Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
false
true
false
true
false
true
false
CHAPTER5
Which of the following is true regarding fraud? In the three elements of fraud (theft act,
concealment, conversion), who is usually in the
a) it is easily identified best position to detect the fraud?
b) it is seldom observed a) co-workers and managers
c) when a fraud occurs, there is no question b) customers
whether or not a crime has been committed
c) owners
d) many witnesses are usually available when
fraud occurs d) vendors
Which of the following is NOT a fraud symptom When a person commits a crime:
related to source documents?
a) he or she usually becomes engulfed by
a) duplicate payments emotions of fear and guilt
d) people who report fraud are not rewarded b) journal entries that do not balance
monetarily c) journal entries without documentary support
d) people who report fraud are not rewarded d) journal entries made near the beginning of
monetarily accounting periods
d) magnanimous
b) coercion
false
The internal control system of an organization is
comprised of the control environment, the
accounting system, and control procedures The three elements of a typical fraud consist of
(activities). concealment, conversion, and completion.
true false
Analytical fraud symptoms are the least Auditors can best help detect fraud at the
effective way to detect fraud. conversion stage.
false false
Most people who commit fraud use the Some complaints and tips turn out to be
embezzled funds to save for retirement. unjustified.
false true
As fraud perpetrators become more confident Fraud is a crime that is seldom observed.
in their fraud schemes, they usually steal and
spend increasingly larger amounts. true
true
Because of the nature of fraud, auditors are
often in the best position to detect its
First-time offenders usually exhibit no occurrence.
psychological changes.
false
False
Most people who commit fraud feel a perceived Fraud perpetrators often live beyond their
financial pressure. means since their income does not support
their lifestyle.
true
true
true
true
true
true
CHAPTER6 high cost
prices increase, purchases from other vendors a. determine the advantages and disadvantages
often decrease, supplier usually takes control of of each approach
the purchasing relationship b. identify the costs involved
The most obvious disadvantage of the data- c. determine which method will meet the
driven approach is: client's objectives
d. all of the above
a. databases are very large and often cannot be determine the advantages and disadvantages of
analyzed using analysis packages like ACL, IDEA, each approach, ID costs involved, determine
or ActiveData which method will meet the client's objectives
b. high cost
c. the decrease in employee morale fraud is best detected through the financial
d. none of the above statements by focusing on
Financial statement balances are converted to
a. unexplained changes in financial statement percentages
balances
b. consistencies Horizontal analysis is different from vertical
analysis in that:
c. intuition
d. management's behavior when financial
statements are released a. there is no difference between horizontal and
vertical analysis
unexplained changes in financial statement b. horizontal analysis calculates the percentage
balances change in balance sheet and income statment
numbers from one period to the next, while
The most effective way to convert balance vertical analysis converts balances in a single
sheets and income statements from position
period to percentages
and period statements to change statements is c. horizontal analysis converts balances in a
to single period to percentages, while vertical
analysis calculates the percentage change in
a. compare balances in the statements from balance sheet and income statement numbers
one period to the next from one person to the next
b. calculate key ratios and compare them from d. key ratios are compared from one period to
period to period
the next
c. perform horizontal and vertical analyses
d. all of the above Horizontal analysis calculates the percentage
change in balance sheet and income statement
Perform horizontal and vertical analyses numbers from one period to the next, while
Profit, margin, return on assets, and return on vertical analysis converts balances in a single
equity are all examples of: period to percentages
F
CHAPTER7 False. Undercover operations are extremely
expensive.
The fraud triangle plus inquiry paradigm is an
effective way to understand the various types of Investigation of fraud should only take place
investigative methods. when predication has first been established.
True True
One advantage of using a vulnerability chart is If possible, when using theft act investigation
that it forces investigators to consider all methods, interviewing the prime suspects
aspects of a fraud. should happen last
True True
Electronic surveillance if often of limited value Tailing includes the use of video, e-mail,
in the investigation of employee fraud because wiretapping, and access to PCs
of concerns regarding employees' privacy rights
False. E-mail, wiretapping, and access to PC's
True are used in electronic surveillance. Tailing
involves following someone with audio or video
Surveillance is a theft investigation technique
recording devices.
that relies on the examination of documents
Invigilation is a theft act investigative technique
False. Surveillance is a technique for that involves close supervision of suspects
investigating theft that relies on watching and
during an examination period
recording activities of individuals, not studying
documents True
Mobile observation is usually much more risky To get an accurate reading, it is generally
than stationary surveillance agreed that the invigilation period should be at
least four days in length
True
False. Is should be at least 14 days in length
During invigilation, no controls are imposed on
any activity In determining which investigative method to
use, it is most important that investigators focus
False. During invigilation, strict controls are
on the costs of each possible method.
imposed on activities being studied.
False. Investigators should focus on the
Surveillance logs should always be drafted strongest type of evidence in determining which
before an investigation begins method to use.
False. seizing and searching computers is illegal
Not only are undercover operations both legal because it infringes on the rights guaranteed by
and valid, but they are also inexpensive the Fourth Amendment to the Constitution
False
It is impossible to retrieve the data from a file When beginning a fraud investigation, which of
that has been deleted on a computer the following methods is most useful in
identifying possible suspects?
False. When a file is deleted, the space is only
made available for overwriting. The original
a. preparing an identification chart
data remains in the disk until another program b. preparing vulnerability chart
uses the freed space to write something new. c. preparing a surveillance log
The SHA-1 checksum method is more advanced d. hiring a private investigator to tail the subject
and is considered more robust than the MD5
Preparing a vulnerability chart
method.
Invigilation:
True.
Which of the following is NOT a category used a. is most commonl used when investigating
in the fraud triangle plus inquiry paradigm? crimes that involve the taking of physical assets
b. can create tremendous amounts of
a. theft investigative techniques documentary evidence
b. concealment investigatigve techniques c. provides evidence to help determine whether
c. action investigative techniques fraud is occurring
d. conversion investigative techniques d. all of the above are ture
a. Without the perpetrator's knowledge Surveillance logs should include all of the
b. During nonworking hours following except:
c. Only by law enforcement agents
d. None of the above a. time the observation began and ended
b. cost of the surveillance equipment used
Without the perpetrator's knowledge c. movements and activities of the suspect
d. distance the observation was from the scene
Which of the following is not included in a
vulnerability chart? Cost of the surveillance equipment used
a. NIST number
b. ODBC connection
c. internet packet calculation
d. CRC checksum number
False
CHAPTER8 d) Deals with the probability of discovering at
least one error in a given sample size if the
In a fraud investigation, documents: population error is a certain percentage
a) Usually contain extremely valuable
information Documentary evidence such as private tax
b) Are rarely used in court returns can usually be obtained only by:
c) Are not reliable sources of information a) Subpoena
d) Are only valuable in obtaining a confession b) Search warrant
c) Voluntary consent
a) Usually contain extremely valuable
d) All of the above
information
d) All of the above
Chain of custody refers to:
a) Marking on a document so it can be Which of the following is not true regarding
identified later document experts?
b) A record of when a document is received and a) They can usually determine whether a
what has happened to it since its receipt document was written by the person whose
c) Databases used in trials to assist lawyers signature the document bears
d) The way in which courts are organized b) They can usually determine whether a
document has been forged
b) A record of when a document is received and c) They can usually determine whether the date
what has happened to it since its receipt the document bears is the date the document
Marking documentary evidence is important to was written
ensure that: d) All of the above are true statements
a) Documents are legal
d) All of the above are true statements
b) Databases can be created with valuable
information Which of the following is not a benefit of
c) Documents can be identified later statistical sampling?
d) Marking documentary evidence is not a) It allows auditors to be certain that fraud
important does not exist in a population
b) It is helpful when populations are large
c) Documents can be identified later c) It allows quantification of risk
Discovery sampling: d) It allows inference about a population
a) Is a type of variable sampling a) It allows auditors to be certain that fraud
b) Is one of the more difficult statistical does not exist in a population
sampling methods to understand
c) Is never used in conducting a fraud Which of the following methods of gathering
examinations documents is based primarily on luck?
d) Deals with the probability of discovering at a) Documents discovered during audits
least one error in a given sample size if the b) Hard-to-get private documents that are
population error is a certain percentage subpoenaed
c) Documents discovered through searching
public sources How are most frauds concealed?
d) Documents provided by tipsters a) By shredding source documents
b) By converting to a paperless office without
d) Documents provided by tipsters paper transactions
Which of the following is true of graphologists? c) By creating fictitious documents or altering
a) They can only perform their work in source documents
laboratory settings d) By firing employees who will not go along
b) They perform the same type of work as with the fraud
forensic document experts c)By creating fictitious documents or altering
c) They study handwriting as a way to interpret source documents
and identify personalities
d) They are required to be members of the Which of the following is usually the best way to
ABFDE organization obtain documentary evidence?
a) Computer-based queries of full population
c) They study handwriting as a way to interpret
accounting and other databases
and identify personalities b) A statistically sound sampling approach like
What can a fraud examiner conclude if one or discovery sampling
more instances of fraud are found in a sample c) Chance, accident, or tip discovery
taken from a population? d) None of the above are effective methods of
a) There is a slight risk that fraud exists in the discovering evidence
population a) Computer-based queries of full population
b) The population contains fraud
accounting and other databases
c) The sample may not have been randomly
selected, and thus no conclusions can be drawn Programs like CaseMap, CaseCentral, ZANTAZ,
d) The sample is most likely not representative Ringtail, and DatiCon are examples of:
of the population as a whole a) Software that implements discovery sampling
techniques
b) The population contains fraud b) Link analysis software
What can a fraud examiner conclude if his or c) Software packages used to index and store
her tests confirm that no instances of fraud are evidence
present in a sample taken from a population? d) Forensic software used to investigate hard
a) There is virtually no risk that fraud exists in drives and other digital devices
the population c) Software packages used to index and store
b) The population contains no fraud
evidence
c) Only that no fraud is present in that particular
sample Concealment is the covering of tracks, obscuring
d) The sample is most likely not representative of evidence, and removal of red flags to hide a
of the population as a whole perpetrators fraud.
False True
Traditional chain of custody evidence A canceled check typically shows the account
procedures are not appropriate when used with number of the person who presented the check,
electronic evidence. the teller who processed the check, and the
sequence number of the transaction.
False
True
Photocopies are always preferable to original
documents as evidence. Random number tables are ineffective and
should not be used when selecting random
False samples from a population.
There is no difference between forensic False
document and experts and graphologists.
Using a computer to access records (data
False mining) can be a very effective approach for
Evidence should be uniquely marked so it can determining if fraud exists because the auditor
be easily identified later can look at entire populations.
True True
Concealment investigative methods sometimes Bates numbers are identifying numbers used by
involved the study of documents that have been attorneys involved in litigation to track all
manipulated. documents.
True True
Discovery sampling is probably the most Programs like IBM's i2 Analyst's Notebook and
difficult of all statistical sampling variations to Xanalys Link Exploreer perform link analysis.
understand. True
False The best way to obtain documentary evidence
As long as a sample is selected randomly, it will in a computer database is to use discovery
always be representative of the population as a sampling to find the appropriate records.
whole. False
False