Sei sulla pagina 1di 19

CHAPTER4 A company's control environment includes:

a) the tone that management establishes


People will often be dishonest if they are placed towards what is honest and acceptable
in an environment of: behavior
a) poor controls
b) corporate hiring practices
b) high pressure c) having an internal audit department
c) low integrity d) all of the above
d) loose accountability
e) all of the above d) all of the above

e) all of the above Which of the following factors generally results


in a high-fraud environment?
Which of the following factors contribute to a) hiring honest people
creating a corporate culture of honesty and b) providing an EAP
openness? c) autocratic management
a) hiring honest people
d) both a and b
b) performing criminal background checks
c) not having an open-door policy c) autocratic management
d) having well-understood and respected code
of ethics Which of the following aspects of fraud usually
e) both a and d results in the largest savings?
a) fraud prevention
f) all of the above
b) fraud detection
e) both a and d c) fraud investigation
d) it is impossible to tell
Which of the following personnel and operating
policies contribute to high-fraud environments? a) fraud prevention
a) management by crisis
b) rigid rules Which of the following is usually the most
c) high employee lifestyle expectations effective tool in preventing and detecting
d) poor promotion opportunities fraud?
e) all of the above a) discouraging collusion between employees
and customers or vendors
e) all of the above b) effective investigations of fraud symptoms
c) having a good system of internal controls
The single most effective tool in preventing and d) creating an expectation of punishment in the
detecting fraud is usually: company
a) monitoring employees
b) having a good system of internal controls c) having a good system of internal controls
c) having a well-written company code of ethics
d) following strict hiring procedures Which of the following is the typical fraud
model that describes most firms?
b) having a good system of internal controls a) fraud incident, assessing risk, investigation,
reporting
b) fraud incident, investigation, action, Alerting vendors and contractors to company
resolution policies often result in:
c) assessing risk, fraud incident, investigation, a) loss of interest in the organization by vendors
resolution b) discovery of current frauds and the
d) assessing risk, investigation, implementing a prevention of future frauds
fraud program, reporting c) strained vendor/purchaser relationships
d) heightened incidence of recurrent reverse
b) fraud incident, investigation, action,
vendor frauds
resolution
b) discovery of current frauds and the
The "tone at the top" is an important element in prevention of future frauds
fighting fraud, which involves:
a) doing a good job of integrity risk assessment Even with the right opportunity or significant
b) having a positive organization where pressure, most people would probably not steal
effective fraud teaching and training is or embezzle.
conducted
c) setting a proper example or modeling false
appropriate management behavior Studies show that a positive and honest work
d) both b and c culture in a company does little to prevent
c) setting a proper example or modeling fraud.
appropriate management behavior false
Which of following is NOT a recognized method An important factor in creating a culture of
of eliminating fraud opportunities? honesty, openness, and assistance in the
a) having good internal controls workplace is maintaining an employee
b) monitoring employees assistance program.
c) creating an expectation of punishment
d) engendering employee goodwill by having lax true
rules
A good internal control system within a
d) engendering employee goodwill by having lax company can ensure the absence of fraud.
rules
false
Which of the following is NOT a reason
When fraud is committed, the problem is often
identified by Deloitte why whistle-blowing
not a lack of controls, but the overriding of
systems fail?
existing controls by management and others.
a) lack of anonymity
b) pressure to comply true
c) culture
d) lack of awareness The two elements in creating a positive work
environment are (1) having an open-door policy
b) pressure to comply and (2) having positive personnel and operating
procedures.
false

Not prosecuting fraud perpetrators is cost-


effective both in the short run and the long run.

false

Even a good system of internal controls will


often not be completely effective because of
fallibilities of the people applying and enforcing
the controls.

true

The increasingly complex nature of business


helps to decrease the number of collusive
frauds.

false

Tips and complaints are the most common way


fraud is detected.

true

The major role of employee assistance


programs is to help employees recover from the
damaging psychological effects of fraud.

false

Not all possible controls should be


implemented; rather, one must assess a
control's cost and benefits before
implementation.

true

Creating an expectation of punishment causes


firm morale to deteriorate and often results in
lower productivity.

false
CHAPTER5

Which of the following is true regarding fraud? In the three elements of fraud (theft act,
concealment, conversion), who is usually in the
a) it is easily identified best position to detect the fraud?
b) it is seldom observed a) co-workers and managers
c) when a fraud occurs, there is no question b) customers
whether or not a crime has been committed
c) owners
d) many witnesses are usually available when
fraud occurs d) vendors

b) it is seldom observed a) co-workers and managers

Which of the following is NOT a fraud symptom When a person commits a crime:
related to source documents?
a) he or she usually becomes engulfed by
a) duplicate payments emotions of fear and guilt

b) missing documents b) he or she will experience no changes in


behavior
c) a tip from an employee
c) he or she usually becomes friendly and nice
d) photocopied documents
d) he or she experiences a lower stress level
c) a tip from an employee
a) he or she usually becomes engulfed by
emotions of fear and guilt
Which of the following is a fraud symptom
related to an internal control weakness?
Most people who commit fraud:
a) lack of proper authorization
a) use the embezzled funds to increase their
b) lack of independent checks savings account
c) inadequate accounting system b) give the embezzled funds to charity
d) lack of physical safeguards c) experience o change in their lifestyle
e) all of the above are fraud symptoms related d) use the embezzled funds to improve their
to internal controls lifestyle
e) all of the above are fraud symptoms related d) use the embezzled funds to improve their
to internal controls
lifestyle
Which of the following is NOT a reason why d) altering stock accounts
people are hesitant to come forward with
knowledge or suspicions of fraud? c) increase expenses

a) they often think that squealing on someone is


wrong Which of the following is NOT a fraud symptom
b) they fear reprisal for being a whistle-blower related to journal entries?

c) it is usually impossible to know for sure that a a) unexplained adjustments to receivables,


fraud is taking place payables, revenues, or expenses

d) people who report fraud are not rewarded b) journal entries that do not balance
monetarily c) journal entries without documentary support
d) people who report fraud are not rewarded d) journal entries made near the beginning of
monetarily accounting periods

d) journal entries made near the beginning of


Which of the following is NOT one of the accounting periods
categories of employee fraud symptoms?

a) accounting anomalies Which of the following is NOT a common


b) analytical anomalies internal fraud symptom or problem?

c) tips and complaints a) lack of segregation of duties

b) unexplained adjustments to receivables,


d) firm structure
payables, revenues, or expenses
d) firm structure
c) lack of independent checks

d) overriding of existing controls


Embezzlement of assets reduced the left side of
the accounting equation. To conceal the theft, b) unexplained adjustments to receivables,
the embezzler must find a way to reduce the payables, revenues, or expenses
right side of the accounting equation. A
perpetrator would most likely reduce the right
side of the equation by: Once in a while, someone commits fraud or
another crime and does not feel stress. Such
a) reducing accounts payable people are referred to as:
b) paying dividends a) psychopathic
c) increase expenses b) altruistic
c) philanthropic d) increase expenses

d) magnanimous

a) psychopathic Which of the following is a common fraud


symptom relating to ledgers?

a) a ledger that does not balance


Fraud is usually detected by recognizing and
pursuing: b) a ledger that balances too perfectly

a) synonyms c) master account balances that do not equal


the sum of the individual customer or vendor
b) symptoms balances
c) equity d) both a and c
d) legends d) both a and c
b) symptoms

Which element is NOT a common element of


A letter is most likely to be fraudulent if: fraud?

a) it is signed by only one person a) concealment

b) it is addressed to an individual, rather than a b) coercion


department c) conversion
c) it is a photocopy of an original letter d) theft act
d) it is written on outdated company letterhead e) all of the above are common elements of
c) it is a photocopy of an original letter fraud

b) coercion

If a perpetrator has stolen assets, which of the


following is the easiest method for concealing
Analytical anomalies are present in every fraud.
the theft?
false
a) reduce liabilities (such as payables)

b) manipulate dividend or stock accounts


Recording an expense is a possible way to
c) increase other assets (such as receivables) conceal the theft of cash.
d) increase expenses true
A check is an example of a source document. Psychopaths feel no guilt because they have no
conscience.
true
true

Internal control weaknesses give employees


opportunities to commit fraud. It is safe to assume that fraud has not occurred
if one or more elements of the fraud triangle
true cannot be observed.

false
The internal control system of an organization is
comprised of the control environment, the
accounting system, and control procedures The three elements of a typical fraud consist of
(activities). concealment, conversion, and completion.

true false

Analytical fraud symptoms are the least Auditors can best help detect fraud at the
effective way to detect fraud. conversion stage.

false false

Most people who commit fraud use the Some complaints and tips turn out to be
embezzled funds to save for retirement. unjustified.

false true

As fraud perpetrators become more confident Fraud is a crime that is seldom observed.
in their fraud schemes, they usually steal and
spend increasingly larger amounts. true

true
Because of the nature of fraud, auditors are
often in the best position to detect its
First-time offenders usually exhibit no occurrence.
psychological changes.
false
False
Most people who commit fraud feel a perceived Fraud perpetrators often live beyond their
financial pressure. means since their income does not support
their lifestyle.
true
true

Studies have found that the most common


internal control problem when frauds occur is Nearly all individuals and organizations are
having a lack of proper authorizations. subject to real or perceived pressures and can
rationalize.
false
True

Fraud perpetrators who manipulate accounting


records to conceal embezzlements often
attempt to balance the accounting equation by
recording expenses.

true

Employee transfers, audits, and mandatory


vacations are all ways to provide independent
checks on employees.

true

New whistle-blowing laws have helped make


tips and complaints more effective.

true

Co-workers are usually in the best position to


detect fraud.

true
CHAPTER6 high cost

When detecting fraud,it is important that fraud Benford's law


investigators:
a. is usually unsuccessful as a fraud detection
a. remain objective and neutral tool
b. assume guilt b. predicts that the first digit of random number
c. assume guilt sets will begin with a 1 more often than a 2, a 2
c. assume innocence more often than a 3, and so on
d. none of the above c. applies to personal ID numbers
d. all of the above
remain objective and neutral
predicts that the first digit of random number
Data-driven fraud detection: sets will begin with a 1 more often than a 2, and
a 2 more often than a 3 and so on
a) determines the cost of fraud
b) identifies possible fraud suspects a detection method that focuses on the kinds of
c) looks for anomalies in databases frauds that can occur and then uses technology
d) all of the above to determine whether those frauds actually
exist is called:
looks for anomalies in databases

once a buyer starts accepting kickbacks from a a. fishing fraud detection


supplier: b. data mining
c. data-driven fraud detection
a. prices often increase d. benford's law
b. purchases from other vendors often decreae data-driven fraud detection
c. the supplier usually takes control of the
purchasing relationship when deciding which detection method to use,
d. all of the above it is important to:

prices increase, purchases from other vendors a. determine the advantages and disadvantages
often decrease, supplier usually takes control of of each approach
the purchasing relationship b. identify the costs involved
The most obvious disadvantage of the data- c. determine which method will meet the
driven approach is: client's objectives
d. all of the above
a. databases are very large and often cannot be determine the advantages and disadvantages of
analyzed using analysis packages like ACL, IDEA, each approach, ID costs involved, determine
or ActiveData which method will meet the client's objectives
b. high cost
c. the decrease in employee morale fraud is best detected through the financial
d. none of the above statements by focusing on
Financial statement balances are converted to
a. unexplained changes in financial statement percentages
balances
b. consistencies Horizontal analysis is different from vertical
analysis in that:
c. intuition
d. management's behavior when financial
statements are released a. there is no difference between horizontal and
vertical analysis
unexplained changes in financial statement b. horizontal analysis calculates the percentage
balances change in balance sheet and income statment
numbers from one period to the next, while
The most effective way to convert balance vertical analysis converts balances in a single
sheets and income statements from position
period to percentages
and period statements to change statements is c. horizontal analysis converts balances in a
to single period to percentages, while vertical
analysis calculates the percentage change in
a. compare balances in the statements from balance sheet and income statement numbers
one period to the next from one person to the next
b. calculate key ratios and compare them from d. key ratios are compared from one period to
period to period
the next
c. perform horizontal and vertical analyses
d. all of the above Horizontal analysis calculates the percentage
change in balance sheet and income statement
Perform horizontal and vertical analyses numbers from one period to the next, while
Profit, margin, return on assets, and return on vertical analysis converts balances in a single
equity are all examples of: period to percentages

Which of the following is an advantage of using


a. vertical analysis data analysis software to detect fraud
b. key financial statements ratios
c. horizontal analysis a. it is a static approach, and results cannot be
d. none of the above recombined in different ways
Key financial statement ratios b. data analysis software can only be used to
analyze small data sets
When vertical analysis is performed: c. Data analysis software can analyze entire
populations rather than just samples
a. ratios are used to detect fraud d. significant numbers of hits can occur,
b. changes in significant balance totals are requiring iterative refinement of analyses
examined
c. financial statements balances are converted Data analysis software can analyze entire
to percentages populations rather than just samples
d. total revenues are compared to total
expenses
Benford's Law is: and types from the database
A. The most expensive of all the digital analysis d. ODBC keeps the investigator from dealing
methods to implement and use. with the difficult SQL language
B. The most effective way to identify actual
ODBC automatically retrieves column names
frauds.
C. A method that uses vertical financial and types from the database
statement analysis. the soundex algorithm
D. An effective way to identify anomalies in data
sets. a. uses consonants but ignores vowels
An effective way to identify anomalies in data b. creates numerical score representing how a
word sounds
sets
c. is useful when fuzzy matching values
When conducting financial statement analysis, d. all of the above
which ratio will be the most useful in
uses consonants but ignores vowels, creates a
determining whether a company has
erroneously inflated accounts receivable numerical score representing how a word
sounds, is useful when fuzzy matching values
a. current ratio unusual patterns always indicate the existence
b. profit margin of fraud
c. accounts receivable turnover
d. debt percentage F

accounts receivable turnover ODBC is the best approach to import because it


achieves a direct, rich connection to the source
when trying to identify outliers, what is one of database
the best statistical approaches
T
a. a pie graph indicating the relative amounts
data-driven analysis uses the company's
b. stratification of cases by value
database to search for normal relationships
c. time trending using the high-low slope
between numbers
method
d. the z-score calculation F
z-score calculation according to Benford's law, the first digit of
natural sets of numbers will begin with a 9 or
an advantage of using ODBC to import data into
more often than with an 8
a data warehouse is that:
F
a. ODBC doesn't require the use of corporate
database servers when using Benford's law, potential suspects
b. ODBC compresses data when stored on the are less likely to know you are trying to detect
CD or DVD fraud than if you use more direct detention
c. ODBC automatically retrieves column names techniques
T a single symptom (red flag) is almost always
enough information to identify the type of fraud
Understanding the kinds of frauds that can scheme occuring
occur is not important when using a data-driven
detection method F

F If a search reveals that an employee and a


vendor have the same telephone number, this
digital analysis using Benford's law can be result may indicate that:
performed on databases of any size

T a. vendors are overcharging for goods


purchased
data-driven fraud detection can pay large b. employees may be establishing dummy
dividends and is an effective way to reduce the vendors
cost of fraud in any organization c. contractors are billing at the wrong rates
d. a vendor is receiving kickbacks or other
T
favors
unexplained changes are common in financial
b. employees may be establishing dummy
statements
vendors
F

balance sheets must be converted to change


statements before they can be used in detecting
fraud

vertical analysis is a more direct method than


horizontal analysis in focusing on changes in
financial statements from one period to another

vertical analysis is a useful detection technique


because percentages are easily understood

the z-score calculation is the best way to stratify


data

F
CHAPTER7 False. Undercover operations are extremely
expensive.
The fraud triangle plus inquiry paradigm is an
effective way to understand the various types of Investigation of fraud should only take place
investigative methods. when predication has first been established.

True True

One advantage of using a vulnerability chart is If possible, when using theft act investigation
that it forces investigators to consider all methods, interviewing the prime suspects
aspects of a fraud. should happen last

True True

Electronic surveillance if often of limited value Tailing includes the use of video, e-mail,
in the investigation of employee fraud because wiretapping, and access to PCs
of concerns regarding employees' privacy rights
False. E-mail, wiretapping, and access to PC's
True are used in electronic surveillance. Tailing
involves following someone with audio or video
Surveillance is a theft investigation technique
recording devices.
that relies on the examination of documents
Invigilation is a theft act investigative technique
False. Surveillance is a technique for that involves close supervision of suspects
investigating theft that relies on watching and
during an examination period
recording activities of individuals, not studying
documents True

Mobile observation is usually much more risky To get an accurate reading, it is generally
than stationary surveillance agreed that the invigilation period should be at
least four days in length
True
False. Is should be at least 14 days in length
During invigilation, no controls are imposed on
any activity In determining which investigative method to
use, it is most important that investigators focus
False. During invigilation, strict controls are
on the costs of each possible method.
imposed on activities being studied.
False. Investigators should focus on the
Surveillance logs should always be drafted strongest type of evidence in determining which
before an investigation begins method to use.
False. seizing and searching computers is illegal
Not only are undercover operations both legal because it infringes on the rights guaranteed by
and valid, but they are also inexpensive the Fourth Amendment to the Constitution

False
It is impossible to retrieve the data from a file When beginning a fraud investigation, which of
that has been deleted on a computer the following methods is most useful in
identifying possible suspects?
False. When a file is deleted, the space is only
made available for overwriting. The original
a. preparing an identification chart
data remains in the disk until another program b. preparing vulnerability chart
uses the freed space to write something new. c. preparing a surveillance log
The SHA-1 checksum method is more advanced d. hiring a private investigator to tail the subject
and is considered more robust than the MD5
Preparing a vulnerability chart
method.
Invigilation:
True.

Which of the following is NOT a category used a. is most commonl used when investigating
in the fraud triangle plus inquiry paradigm? crimes that involve the taking of physical assets
b. can create tremendous amounts of
a. theft investigative techniques documentary evidence
b. concealment investigatigve techniques c. provides evidence to help determine whether
c. action investigative techniques fraud is occurring
d. conversion investigative techniques d. all of the above are ture

Action investigative techniques Provides evidence to help determine whether


fraud is occurring
When beginning an investigation, fraud
examiners should use techniques that will: Which of the following is not a theft
investigative method?
a. not arouse suspicion
b. identify the perpetrator a. invigilation
c. determine the amount of the fraud b. honesty testing
d. identify when the fraud occured c. seizing and searching computers
d. surveillance and covert operations
Not arouse suspicion
Honesty testing
When conducting interviews during an
investigation, which of the following words When deciding whether or not to investigate,
should usually be avoided? which of the following factors should an
organization not consider?
a. audit
b. inquiry a. possible cost of the investigation
c. investigation b. perceived strength of the predication
d. record examination c. possible public exposure resulting because of
the investigation
Investigation d. all of the above should be considered
Possible public exposure resulting because of a. certified fraud examiners
the investigation b. company personnel
Perceived strength of the predication c. private investigators
Possible cost of the investigation d. anyone, if conducted properly

Surveillance, when properly performed, is done: Anyone

a. Without the perpetrator's knowledge Surveillance logs should include all of the
b. During nonworking hours following except:
c. Only by law enforcement agents
d. None of the above a. time the observation began and ended
b. cost of the surveillance equipment used
Without the perpetrator's knowledge c. movements and activities of the suspect
d. distance the observation was from the scene
Which of the following is not included in a
vulnerability chart? Cost of the surveillance equipment used

a. explanations of the fraud triangle in relation Wiretapping, a form of electronic surveillance,


to suspects of fraud can be legally used by:
b. breakdowns in key internal controls that may
have created fraud opportunities a. internal auditors
c. internal controls that a company plans to b. company controllers
institute in the future c. CPAs.All of the above
d. theft act investigation methods d. none of the above

No CPAs, company controllers, internal auditors


Internal controls that a company plans to
institute in the future can use it

A vulnerability chart: Which theft investigative method is most


limited in value during employee fraud
a. forces investigators to explicitly consider all investigations because of concerns regarding
aspects of a fraud employees' privacy at work?
b. shows the history of fraud in a company
c. identifies weaknesses in every aspect of a a. electronic surveillance
companys' internal control b. invigilation
d. gives a detailed record of all the movements c. forensic accounting
and activites of the suspect d. interviewing and interrogation

Forces investigators to explicitly consider all Electronic surveillance


aspects of a fraud Who should be consulted before any form of
Fixed-point, or stationary, observations can be surveillance takes place?
conducted by:
a. public investors and the company's board of
directors
b. state attorney general
c. legal counsel and human resources
d. all company executives

Legal counsel and human resources

When seizing computers, a calculation (also


called a hash) that ensures you have an exact
clone and have not changed data is called a(n):

a. NIST number
b. ODBC connection
c. internet packet calculation
d. CRC checksum number

CRC checksum number

A snapshot of active memory should be done:

a. Before seizure of the computer


b. After seizure of the computer but before
turning off the computer
c. After turning off the computer but before
calculation of the checksum number
d. After calculation of the checksum number
but before searching

After seizure of the computer but before


turning off the computer

Now that many companies are storing their


data "in the cloud" it is easier to access the
electronic data of suspected perpetrators.

False
CHAPTER8 d) Deals with the probability of discovering at
least one error in a given sample size if the
In a fraud investigation, documents: population error is a certain percentage
a) Usually contain extremely valuable
information Documentary evidence such as private tax
b) Are rarely used in court returns can usually be obtained only by:
c) Are not reliable sources of information a) Subpoena
d) Are only valuable in obtaining a confession b) Search warrant
c) Voluntary consent
a) Usually contain extremely valuable
d) All of the above
information
d) All of the above
Chain of custody refers to:
a) Marking on a document so it can be Which of the following is not true regarding
identified later document experts?
b) A record of when a document is received and a) They can usually determine whether a
what has happened to it since its receipt document was written by the person whose
c) Databases used in trials to assist lawyers signature the document bears
d) The way in which courts are organized b) They can usually determine whether a
document has been forged
b) A record of when a document is received and c) They can usually determine whether the date
what has happened to it since its receipt the document bears is the date the document
Marking documentary evidence is important to was written
ensure that: d) All of the above are true statements
a) Documents are legal
d) All of the above are true statements
b) Databases can be created with valuable
information Which of the following is not a benefit of
c) Documents can be identified later statistical sampling?
d) Marking documentary evidence is not a) It allows auditors to be certain that fraud
important does not exist in a population
b) It is helpful when populations are large
c) Documents can be identified later c) It allows quantification of risk
Discovery sampling: d) It allows inference about a population
a) Is a type of variable sampling a) It allows auditors to be certain that fraud
b) Is one of the more difficult statistical does not exist in a population
sampling methods to understand
c) Is never used in conducting a fraud Which of the following methods of gathering
examinations documents is based primarily on luck?
d) Deals with the probability of discovering at a) Documents discovered during audits
least one error in a given sample size if the b) Hard-to-get private documents that are
population error is a certain percentage subpoenaed
c) Documents discovered through searching
public sources How are most frauds concealed?
d) Documents provided by tipsters a) By shredding source documents
b) By converting to a paperless office without
d) Documents provided by tipsters paper transactions
Which of the following is true of graphologists? c) By creating fictitious documents or altering
a) They can only perform their work in source documents
laboratory settings d) By firing employees who will not go along
b) They perform the same type of work as with the fraud
forensic document experts c)By creating fictitious documents or altering
c) They study handwriting as a way to interpret source documents
and identify personalities
d) They are required to be members of the Which of the following is usually the best way to
ABFDE organization obtain documentary evidence?
a) Computer-based queries of full population
c) They study handwriting as a way to interpret
accounting and other databases
and identify personalities b) A statistically sound sampling approach like
What can a fraud examiner conclude if one or discovery sampling
more instances of fraud are found in a sample c) Chance, accident, or tip discovery
taken from a population? d) None of the above are effective methods of
a) There is a slight risk that fraud exists in the discovering evidence
population a) Computer-based queries of full population
b) The population contains fraud
accounting and other databases
c) The sample may not have been randomly
selected, and thus no conclusions can be drawn Programs like CaseMap, CaseCentral, ZANTAZ,
d) The sample is most likely not representative Ringtail, and DatiCon are examples of:
of the population as a whole a) Software that implements discovery sampling
techniques
b) The population contains fraud b) Link analysis software
What can a fraud examiner conclude if his or c) Software packages used to index and store
her tests confirm that no instances of fraud are evidence
present in a sample taken from a population? d) Forensic software used to investigate hard
a) There is virtually no risk that fraud exists in drives and other digital devices
the population c) Software packages used to index and store
b) The population contains no fraud
evidence
c) Only that no fraud is present in that particular
sample Concealment is the covering of tracks, obscuring
d) The sample is most likely not representative of evidence, and removal of red flags to hide a
of the population as a whole perpetrators fraud.

c) Only that no fraud is present in that particular True


sample
Checks are excellent sources of physical of law, they are still considered secondary
evidence. evidence.

False True

Traditional chain of custody evidence A canceled check typically shows the account
procedures are not appropriate when used with number of the person who presented the check,
electronic evidence. the teller who processed the check, and the
sequence number of the transaction.
False
True
Photocopies are always preferable to original
documents as evidence. Random number tables are ineffective and
should not be used when selecting random
False samples from a population.
There is no difference between forensic False
document and experts and graphologists.
Using a computer to access records (data
False mining) can be a very effective approach for
Evidence should be uniquely marked so it can determining if fraud exists because the auditor
be easily identified later can look at entire populations.

True True

Concealment investigative methods sometimes Bates numbers are identifying numbers used by
involved the study of documents that have been attorneys involved in litigation to track all
manipulated. documents.

True True

Discovery sampling is probably the most Programs like IBM's i2 Analyst's Notebook and
difficult of all statistical sampling variations to Xanalys Link Exploreer perform link analysis.
understand. True
False The best way to obtain documentary evidence
As long as a sample is selected randomly, it will in a computer database is to use discovery
always be representative of the population as a sampling to find the appropriate records.
whole. False
False

Even if photocopies of original documents are


allowed to be introduced as evidence in a court

Potrebbero piacerti anche