Exam 7: Fraud Detection: Red Flags and Targeted Risk Assessment
Exam 1: Core Foundation Related to Fraud Examination and Financial Forensics71 Questions
Exam 2: Careers in Fraud Examination and Financial Forensics68 Questions
Exam 3: Who Commits Fraud and Why: Criminology and Ethics71 Questions
Exam 4: Complex Frauds and Financial Crimes63 Questions
Exam 5: Cybercrime: Computer and Internet Fraud6 Questions
Exam 6: Legal, Regulatory, and Professional Environment52 Questions
Exam 7: Fraud Detection: Red Flags and Targeted Risk Assessment71 Questions
Exam 8: Detection and Investigations84 Questions
Exam 9: Effective Interviewing and Interrogation56 Questions
Exam 10: Using Information Technology for Fraud Examination and Financial Forensics57 Questions
Exam 11: Cash Receipt Schemes and Other Asset Misappropriations55 Questions
Exam 12: Cash Disbursement Schemes59 Questions
Exam 13: Corruption and the Human Factor49 Questions
Exam 14: Financial Statement Fraud54 Questions
Exam 15: Consulting, Litigation Support, and Expert Witnesses: Damages, Valuations, and Other Engagements57 Questions
Exam 16: Remediation and Litigation Advisory Services43 Questions
Select questions type
Most audit committees have the authority to investigate any matters within the scope of their responsibility, including internal control deficiencies, concerns about the financial reporting process, suspected corruption, and alleged illegal acts.
Free
(True/False)
4.8/5
(40)
Correct Answer:
True
What are the main components of the fraud risk assessment process?
Free
(Essay)
4.9/5
(39)
Correct Answer:
An overview of the fraud risk assessment process includes the following components:
•Evaluate the fraud risk factors
•Identify possible fraud schemes and scenarios
•Prioritize individual fraud risks
•Evaluate mitigating controls for those fraud schemes that are reasonably possible or probable of occurrence and are more than inconsequential or material.
A fraudster, aided by the digital age, can easily minimize the amount of information captured concerning his nefarious activities.
Free
(True/False)
4.9/5
(34)
Correct Answer:
False
Common tipsters for fraud are employees, co-workers, managers, and outside colleagues who interact with the fraudster daily, weekly, or monthly.
(True/False)
4.7/5
(32)
It is said the nonfinancial numbers are powerful tools for the fraud examiner. Explain why and provide examples of how.
(Essay)
4.9/5
(46)
Provide at least five examples of typical internal control weaknesses.
(Essay)
4.9/5
(35)
Data mining software such as Access, ACL, or IDEA allow a large amount of data to be evaluated quickly for symptoms of fraud and provide evidence of the fraud act or concealment of the fraud..
(True/False)
4.9/5
(41)
The fraud examiner categorizes schemes in three ways, Category 1, Category 2, and Category 3. Explain each category.
(Essay)
4.9/5
(37)
As a result of its significant concern with financial statement fraud, the accounting profession responded in 2002 with:
(Multiple Choice)
4.8/5
(35)
The second step to develop an approach to fraud detection is to:
(Multiple Choice)
4.8/5
(23)
A major difference between auditors and fraud examiners is that most auditors match documents to numbers to see whether support exists and is adequate, whereas fraud examiners determine whether the documents are real or fraudulent..
(True/False)
5.0/5
(39)
Red flags, symptoms of fraud, often go unnoticed or are not vigorously pursued because:
(Multiple Choice)
4.7/5
(39)
CAATTS computer-aided auditing tools and techniques are used primarily to select samples and detect collusion .
(True/False)
4.9/5
(37)
Showing 1 - 20 of 71
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)