Exam 10: Using Information Technology for Fraud Examination and Financial Forensics
Exam 1: Core Foundation Related to Fraud Examination and Financial Forensics71 Questions
Exam 2: Careers in Fraud Examination and Financial Forensics68 Questions
Exam 3: Who Commits Fraud and Why: Criminology and Ethics71 Questions
Exam 4: Complex Frauds and Financial Crimes63 Questions
Exam 5: Cybercrime: Computer and Internet Fraud6 Questions
Exam 6: Legal, Regulatory, and Professional Environment52 Questions
Exam 7: Fraud Detection: Red Flags and Targeted Risk Assessment71 Questions
Exam 8: Detection and Investigations84 Questions
Exam 9: Effective Interviewing and Interrogation56 Questions
Exam 10: Using Information Technology for Fraud Examination and Financial Forensics57 Questions
Exam 11: Cash Receipt Schemes and Other Asset Misappropriations55 Questions
Exam 12: Cash Disbursement Schemes59 Questions
Exam 13: Corruption and the Human Factor49 Questions
Exam 14: Financial Statement Fraud54 Questions
Exam 15: Consulting, Litigation Support, and Expert Witnesses: Damages, Valuations, and Other Engagements57 Questions
Exam 16: Remediation and Litigation Advisory Services43 Questions
Select questions type
List five assertions of management in respect to financial statements.
(Essay)
4.8/5
(32)
This type of graphic allows the investigator to analyze the movement of goods services, people and money:
(Multiple Choice)
4.9/5
(45)
Output controls address how to monitor waste and how to identify who is responsible for data accuracy, report distribution, and end-user controls.
(True/False)
4.8/5
(36)
The assertions of management related to financial statements include all of the these EXCEPT:
(Multiple Choice)
4.8/5
(35)
The functions of data extraction and analysis software tools includes all EXCEPT:
(Multiple Choice)
4.9/5
(32)
What computer functions can make recovering deleted files more difficult?
(Essay)
4.9/5
(42)
What are the two categories of data mining and knowledge discovery software?
(Essay)
4.8/5
(36)
An information technology IT audit consists of 1 planning, 2 tests of controls, and 3 substantive tests.
(True/False)
4.9/5
(33)
List two commercial data extraction and analysis software and list four functions of this software.
(Essay)
4.8/5
(40)
IDEA can read, display, analyze, manipulate, sample, and extract data from files obtained from many sources in only one format.
(True/False)
4.9/5
(31)
In data analysis and extraction software, the types of queries conducted on the general ledger would include everything EXCEPT:
(Multiple Choice)
4.8/5
(30)
An association matrix is not useful for identifying major players who are central to an investigation and to identify linkages between those players.
(True/False)
4.8/5
(40)
An example of an input error that would likely be caught by a validation control in payroll processing would be:
(Multiple Choice)
4.8/5
(36)
Duplicate searches in data extraction and analysis software could be used to discover:
(Multiple Choice)
4.9/5
(41)
ACL and IDEA are examples of commercially available data mining software.
(True/False)
4.9/5
(40)
The general framework for viewing IT risks and controls include all the following EXCEPT
(Multiple Choice)
4.9/5
(41)
Which of the following would be considered a batch control for payroll?
(Multiple Choice)
4.7/5
(38)
An activity that can enhance the ability to recover deleted files is the "Defrag" command.
(True/False)
4.9/5
(37)
Showing 21 - 40 of 57
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)