Deck 5: Fraud Examination and Fraud Management

Full screen (f)
exit full mode
Question
Fraud detection includes several standalone processes such as fraud prevention,investigation,correction,reporting,and recovery.
Use Space or
up arrow
down arrow
to flip the card.
Question
CEO/owner,legal counsel,and the internal auditors are among the possible candidates to receive notifications regarding a fraud investigation.
Question
The fraud engagement process includes various steps in which evidence is collected in support of the scope and objectives of the investigation.
Question
Evidence is anything that relates to the truth or falsity of an assertion made in an investigation or legal proceeding.
Question
Fraud examination and fraud investigation both refer to the application of accounting and other specialized skills to the prevention,detection,investigation,correction,and reporting of fraud.
Question
Type 2 errors result in unnecessary fraud investigations.
Question
Fraud detection is often an imperfect process.
Question
Fraud prevention requires implementing control checklists that contain items such as firewalls and anti-virus software.
Question
A company-generated incident report may serve as the basis of a probable-cause justification that would be required to obtain subpoenas,search warrants,and even arrest warrants.
Question
Total fraud cost is defined as the summation of costs of prevention,costs of investigations,costs of detections,and costs of losses.
Question
A fraud incident report can be anything from a red flag to a formal report written by a responsible person.
Question
The ISO 27000 family of standards has over 5,000 controls.
Question
COBIT standard is based on 16 high-level objectives that are broken down into 318 detailed control objectives.
Question
Benford analysis exploits the pattern relating to the first digit of numbers appearing in a random data set.
Question
The first question a fraud investigator should always ask is "why."
Question
Fraud detection software and services often use sophisticated statistical techniques.
Question
Data-driven fraud detection involves the formal analysis of small sets of data in search for fraud indicators.
Question
Type 1 error occurs when a fraud indicator fails to signal fraud.
Question
The external auditor is a good candidate to receive tips.
Question
Fraud detection involves identifying indicators of fraud that suggest a need for further investigation.
Question
A fraud theory provides answers to the basic question regarding who,what,when,where,how,and why.
Question
A subpoena is an order from a government agency or officer of a court that compels the recipient,under penalty,to produce physical evidence,documents,or testimony.
Question
Discovery is a process in which opposing parties can require each other and relevant parties to produce out-of-court evidence
Question
Tracing involves beginning with a source document and following the related transaction through the entire accounting cycle.
Question
Expert consultants provide expert opinions and analyses to attorneys.
Question
Polygraphs may sometimes be used to detect dishonesty in fraud investigations.
Question
Loss recovery options include accepting the loss,collecting insurance if available,and pursuing the perpetrator in court.
Question
The fraud report presents conclusions regarding a suspect's guilt.
Question
Calibration is part of the fraud triangle.
Question
Invigilation is a technique used by fraud investigators to authenticate documentation.
Question
Individuals who respond more to audio stimuli typically look down and to the right,or simply vertically to the right,when recalling information.
Question
A well-prepared interview conducted by a skilled interviewer can sometimes result in a confession that completely unwinds a complicated case.
Question
Physical and document evidence include audio or video recordings of suspects' activities.
Question
Observational evidence can be the most powerful form of evidence.
Question
Fraud investigator should immediately present the suspect with a written confession to sign once an oral confession is obtained.
Question
Vouching begins with numbers in accounts and follows them backward to the source documents.
Question
Evidence should be collected in a specific order.
Question
A search warrant is an order from a government agency or officer of a court that compels the recipient,under penalty,to produce physical evidence,documents,or testimony.
Question
Physical and document evidence include things such as fingerprints,trace evidence,and forged or incriminating documents.
Question
It is common for fraud investigators to question the authenticity or authorship of documents.
Question
________ ________ typically involves using a stolen customer check to make a payment on account.
Question
Computer forensics is the application of computer science to computer-related matters that might come before a court.
Question
It is not possible for fraudsters to crack any passwords or encryption keys.
Question
Half of all financial statement frauds involve overstating inventory.
Question
The solution to prevent employees from stealing cash in the mailroom is to have ________ employees work together.
Question
________ ________ ________ occur when a dishonest purchasing agent purchases from a friend even though to do so is not in the best interest of the company.
Question
Earnings management is always illegal and can never be justified by GAAP.
Question
Internal auditors should report directly to the audit committee and operate completely independent of the CEO,the CFO,and top management.
Question
Expert qualifications include things such as race,gender,and social status.
Question
Swapping checks for cash is a cash-register fraud that involves removing cash from the cash register and replacing it with bogus checks.
Question
Managers can legally manipulate or manage reported financial statement figures within GAAP.
Question
IP tracing is not a foolproof method.
Question
In the United States,employee fraud represents a small percentage of loss for most organizations.
Question
The solution in preventing lapping of accounts receivable is ________ ________ ________ ________.
Question
________ ________ ________ typically involves an employee pocketing cash but not recording its collection.
Question
________ ________ involves using chemicals to remove a check's payment details and then adding new details for the payee,date,or amount of payment.
Question
________ ________ ________ ________ requires that the bookkeeper for accounts receivable also handle incoming payments for customer accounts.
Question
Stock option is an executive mechanism to prevent financial statement fraud.
Question
________ ________ ________ ________ may occur when cash register receipts are not reconciled with sales receipts per each individual cash register.
Question
The corporate culture plays a key role in fostering employee dishonesty.
Question
________ ________ ________ can involve misappropriation of waste,scrap,and spoiled goods.
Question
Evidence is collected in a specific order.First,________ evidence is collected,then ________ are conducted,and finally the ________ are conducted.
Question
________ ________ options include accepting the loss,collecting insurance if available,and pursuing the perpetrator in court.
Question
The method that involves beginning with a source document and following the related transaction through the entire accounting cycle is called ________.
Question
Locating and extracting data of interest from computer-storage devices is known as a(n)________ ________.
Question
The observation technique that involves observing a suspect's behavior before,during,and after an announced investigation is called ________.
Question
________ ________ represents the gaining of access to files or communications that are encrypted or protected by passwords.
Question
The three sides of the fraud triangle are: ________,________,and ________.
Question
The widely accepted principle of ________ requires that investigations be started or continue only when there is a reasonable basis to do so.
Question
The method that begins with numbers in accounts and follows them backward to the source documents is called ________.
Question
Pulling the plug can defeat certain ________ techniques sometimes used by sophisticated fraudsters.
Question
Some hackers would connect through ________ server chains in order to hide their IP addresses
Question
Content analysis determines the ________ of computer files and electronic communications.
Question
A(n)________ ________ is a court order that authorizes law enforcement to search for and seize evidence.
Question
In many cases,the investigator will seek to find the ________ location associated with a computer device that is used to communicate over the Internet.
Question
Fraud investigators would prepare a(n)________ ________ at the conclusion of an investigation.
Question
Individuals who provide expert opinions and analyses to attorneys under the umbrella of attorney-client privilege are called ________ ________.
Question
________ ________ are individuals who specialize in analyzing questioned documents.They can detect document alterations by analysis of things such as the paper,the ink,and typefaces.
Question
________ ________ may involve improper hiring,improper changes to employee personnel files and pay rates.
Question
________ ________ are normally issued to individuals and organizations through Internet service.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/132
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Fraud Examination and Fraud Management
1
Fraud detection includes several standalone processes such as fraud prevention,investigation,correction,reporting,and recovery.
False
2
CEO/owner,legal counsel,and the internal auditors are among the possible candidates to receive notifications regarding a fraud investigation.
True
3
The fraud engagement process includes various steps in which evidence is collected in support of the scope and objectives of the investigation.
False
4
Evidence is anything that relates to the truth or falsity of an assertion made in an investigation or legal proceeding.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
5
Fraud examination and fraud investigation both refer to the application of accounting and other specialized skills to the prevention,detection,investigation,correction,and reporting of fraud.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
6
Type 2 errors result in unnecessary fraud investigations.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
7
Fraud detection is often an imperfect process.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
8
Fraud prevention requires implementing control checklists that contain items such as firewalls and anti-virus software.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
9
A company-generated incident report may serve as the basis of a probable-cause justification that would be required to obtain subpoenas,search warrants,and even arrest warrants.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
10
Total fraud cost is defined as the summation of costs of prevention,costs of investigations,costs of detections,and costs of losses.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
11
A fraud incident report can be anything from a red flag to a formal report written by a responsible person.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
12
The ISO 27000 family of standards has over 5,000 controls.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
13
COBIT standard is based on 16 high-level objectives that are broken down into 318 detailed control objectives.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
14
Benford analysis exploits the pattern relating to the first digit of numbers appearing in a random data set.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
15
The first question a fraud investigator should always ask is "why."
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
16
Fraud detection software and services often use sophisticated statistical techniques.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
17
Data-driven fraud detection involves the formal analysis of small sets of data in search for fraud indicators.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
18
Type 1 error occurs when a fraud indicator fails to signal fraud.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
19
The external auditor is a good candidate to receive tips.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
20
Fraud detection involves identifying indicators of fraud that suggest a need for further investigation.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
21
A fraud theory provides answers to the basic question regarding who,what,when,where,how,and why.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
22
A subpoena is an order from a government agency or officer of a court that compels the recipient,under penalty,to produce physical evidence,documents,or testimony.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
23
Discovery is a process in which opposing parties can require each other and relevant parties to produce out-of-court evidence
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
24
Tracing involves beginning with a source document and following the related transaction through the entire accounting cycle.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
25
Expert consultants provide expert opinions and analyses to attorneys.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
26
Polygraphs may sometimes be used to detect dishonesty in fraud investigations.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
27
Loss recovery options include accepting the loss,collecting insurance if available,and pursuing the perpetrator in court.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
28
The fraud report presents conclusions regarding a suspect's guilt.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
29
Calibration is part of the fraud triangle.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
30
Invigilation is a technique used by fraud investigators to authenticate documentation.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
31
Individuals who respond more to audio stimuli typically look down and to the right,or simply vertically to the right,when recalling information.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
32
A well-prepared interview conducted by a skilled interviewer can sometimes result in a confession that completely unwinds a complicated case.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
33
Physical and document evidence include audio or video recordings of suspects' activities.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
34
Observational evidence can be the most powerful form of evidence.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
35
Fraud investigator should immediately present the suspect with a written confession to sign once an oral confession is obtained.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
36
Vouching begins with numbers in accounts and follows them backward to the source documents.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
37
Evidence should be collected in a specific order.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
38
A search warrant is an order from a government agency or officer of a court that compels the recipient,under penalty,to produce physical evidence,documents,or testimony.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
39
Physical and document evidence include things such as fingerprints,trace evidence,and forged or incriminating documents.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
40
It is common for fraud investigators to question the authenticity or authorship of documents.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
41
________ ________ typically involves using a stolen customer check to make a payment on account.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
42
Computer forensics is the application of computer science to computer-related matters that might come before a court.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
43
It is not possible for fraudsters to crack any passwords or encryption keys.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
44
Half of all financial statement frauds involve overstating inventory.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
45
The solution to prevent employees from stealing cash in the mailroom is to have ________ employees work together.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
46
________ ________ ________ occur when a dishonest purchasing agent purchases from a friend even though to do so is not in the best interest of the company.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
47
Earnings management is always illegal and can never be justified by GAAP.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
48
Internal auditors should report directly to the audit committee and operate completely independent of the CEO,the CFO,and top management.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
49
Expert qualifications include things such as race,gender,and social status.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
50
Swapping checks for cash is a cash-register fraud that involves removing cash from the cash register and replacing it with bogus checks.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
51
Managers can legally manipulate or manage reported financial statement figures within GAAP.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
52
IP tracing is not a foolproof method.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
53
In the United States,employee fraud represents a small percentage of loss for most organizations.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
54
The solution in preventing lapping of accounts receivable is ________ ________ ________ ________.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
55
________ ________ ________ typically involves an employee pocketing cash but not recording its collection.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
56
________ ________ involves using chemicals to remove a check's payment details and then adding new details for the payee,date,or amount of payment.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
57
________ ________ ________ ________ requires that the bookkeeper for accounts receivable also handle incoming payments for customer accounts.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
58
Stock option is an executive mechanism to prevent financial statement fraud.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
59
________ ________ ________ ________ may occur when cash register receipts are not reconciled with sales receipts per each individual cash register.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
60
The corporate culture plays a key role in fostering employee dishonesty.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
61
________ ________ ________ can involve misappropriation of waste,scrap,and spoiled goods.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
62
Evidence is collected in a specific order.First,________ evidence is collected,then ________ are conducted,and finally the ________ are conducted.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
63
________ ________ options include accepting the loss,collecting insurance if available,and pursuing the perpetrator in court.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
64
The method that involves beginning with a source document and following the related transaction through the entire accounting cycle is called ________.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
65
Locating and extracting data of interest from computer-storage devices is known as a(n)________ ________.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
66
The observation technique that involves observing a suspect's behavior before,during,and after an announced investigation is called ________.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
67
________ ________ represents the gaining of access to files or communications that are encrypted or protected by passwords.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
68
The three sides of the fraud triangle are: ________,________,and ________.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
69
The widely accepted principle of ________ requires that investigations be started or continue only when there is a reasonable basis to do so.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
70
The method that begins with numbers in accounts and follows them backward to the source documents is called ________.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
71
Pulling the plug can defeat certain ________ techniques sometimes used by sophisticated fraudsters.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
72
Some hackers would connect through ________ server chains in order to hide their IP addresses
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
73
Content analysis determines the ________ of computer files and electronic communications.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
74
A(n)________ ________ is a court order that authorizes law enforcement to search for and seize evidence.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
75
In many cases,the investigator will seek to find the ________ location associated with a computer device that is used to communicate over the Internet.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
76
Fraud investigators would prepare a(n)________ ________ at the conclusion of an investigation.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
77
Individuals who provide expert opinions and analyses to attorneys under the umbrella of attorney-client privilege are called ________ ________.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
78
________ ________ are individuals who specialize in analyzing questioned documents.They can detect document alterations by analysis of things such as the paper,the ink,and typefaces.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
79
________ ________ may involve improper hiring,improper changes to employee personnel files and pay rates.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
80
________ ________ are normally issued to individuals and organizations through Internet service.
Unlock Deck
Unlock for access to all 132 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 132 flashcards in this deck.