Jackson, a Certified Fraud Examiner (CFE), is analyzing Elm Company’s accounts payable data to identify anomalies that might indicate fraud. Which of the following is the MOST EFFECTIVE data analysis function that Jackson could use to look for potential fraud in accounts payable?
Correct Answer:
B
🗳️
Which of the following BEST describes the data analytics approach known as predictive analytics?
Correct Answer:
B
🗳️
Jade, a Certified Fraud Examiner (CFE), is conducting an internal investigation in which an employee is suspected of stealing inventory and selling it through a possible shell company called Hidden Finds, LLC. When Jade tries to check Hidden Finds’ website, a message appears that redirects customers to a web address that ends with .onion. To view the website’s consent, Jade will need to install a specialized web browser that enables her to access which of the following?
Correct Answer:
B
🗳️
Which of the following is NOT a common use of public sources of information?
Correct Answer:
A
🗳️