Deck 10: Using Information Technology for Fraud Examination and Financial Forensics

Full screen (f)
exit full mode
Question
An association matrix is not useful for identifying major players who are central to an investigation and to identify linkages between those players.
Use Space or
up arrow
down arrow
to flip the card.
Question
Generally, a warrant or subpoena is not required to obtain digital evidence.
Question
IDEA can read, display, analyze, manipulate, sample, and extract data from files obtained from many sources in only one format.
Question
An activity that can enhance the ability to recover deleted files is the "Defrag" command.
Question
Case management software can be used in a number of situations to manage cases and case data.
Question
The acronym MICE signifies fraud motivations such as money, intellectualism, coercion, and ego.
Question
Data mining and knowledge discovery software is generally classified into two general categories: public domain and commercial applications.
Question
Record validation can include reasonableness checks, sequences checks, and other checks.
Question
Benford's Law can be used as an indicator of potential fraud.
Question
Validation controls detest input errors by flagging those transactions that fall within accepted ranges.
Question
Preparing link charts is a way to represent the associations, linkages, and other important relationship graphically.
Question
ACL and IDEA are examples of commercially available data mining software.
Question
The simple act of turning on a confiscated computer, digital camera, cell phone, PDA, etc. may make all the evidence on that digital device inadmissible in a courtroom.
Question
Output controls address how to monitor waste and how to identify who is responsible for data accuracy, report distribution, and end-user controls.
Question
Once data sectors on computer files have been overwritten, generally a computer forensic specialist can still recover the files.
Question
Recovering deleted files is not considered difficult, provided that the file has not been overwritten or corrupted and that the drive has not been repartitioned or reformatted.
Question
Restoring data and files is a more sophisticated approach to recovering deleted files.
Question
An information technology IT audit consists of 1 planning, 2 tests of controls, and 3 substantive tests.
Question
There are two major ways to test IT systems - the "black-box" approach, and the "white-box" approach, which utilizes a relatively small dataset to test the system.
Question
The source documents that support the electronic data systems do not need to be pre-numbered and used in sequence.
Question
Which of the following is NOT a tool to collect digital evidence?

A) Road MASSter
B) Encase
C) HDD Regenerator
D) Microsoft Dynamics GP
Question
Duplicate searches in data extraction and analysis software could be used to discover:

A) Invoices that have been paid twice
B) Missing employees
C) Missing invoices
D) Stolen inventory
Question
<strong>  MC Graphic 10-5  -The graphic 10-5 is called an:</strong> A) Association matrix B) Link chart C) Familial chart D) Grouping chart <div style=padding-top: 35px>
MC Graphic 10-5

-The graphic 10-5 is called an:

A) Association matrix
B) Link chart
C) Familial chart
D) Grouping chart
Question
In data analysis and extraction software, the types of queries conducted on accounts receivable would includes everything EXCEPT:

A) Identifying debits to expense accounts
B) Create a list of customer limit increases
C) Age accounts receivable in various formats
D) Identify gaps in the sequence of invoice numbers
Question
An example of an input error that would likely be caught by a validation control in payroll processing would be:

A) Overtime hours above 10 hours for an individual.
B) Zero hours for a long time employee.
C) 90 hours worked by one employee in one week.
D) The addition of a new employee
Question
Which of the following would be considered a batch control for payroll?

A) A total on FICA taxes withheld.
B) A total on Federal Income taxes withheld.
C) A total on employee hours.
D) A total on state income tax withheld.
Question
Which of the following would be normally be detected as an input error in payroll processing?

A) An alphabetic character in the employee hours field.
B) Overtime hours above 10 hours for an individual employee.
C) Zero hours for a long time employee.
D) The addition of a new employee.
Question
The assertions of management related to financial statements include all of the these EXCEPT:

A) The existence of assets and transactions.
B) The completeness of the transactions.
C) Proper disclosure of all rights and obligations.
D) Assurance of future profitability.
Question
The general framework for viewing IT risks and controls include all the following EXCEPT

A) IT Operations
B) Systems Maintenance
C) Human Resource Management
D) Electric Commerce
Question
The functions of data extraction and analysis software tools includes all EXCEPT:

A) Compliance verification
B) Input into inventory system
C) Duplicate searches
D) Correlation analysis
Question
The functions of data extraction and analysis software tools includes all EXCEPT:

A) Sorting
B) Input into payroll system
C) Verifying multiples of a number
D) Correlations analysis
Question
In data analysis and extraction software, the types of queries conducted on sales analysis would include everything EXCEPT:

A) Analyze sales returns and allowances
B) Selecting specifying journal entries for analysis
C) Summarize trends by customers type
D) Create reports on customer demand
Question
An information technology IT audit consists of all EXCEPT

A) planning,
B) tests of controls,
C) substantive tests,
D) qualitative tests.
Question
Compliance verification in data extraction and analysis software could be used to discover all EXCEPT:

A) Credit approvals for customer credit limits by credit manager
B) Excessive per diem amounts on employee expense accounts
C) Criminal background searches on prospective employees
D) Insuring that middle managers do not exceed company mandated budget limits
Question
Verifying multiples of a number in data extraction and analysis software could be used to discover all EXCEPT:

A) Recalculation of invoice totals
B) Reimbursement rates for mileage
C) Paycheck amounts for hours worked
D) Embezzled petty cash
Question
Which of the following is not considered CAATTs Computer-Aided Audit Tools and Techniques software:

A) Microsoft Dynamics GP
B) IDEA
C) ACL
D) Picalo
Question
In data analysis and extraction software, the types of queries conducted on the general ledger would include everything EXCEPT:

A) Calculating financial ratios
B) Select specific journal entries for analysis
C) Age counts receivable in various formats
D) Create actual to budget comparison reports
Question
One of the major functions of data security and privacy tools such as Privacy Suite is to:

A) Copy files
B) Rename files
C) Overwrite files
D) Recycle files
Question
Correlation analysis in data extraction and analysis software could be used to discover all EXCEPT:

A) Correlations where none existed previously
B) Non-existent inventory
C) Correlations that currently exist
D) How variables move in the same direction
Question
<strong>  MC Graphic 10-4  -The graphic 10-4 is called an:</strong> A) Association matrix B) Link chart C) Familial chart D) Grouping chart <div style=padding-top: 35px>
MC Graphic 10-4

-The graphic 10-4 is called an:

A) Association matrix
B) Link chart
C) Familial chart
D) Grouping chart
Question
What functions are used by data extraction and analysis software to highlight red flags of fraud?
Question
What computer functions can make recovering deleted files more difficult?
Question
What is meant by the acronym CAATTs and what are they used for?
Question
This type of graphic allows the investigator to analyze the movement of goods services, people and money:

A) Gantt chart
B) Link chart
C) Association matrix
D) Flow diagram
Question
List and describe three graphical techniques used to support the forensics professional.
Question
List two commercial data extraction and analysis software and list four functions of this software.
Question
What role do graphics play in an investigation?
Question
What are the two categories of data mining and knowledge discovery software?
Question
What is the purpose of timelines in an investigation?
Question
What are the two major approaches for testing IT system controls?
Question
What is computer forensics?
Question
A married couple goes to a movie. During the movie, the husband strangles the wife. He is able to get her body home without attracting attention.
How is this possible?
Question
How do e-discovery rules have an impact on the storage of e-mail and other electronic files?
Question
List five assertions of management in respect to financial statements.
Question
This type of graphic organizes information about events chronologically to determine what has occurred:

A) Link chart
B) Association matrix
C) Timeline
D) Flow diagram
Question
How is case management software used in an investigation?
Question
The software product Analyst's Notebook I2 would be classified as:

A) Data analysis and extraction software
B) Case management software
C) Electronic spreadsheet
D) Data presentation software
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/57
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Using Information Technology for Fraud Examination and Financial Forensics
1
An association matrix is not useful for identifying major players who are central to an investigation and to identify linkages between those players.
False
2
Generally, a warrant or subpoena is not required to obtain digital evidence.
False
3
IDEA can read, display, analyze, manipulate, sample, and extract data from files obtained from many sources in only one format.
False
4
An activity that can enhance the ability to recover deleted files is the "Defrag" command.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
5
Case management software can be used in a number of situations to manage cases and case data.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
6
The acronym MICE signifies fraud motivations such as money, intellectualism, coercion, and ego.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
7
Data mining and knowledge discovery software is generally classified into two general categories: public domain and commercial applications.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
8
Record validation can include reasonableness checks, sequences checks, and other checks.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
9
Benford's Law can be used as an indicator of potential fraud.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
10
Validation controls detest input errors by flagging those transactions that fall within accepted ranges.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
11
Preparing link charts is a way to represent the associations, linkages, and other important relationship graphically.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
12
ACL and IDEA are examples of commercially available data mining software.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
13
The simple act of turning on a confiscated computer, digital camera, cell phone, PDA, etc. may make all the evidence on that digital device inadmissible in a courtroom.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
14
Output controls address how to monitor waste and how to identify who is responsible for data accuracy, report distribution, and end-user controls.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
15
Once data sectors on computer files have been overwritten, generally a computer forensic specialist can still recover the files.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
16
Recovering deleted files is not considered difficult, provided that the file has not been overwritten or corrupted and that the drive has not been repartitioned or reformatted.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
17
Restoring data and files is a more sophisticated approach to recovering deleted files.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
18
An information technology IT audit consists of 1 planning, 2 tests of controls, and 3 substantive tests.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
19
There are two major ways to test IT systems - the "black-box" approach, and the "white-box" approach, which utilizes a relatively small dataset to test the system.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
20
The source documents that support the electronic data systems do not need to be pre-numbered and used in sequence.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following is NOT a tool to collect digital evidence?

A) Road MASSter
B) Encase
C) HDD Regenerator
D) Microsoft Dynamics GP
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
22
Duplicate searches in data extraction and analysis software could be used to discover:

A) Invoices that have been paid twice
B) Missing employees
C) Missing invoices
D) Stolen inventory
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
23
<strong>  MC Graphic 10-5  -The graphic 10-5 is called an:</strong> A) Association matrix B) Link chart C) Familial chart D) Grouping chart
MC Graphic 10-5

-The graphic 10-5 is called an:

A) Association matrix
B) Link chart
C) Familial chart
D) Grouping chart
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
24
In data analysis and extraction software, the types of queries conducted on accounts receivable would includes everything EXCEPT:

A) Identifying debits to expense accounts
B) Create a list of customer limit increases
C) Age accounts receivable in various formats
D) Identify gaps in the sequence of invoice numbers
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
25
An example of an input error that would likely be caught by a validation control in payroll processing would be:

A) Overtime hours above 10 hours for an individual.
B) Zero hours for a long time employee.
C) 90 hours worked by one employee in one week.
D) The addition of a new employee
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following would be considered a batch control for payroll?

A) A total on FICA taxes withheld.
B) A total on Federal Income taxes withheld.
C) A total on employee hours.
D) A total on state income tax withheld.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following would be normally be detected as an input error in payroll processing?

A) An alphabetic character in the employee hours field.
B) Overtime hours above 10 hours for an individual employee.
C) Zero hours for a long time employee.
D) The addition of a new employee.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
28
The assertions of management related to financial statements include all of the these EXCEPT:

A) The existence of assets and transactions.
B) The completeness of the transactions.
C) Proper disclosure of all rights and obligations.
D) Assurance of future profitability.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
29
The general framework for viewing IT risks and controls include all the following EXCEPT

A) IT Operations
B) Systems Maintenance
C) Human Resource Management
D) Electric Commerce
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
30
The functions of data extraction and analysis software tools includes all EXCEPT:

A) Compliance verification
B) Input into inventory system
C) Duplicate searches
D) Correlation analysis
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
31
The functions of data extraction and analysis software tools includes all EXCEPT:

A) Sorting
B) Input into payroll system
C) Verifying multiples of a number
D) Correlations analysis
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
32
In data analysis and extraction software, the types of queries conducted on sales analysis would include everything EXCEPT:

A) Analyze sales returns and allowances
B) Selecting specifying journal entries for analysis
C) Summarize trends by customers type
D) Create reports on customer demand
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
33
An information technology IT audit consists of all EXCEPT

A) planning,
B) tests of controls,
C) substantive tests,
D) qualitative tests.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
34
Compliance verification in data extraction and analysis software could be used to discover all EXCEPT:

A) Credit approvals for customer credit limits by credit manager
B) Excessive per diem amounts on employee expense accounts
C) Criminal background searches on prospective employees
D) Insuring that middle managers do not exceed company mandated budget limits
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
35
Verifying multiples of a number in data extraction and analysis software could be used to discover all EXCEPT:

A) Recalculation of invoice totals
B) Reimbursement rates for mileage
C) Paycheck amounts for hours worked
D) Embezzled petty cash
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following is not considered CAATTs Computer-Aided Audit Tools and Techniques software:

A) Microsoft Dynamics GP
B) IDEA
C) ACL
D) Picalo
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
37
In data analysis and extraction software, the types of queries conducted on the general ledger would include everything EXCEPT:

A) Calculating financial ratios
B) Select specific journal entries for analysis
C) Age counts receivable in various formats
D) Create actual to budget comparison reports
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
38
One of the major functions of data security and privacy tools such as Privacy Suite is to:

A) Copy files
B) Rename files
C) Overwrite files
D) Recycle files
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
39
Correlation analysis in data extraction and analysis software could be used to discover all EXCEPT:

A) Correlations where none existed previously
B) Non-existent inventory
C) Correlations that currently exist
D) How variables move in the same direction
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
40
<strong>  MC Graphic 10-4  -The graphic 10-4 is called an:</strong> A) Association matrix B) Link chart C) Familial chart D) Grouping chart
MC Graphic 10-4

-The graphic 10-4 is called an:

A) Association matrix
B) Link chart
C) Familial chart
D) Grouping chart
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
41
What functions are used by data extraction and analysis software to highlight red flags of fraud?
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
42
What computer functions can make recovering deleted files more difficult?
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
43
What is meant by the acronym CAATTs and what are they used for?
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
44
This type of graphic allows the investigator to analyze the movement of goods services, people and money:

A) Gantt chart
B) Link chart
C) Association matrix
D) Flow diagram
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
45
List and describe three graphical techniques used to support the forensics professional.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
46
List two commercial data extraction and analysis software and list four functions of this software.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
47
What role do graphics play in an investigation?
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
48
What are the two categories of data mining and knowledge discovery software?
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
49
What is the purpose of timelines in an investigation?
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
50
What are the two major approaches for testing IT system controls?
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
51
What is computer forensics?
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
52
A married couple goes to a movie. During the movie, the husband strangles the wife. He is able to get her body home without attracting attention.
How is this possible?
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
53
How do e-discovery rules have an impact on the storage of e-mail and other electronic files?
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
54
List five assertions of management in respect to financial statements.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
55
This type of graphic organizes information about events chronologically to determine what has occurred:

A) Link chart
B) Association matrix
C) Timeline
D) Flow diagram
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
56
How is case management software used in an investigation?
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
57
The software product Analyst's Notebook I2 would be classified as:

A) Data analysis and extraction software
B) Case management software
C) Electronic spreadsheet
D) Data presentation software
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 57 flashcards in this deck.