of action the team members expect to take throughout the fraud investigation is called a case plan. Establishing a case plan helps the team stay on track and focus on the key issues.
Incorrect
An outline of the course of action the team members expect to take throughout the fraud investigation is called a case plan. Establishing a case plan helps the team stay on track and focus on the key issues.
-
Question 22 of 30
22. Question
What statement best describes a chronological investigation?
Correct
A chronological investigation is divided into time-based phases that, when completed, are marked as milestones. A chronological structure is best suited for investigations where time sequence is essential in organizing tasks.
Incorrect
A chronological investigation is divided into time-based phases that, when completed, are marked as milestones. A chronological structure is best suited for investigations where time sequence is essential in organizing tasks.
-
Question 23 of 30
23. Question
What name is given to documents that suddenly appear from nowhere, that are favorable to the suspect and refute previously developed information or evidence that is damaging to the suspect?
Correct
Alibi documents suddenly appear “from out of nowhere,” and they often appear late in the course of an investigation, inquiry, or trial. They are always favorable to the suspect and refute previously developed information or evidence that is damaging to the suspect. Alibi documents are often fabricated.
Incorrect
Alibi documents suddenly appear “from out of nowhere,” and they often appear late in the course of an investigation, inquiry, or trial. They are always favorable to the suspect and refute previously developed information or evidence that is damaging to the suspect. Alibi documents are often fabricated.
-
Question 24 of 30
24. Question
To add credibility to forged documents, fraudsters backdate them. What is the name used to refer to items located at a time when they could not have existed or occurred?
Correct
Often, to add credibility to forged documents, fraudsters backdate them. Items located at a time when they could not have existed or occurred are referred to as anachronisms. To determine whether contemporary documents were backdated, experts usually rely on diligent investigation and forensic document examiners.
Incorrect
Often, to add credibility to forged documents, fraudsters backdate them. Items located at a time when they could not have existed or occurred are referred to as anachronisms. To determine whether contemporary documents were backdated, experts usually rely on diligent investigation and forensic document examiners.
-
Question 25 of 30
25. Question
An interviewer in some cases, would use body language to create the impression of trust during an interview. Techniques an interviewer would use to achieve this include the following except for which one?
Correct
An interviewer could use body language to create the impression of trust during the interview by gesturing openly with the arms, clasping hands together, and leaning forward in a manner to indicate interest.
Incorrect
An interviewer could use body language to create the impression of trust during the interview by gesturing openly with the arms, clasping hands together, and leaning forward in a manner to indicate interest.
-
Question 26 of 30
26. Question
The evidence gathered during a fraud investigation is normally marked for easy identification later. Which of the following is the most common method of marking evidence?
Correct
The most common method of marking evidence is with the date and initials of the person obtaining it. To aid later easy identification of evidence, all Evidence received is normally marked.
Incorrect
The most common method of marking evidence is with the date and initials of the person obtaining it. To aid later easy identification of evidence, all Evidence received is normally marked.
-
Question 27 of 30
27. Question
When obtaining evidence to be used for a fraud examination, the evidence is gotten in different forms. Which of the following is least likely to be a form in which evidence can be obtained?
Correct
Evidence of fraud is usually obtained in different forms. Evidence of fraud can come in the form of documents, physical evidence, or in the form of statements by witnesses.
Incorrect
Evidence of fraud is usually obtained in different forms. Evidence of fraud can come in the form of documents, physical evidence, or in the form of statements by witnesses.
-
Question 28 of 30
28. Question
What statement best describes the short form engagement letter?
Correct
The short form engagement letter is the form of an engagement letter that does not spell out the details of what examination techniques the fraud examiner intends to follow.
Incorrect
The short form engagement letter is the form of an engagement letter that does not spell out the details of what examination techniques the fraud examiner intends to follow.
-
Question 29 of 30
29. Question
What statement best describes the type of digital forensic experts known as operating and file system experts?
Correct
Operating and file system experts are proficient in certain operating systems and the various file systems they employ. Operating and file systems experts also have the ability to convey operational characteristics and observe artifacts.
Incorrect
Operating and file system experts are proficient in certain operating systems and the various file systems they employ. Operating and file systems experts also have the ability to convey operational characteristics and observe artifacts.
-
Question 30 of 30
30. Question
Which of the following refers to the type of digital forensic experts that specialize in extracting information from tapes, digital media, or other system backups?
Correct
Backup solutions archive data in proprietary formats, making extraction very cumbersome. Experts that specialize in extracting information from tapes, digital media, or other system backups are referred to as recording and archival extraction experts.
Incorrect
Backup solutions archive data in proprietary formats, making extraction very cumbersome. Experts that specialize in extracting information from tapes, digital media, or other system backups are referred to as recording and archival extraction experts.