Question
click below
click below
Question
Normal Size Small Size show me how
Fraud Exam 2
Test 2
Question | Answer |
---|---|
Why is important to proactively detect fraud? | It helps the oraganiztion save money if the fraud is caught early, also the the investagator to proactively mange the detection process rather then be reactive. |
What are the diffrences between anomalies and fraud? | Anomalies are unintentional caused by control weakness, Fraud is intentional. |
What is the risk of sampling when searching for fraud? | Since fraud is found in very few transaction, and sampling at a 5% rate, 95% will of the investagion will miss the fraud. |
What are the asvantages of using data anaylysis software to detect fraud in a data-driven approach? | Can conduct instensive analysis quickly, and software contains routines like stratification, fuzzy matching, and summerization. |
What are the advantages of using statistical analysis to detect fraud? | Statiscal anaylis can be used on any database, such as Benford Law. |
What are the disadvantages of statistical anaylysis? | One disadvantage is that it tends to lead to a large number of symptoms, ex shot in the dark. |
What is Benford's Law? | Benford law helps predict the precentage times a number should appear in a sequence of numbers. |
List and describe the steps of the data-driven fraud-detection approach? | Data-driven fraud detection determines what kinds of frauds can occur in a particular situation |
How can fraud be detected by analyzing financial statements? | Investagator must focus in unexplained changes, 1)Focus on the primary finacial statement, 2)Perform vertical and horizontal anaylysis,3)Compute key finacial ratios |
What is the significance of unexplained changes in the financial statement in detecting fraud? | By identify unexplained changes investagators can identify areas of possible fraud. |
What are some of the difficulties in trying to correlate customers, vendors, or employees with known problem people? | Cross-corelations contains formatting inconsitencys |
When detecting fraud, it is important that fraud investagators: | Remain objective and neutral |
Data-driven fraud detection: | Look for anomalies in databases |
Once a buyer starts accepting kickbacks from a supplier: | Prices increases, Purchases from vendors often decrese, The supplier usally takes control of the puchasing relationship. |
The most obvious disadvantage of the data-driven approach is: | High Cost |
Benford Law: | Predicts the first digit of random number sets will begin 1 more often than a 2, a 2 more often than a 3, and so on... |
A detection method that focuses on the kinds of frauds that can occur and then uses technology to determine whether those frauds actually actually exist is called: | Data-driven fraud detection |
When deciding which detection method to use, it is important to: | Dtermine the advantages and disadvantages, Identify the costs involved, Determine which method will meet the client's objectives. |
Fruad is best detected through financial statements by focusing on: | Unexplained changes in financial statement balances. |
The most effective way to convertbalnce sheets and Income statements from postition and period statements to change stement is to: | Performed horizontal and vertical anaylyses |
Profit margin, return on assets, and return on equity are all examples of: | Key financial statement ratios. |
When vertical anaylyisis is performed: | Financial statement balances are converted to percentages. |
Horozontal analysis is diffrent from vertical anaylysis in that: | Horizontal anaylysis calculates the percentage change in balance sheet and income statement numbers from one period to the next, while vertical analysis converts balances in a single period to percentages. |
Which of the following is an advantage of using data analysis software to detect fraud? | Data anaylysis software can analyze entire populations rather than just samples. |
Benford's Law is: | An effective way to identify anomalies in data sets. |
If a search reveals that an employee and a vendor have the same number, this result may indicate that: | Employees may be establishing dummy vendors. |
When conducting financial statement ananlysis which ratio will be the most useful in determining whether a company has erroneously inflated accounts receivable? | Accounts receivable turnover |
When trying to identify outliers, what is one of the best statistical approaches? | The z-score calculation |
An advantage of using ODBC to import data into a data warehouse is that: | ODBC automatically retrieves column names and types from te database. |
The Soundex algorithm: | Uses consonant but ignores vowels, creates a numerical score representing how a word sounds, Is useful when fuzzy matching values. |
How are theft investigative methods used to investigate suspected fraud? | Help Investagators get the facts through surveillance and covert operations, invigilation, and physical evidence. |
What factors are considered when deciding whether or not to investigate a case of fraud? | Expected strength of evidence,Exposure or amount that could have been taken,The signal that investigation or noninvestigation will send to others in the organization. Risks of investigating and not investigating,Public exposure or loss of reputation |
How does a vulnerability chart help coordinate an investigation of suspected fraud? | coordinating theories about a suspected fraud, such as assets that were taken or are missing, individuals who have opportunities to commit fraud,promising methods to use in the theft investigation, concealment possibilities, conversion possibilities. |
What is a surveillance log? | A surveillance log is a detailed record used in an observation. A surveillance log includes the date and time of observation, the name of the observer. |
What is invigilation? | Invigilation is a condition where management imposes strict temporary controls on an activity so that during the observation period, fraud is virtually impossible. |
How is physical evidence used to investigate fraud? | Physical evidence, such as paints, stains, fingerprints, and tire marks, can help determinewho stole certain assets. |
What are the steps to collecting electronic evidence? | Step 1: After ensuring that you have the legal right to seize,Step 2: Clone the device and calculate a CRC checksum, Step 3: Search the device manually, Step 4: Search the device using automated procedures. |
Why is it important to use investagation techniques that will not arouse suspicion among possible perpetrators? | Because they could do two things that would affect the outcome of the investigation: destroy or conceal important evidence and completely stop their fraudulent acts. |
Why is it important to consult legal counsel and human resources before and form of surveillance takes place? | ensure that the suspect’s legal rights will not be violated in the course of the investigation, and that the evidence being obtained will be able to be used in a court of law. |
What role does the Fourth Amendment to the Constitution play in cases of fraud investigation? | The Fourth Amendment to the Constitution protects the right of a person against unreasonable searches, and limits the extent to which investigations can be conducted. |
Which of the following is not a category used in the fraud triangle plus inquiry paradigm? | Action investigative techniques. |
When beginning an investigation, fraud examiners should use techniques that will: | Not arouse Suspcion |
When conducting interviews during an investigation, which of the following words should usally be avoided? | Investigation |
When beginning a fraud investigation, which of the following methods is most useful in identifying possible suspects? | Preparing a vulnerability chart. |
Invigilation: | Provides evidence to help determine whether fraud is occuring. |
Which of the following is not a theft investigative method? | Honesty testing |
When deciding whether or not to investigate, which of the following factors should an organiztion not consider? | All the above)Possible cost, precieved strength, possible public exposure. |
Surveillance, when properly performed, is done: | without the perpetrator's knowledge. |
Which of the following is not included in a vulnerability chart? | Internal controls that a company plans to institute in the future. |
A vulnerability chart: | Forces investigators to explicitly consider all aspects of a fraud. |
Fixed-point, or stationary, observation can be conducted by: | Anyone |
Surveillance logs should include all of the following except: | Costs of the surveillance equipment used. |
Wiretapping, a form of electronic surveillance, can used by: | None of the above. |
which theft investigative method is most limited in value during employee fraud investigations because of concerns regarding employees' privacy at work? | Electronic surveillance |
Who should be consulted before any forms of surveillance takes place? | Legal counsel and Human resources. |
When seizing computers, acalculation that ensures you have the exacr colne an have not changed data is called a(n): | CRC checksum number |
A snapshot of active memory should be done: | After seizure of the computer but before turning off the computer. |
What are the most common ways perpetrators conceal their frauds? | Concealment is generally accomplished by manipulating documentary evidence, such as purchase invoices, sales invoices, credit memos, deposit slips, checks, receiving reports. |
What are the primary aspects of documentary evidence? | Chain of custody of documents, Marking of evidence, Organization of documentary evidence ,Coordination of evidence, Rules concerning original versus copies of documents |
Why is it important to maintain a chain of custody for documentary evidence? | chain of custody must be maintained in order for it to be accepted by the courts. Contesting attorneys will make every attempt to introduce the possibility that the document has been altered or tampered with. |
What programs can help with evidence coordination? | CaseMap, CaseCentral, Zantaz, RingTail, and DatiCon. |
Why is it important to gather documentary evidence? | Contain extremely valuable information for conducting fraud investigations.When faced with a choice between an eyewitness and a good document as evidence, most fraud experts would choose the document. |
In a fraud investigation, documents: | Usually contains extremely valuable information. |
Chain of custody refers to: | A reord of when a document id received and what has happened to it since its receipt. |
Marking documentary evidence is important to ensure that: | Documents can be identified later. |
Discovery sampling: | Deals with the probability of discovering at least one error in a given sample size if the population error is a certain percentage. |
Documentary evidence such as private tax returns can usually be obtained only by: | Subpoena, Search warrant, Voluntary consent. |
Which of the following is not true regarding document experts? | All of the above is true statements, 8-6 |
Which of the following is not a benefit of statistical sampling? | It allows auditors to be certain that fraud does not exist in a population. |
Which of the following methods of gathering documents is based primarily on luck? | Documents provided by tipsters. |
Which of the following is true of graphologists? | They study handwriting as a way to interpret and identify personalities. |
What can a fraud examiner conclude if one or more instances of fraud are found in a sample taken from a population? | The population contains fraud. |
What can a fraud examiner conclude if his or her tests confirm that no instances of fraud are present in a somple taken from a population. | Only that no fraud is present in that particular sample. |
How are most frauds concealed? | By creating fictitious documents or altering source documents. |
Which of the following is usually the best way to obtain documentary evidence? | Computer based queries of full-population accounting and other databases. |
Prograams like CaseMap, CaseCentral, ZANTAZ, Ringtail, and DatiCon | Software packages used to index and store evidence. |
What are the common ways to investigate conversion of stolen assets? | investigations of conversion involve searching public records and other sources to trace purchases of assets, payments of liabilities, and changes in lifestyle and net worth. |
What are "financial footprints"? | When people enter into financial transactions, such as buying assets, they leave tracks. |
Why is it important to know how perpetrators convert and spend their stolen funds? | Understanding how perpetrators convert and spend their stolen funds is important for two reasons: first, to determine the extent of the embezzlement, and second, to gather evidence that can be used in admission-seeking interviews to obtain a confession |
What are the differences between between public and private sources of information? | Public sources include many federal, state, and local agencies such as driver license, property tax, etc..., Private sources are comprised of non-governmental records and include gas, electric, water |
How do state, federal, and local public records assist fraud investigations? | Local courts maintain records on past law violators,employment history, personal and physical information, and prior charges. Federal sources, such as FBI records, contain large databases that can be accessed by local law enforcement agencies. |
How does the Internet assist in determining the net worth of suspected perpetrators? | By accessing information such as how individuals have spent their money (e.g. purchased boats, real estate, automobiles, etc.), investigators can determine the approximate amounts an individual has spent and the amount of assets he or she has. |
What are some of the advanced techniques available when searching for information on google? | Some of the more advanced techniques available when searching for information on Google include searching by phrase, minus search terms, domain restrictions |
How do these advanced techniques aid in the information-gathering process? | The advanced techniques help researchers conduct effective searches by allowing them to search entire phrases, to narrow searches and avoid words not associated with the search |
When searching public records, what are the four different types of information sources available to investigators? | They are government sources, private records, online databases, and Internet searches. |
Although most perpetrators begin their thefts because of a perceived critical need, they usually continue to embezzle in order to: | Improve their lifestyle. |
Evidence gathered from public records can be useful in: | Obtaining a confession |
The net worth method of analyzing financial information can help to determine: | The amount of embezzled funds. |
Which of the following organizations maintain public information that can be accessed in record searches? | D)Local agencies, State agencies, Federal agencies |
How useful are local and county records in fraud investigations? | Very useful |
Which of the following laws regulates activities of credit, insurance, and employment investigations? | Fair Credit Reporting Act of 1971 and Fair and Accurate Credit Transactions Act of 2003. |
The net worth method is effective: | D) As evidence in court, To conduct an interview of suspects, To help obtain a confession. |
Conversion investigations focus on how suspects: | Spent stolen money. |
Which of the following is a possible use of conversion-based investigation techniques? | D)Searching public records, locating previous spouses bank account,Locating money held by related parties. |
Most conversion investigations involve searching public records and other to trace: | e)Purchase of asset, Payment Liabilities, change in lifestyle, Net worth |
A database of criminal records maintained by FBI is: | The III, and NCIC |
Who among the following are usually some of the best ans most helpful federal fraud investigators? | Postal inspectors |
Which source could be used to access valuable financial information in a fraud investigation? | e)Financial institutions, Internet sites, The former spouse of a suspected fraud perpetrator, Trash. |
The net worth method is a calculation based on a person's: | Assets, liabilities, income, and living expenses. |
The formula to calculate funds from unknown sources is: | Assets-Liabilities-Prior Year's Net Worth + Living Expenses-Funds from Known Sources. |
The Gramm-Leach-Bliley Act allows: | d)Banks and financial institution to sell and share information, allows customers to "opt out". |
Each of these agencies is correctly matched with the type of information the agency provides except: | State Attorney General: Maintains birth records and information about people's SSN's |
Each of the statements is true about the net worth method for determining embezzled amounts except: | Courts are generally suspicious of dollar amounts determined by the net worth method because courts realize that the net worth method can only provide approximations of the amount stolen. |
Under the net worth method,a person who has an increase in net worth of 100,000, known expenses of 80,000, and a salary of 60,000, would have an unknown income of: | 120,000 |
Known income subtracted from total income gives a reasonable estimate of: | Unknown funds. |
Why are net calculation so valuable? | Net worth calculations tend to give a conservative estimate of stolen funds. Because these calculations are conservative, the stolen amounts are usually readily accepted as evidence by courts also helps with confessions from suspects. |
What is an interview? | a question-and-answer session designed to elicit information. |
What are the five reactions of interviewees? | Denial,Anger,Rationalization or bargaining, Depression,Acceptance |
What are five general types of questions the an interviewer can ask? | introductory,informational, assessment, closing, and admission-seeking |
What are some of the different elements of communication? | expression, persuasion, therapy, ritual, and information exchange |
What is an inhibitor of communication? | competing demands for time, threatened egos, repression, disapproval, and loss of status. |
What are facilitators of communication? | fulfilling expectations, recognition, catharsis, and need for meaning. |
What are informational questions? | non-confrontational and nonthreatening, and are asked for information-gathering purposes. |
What is meant by the question sequence? | questioning sequence should proceed from the general to the specific |
What is a volatile interview? | the potential to bring about strong emotional reactions in the respondent, usally involves close friends and relatives of a suspect, coconspirators |
What is the purpose of assessment questions? | seek to establish the credibility of the respondent |
What is norming or calibrating? | nterviewees are asked about something they are comfortable with and then something about the fraud. |
What are the three types of honesty testing? | pencil-and-paper tests, graphology, and voice stress analysis and polygraphs. |
Which of the following is not a method of honesty testing? | Body Language test |
Interviews should not be conducted with: | d) Suspects, Coworkers, Clients |
People in the rationalization stage of reaction to a fraud: | Want to give the suspect one more chance. |
Planning for interviews should not involve: | Judging the guilt of the suspect based on available documents. |
Confrontational interviews should usually be conducted when: | All other investigative procedures have been completed. |
Which of the following is not and inquiry technique that should be used by interviewers? | d) Use short questions, Maintain full control of the interview, point out some,not all, of the circumstantial evidence. |
Which of the following honesty testing techniques deals with the study of hand writing for the purpose of character analysis? | Graphology |
Which of the following traits do polygraphs not measure when testing for stress? | e) Pulse rate, Blood pressure, Galvanic skin response, Respiration |
Interviewing is: | d) The systematic questioning of individuals, The most common technique. |
Which of the following is the typical sequence of reaction to a crisis? | Denial, anger, rationalization, depression, acceptance. |
Which of the following reactions frequently involves appearing temporarily stunned, insisting there is some mistake, or not comprehending what has been said? | Denial |
Which is the characteristic of a good interview? | Make the interview as concise as possible. |
Each of the following is a clue that an interviewee is dishonest except: | Upon repeated accusations, a dishonest person's denials become more vehement. |
Which of the following is something that an interviewee might do or feel while in the denial phase? | Not comprehend what has been said. |
Which of the following is not a good thing to do during an interview? | Interview more than one person at once. |
A signed statement should include all of the following except: | The date the fraudster was hired by the company. |
Nonverbal cues of deception include all of the following except: | Repetition of the question. |