Exam 7: Fraud Detection: Red Flags and Targeted Risk Assessment

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Most audit committees have the authority to investigate any matters within the scope of their responsibility, including internal control deficiencies, concerns about the financial reporting process, suspected corruption, and alleged illegal acts.

Free
(True/False)
4.8/5
(40)
Correct Answer:
Verified

True

What are the main components of the fraud risk assessment process?

Free
(Essay)
4.9/5
(39)
Correct Answer:
Verified

An overview of the fraud risk assessment process includes the following components:
•Evaluate the fraud risk factors
•Identify possible fraud schemes and scenarios
•Prioritize individual fraud risks
•Evaluate mitigating controls for those fraud schemes that are reasonably possible or probable of occurrence and are more than inconsequential or material.

A fraudster, aided by the digital age, can easily minimize the amount of information captured concerning his nefarious activities.

Free
(True/False)
4.9/5
(34)
Correct Answer:
Verified

False

As related to operations, the internal auditors evaluate:

(Multiple Choice)
4.8/5
(36)

Common tipsters for fraud are employees, co-workers, managers, and outside colleagues who interact with the fraudster daily, weekly, or monthly.

(True/False)
4.7/5
(32)

The main deterrent for fraud in the corporate environment:

(Multiple Choice)
4.9/5
(39)

It is said the nonfinancial numbers are powerful tools for the fraud examiner. Explain why and provide examples of how.

(Essay)
4.9/5
(46)

How is materiality determined?

(Essay)
4.8/5
(33)

Provide at least five examples of typical internal control weaknesses.

(Essay)
4.9/5
(35)

Data mining software such as Access, ACL, or IDEA allow a large amount of data to be evaluated quickly for symptoms of fraud and provide evidence of the fraud act or concealment of the fraud..

(True/False)
4.9/5
(41)

The fraud examiner categorizes schemes in three ways, Category 1, Category 2, and Category 3. Explain each category.

(Essay)
4.9/5
(37)

As a result of its significant concern with financial statement fraud, the accounting profession responded in 2002 with:

(Multiple Choice)
4.8/5
(35)

The second step to develop an approach to fraud detection is to:

(Multiple Choice)
4.8/5
(23)

Anomalies are:

(Multiple Choice)
4.9/5
(32)

A major difference between auditors and fraud examiners is that most auditors match documents to numbers to see whether support exists and is adequate, whereas fraud examiners determine whether the documents are real or fraudulent..

(True/False)
5.0/5
(39)

Red flags, symptoms of fraud, often go unnoticed or are not vigorously pursued because:

(Multiple Choice)
4.7/5
(39)

CAATTS computer-aided auditing tools and techniques are used primarily to select samples and detect collusion .

(True/False)
4.9/5
(37)

Earnings management may:

(Multiple Choice)
4.8/5
(33)

What are the primary responsibilities of management?

(Essay)
4.8/5
(46)

Upon discovering fraud, internal auditors:

(Multiple Choice)
4.8/5
(40)
Showing 1 - 20 of 71
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)