Exam 10: Using Information Technology for Fraud Examination and Financial Forensics
Exam 1: Core Foundation Related to Fraud Examination and Financial Forensics71 Questions
Exam 2: Careers in Fraud Examination and Financial Forensics68 Questions
Exam 3: Who Commits Fraud and Why: Criminology and Ethics71 Questions
Exam 4: Complex Frauds and Financial Crimes63 Questions
Exam 5: Cybercrime: Computer and Internet Fraud6 Questions
Exam 6: Legal, Regulatory, and Professional Environment52 Questions
Exam 7: Fraud Detection: Red Flags and Targeted Risk Assessment71 Questions
Exam 8: Detection and Investigations84 Questions
Exam 9: Effective Interviewing and Interrogation56 Questions
Exam 10: Using Information Technology for Fraud Examination and Financial Forensics57 Questions
Exam 11: Cash Receipt Schemes and Other Asset Misappropriations55 Questions
Exam 12: Cash Disbursement Schemes59 Questions
Exam 13: Corruption and the Human Factor49 Questions
Exam 14: Financial Statement Fraud54 Questions
Exam 15: Consulting, Litigation Support, and Expert Witnesses: Damages, Valuations, and Other Engagements57 Questions
Exam 16: Remediation and Litigation Advisory Services43 Questions
Select questions type
Validation controls detest input errors by flagging those transactions that fall within accepted ranges.
(True/False)
4.8/5
(32)
Correlation analysis in data extraction and analysis software could be used to discover all EXCEPT:
(Multiple Choice)
4.7/5
(39)
There are two major ways to test IT systems - the "black-box" approach, and the "white-box" approach, which utilizes a relatively small dataset to test the system.
(True/False)
4.9/5
(42)
Compliance verification in data extraction and analysis software could be used to discover all EXCEPT:
(Multiple Choice)
4.9/5
(35)
How do e-discovery rules have an impact on the storage of e-mail and other electronic files?
(Essay)
5.0/5
(42)
Restoring data and files is a more sophisticated approach to recovering deleted files.
(True/False)
4.8/5
(39)
What functions are used by data extraction and analysis software to highlight red flags of fraud?
(Essay)
4.9/5
(37)
Which of the following would be normally be detected as an input error in payroll processing?
(Multiple Choice)
4.9/5
(35)
The source documents that support the electronic data systems do not need to be pre-numbered and used in sequence.
(True/False)
4.8/5
(38)
The software product Analyst's Notebook I2 would be classified as:
(Multiple Choice)
4.8/5
(35)
The acronym MICE signifies fraud motivations such as money, intellectualism, coercion, and ego.
(True/False)
4.9/5
(38)
Record validation can include reasonableness checks, sequences checks, and other checks.
(True/False)
4.8/5
(39)
Preparing link charts is a way to represent the associations, linkages, and other important relationship graphically.
(True/False)
4.8/5
(45)
Showing 41 - 57 of 57
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)