Exam 6: Data-Driven Fraud Detection
Exam 1: The Nature of Fraud50 Questions
Exam 2: Who Commits Fraud and Why52 Questions
Exam 3: Fighting Fraud: an Overview54 Questions
Exam 4: Preventing Fraud50 Questions
Exam 5: Recognizing the Symptoms of Fraud45 Questions
Exam 6: Data-Driven Fraud Detection50 Questions
Exam 7: Investigating Theft Acts45 Questions
Exam 8: Investigating Concealment42 Questions
Exam 9: Conversion Investigation Methods41 Questions
Exam 10: Inquiry Methods and Fraud Reports62 Questions
Exam 11: Financial Statement Fraud46 Questions
Exam 12: Revenue- and Inventory-Related Financial Statement Frauds50 Questions
Exam 13: Liability, Asset, and Inadequate Disclosure Frauds47 Questions
Exam 14: Fraud Against Organizations48 Questions
Exam 15: Consumer Fraud43 Questions
Exam 16: Bankruptcy, Divorce, and Tax Fraud62 Questions
Exam 17: E-Commerce Fraud37 Questions
Exam 18: Legal Follow-Up46 Questions
Select questions type
Which of the following ratios can be used to assess a company's solvency?
(Multiple Choice)
4.9/5
(38)
Most software packages have functions for generating about columns of data, which include statistical summaries like control totals, mean, maximum, minimum, standard deviation, number of zero values, number of empty records, and so on.
(Multiple Choice)
4.8/5
(37)
Which approach converts financial statement numbers to percentages of total assets or total sales?
(Multiple Choice)
4.7/5
(32)
is the splitting of complex data sets into case-specific tables.
(Multiple Choice)
4.9/5
(36)
Identify the true statement about detecting fraud using financial statement reports.
(Multiple Choice)
4.8/5
(43)
Which of the following is an analytical symptom of kickbacks?
(Multiple Choice)
4.7/5
(38)
The red flag that is generally identified when employee and vendor telephone numbers are the same is:
(Multiple Choice)
4.9/5
(48)
Which of the following statements regarding ODBC is NOT accurate?
(Multiple Choice)
4.7/5
(37)
Which of the following is similar to ACL and is ACL's primary competitor?
(Multiple Choice)
4.9/5
(34)
Which of the following is the most important step in data analysis?
(Multiple Choice)
4.8/5
(28)
Specific implementations of delimited text are called TSV. What does TSV stand for?
(Multiple Choice)
4.7/5
(35)
Which of the following is a true statement regarding the United States Social Security Administration (SSA)?
(Multiple Choice)
4.8/5
(35)
Which of the following proactive fraud detection methods use Benford's Law to detect fraud?
(Multiple Choice)
4.7/5
(42)
While using financial statement analysis, which ratio will be most useful in assessing the company's operational efficiency?
(Multiple Choice)
4.7/5
(37)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)