Deck 7: Investigating Theft Acts

Full screen (f)
exit full mode
Question
Which investigation technique relies on a person's senses, especially hearing and seeing?

A) Invigilation
B) Surveillance and covert operations
C) Computer-based searches
D) Honesty testing
Use Space or
up arrow
down arrow
to flip the card.
Question
A vulnerability chart is used to

A) Organize answers to investigative questions
B) Identify who had the opportunity to commit the fraud
C) Determine the possible motive for the fraud
D) All of the above
Question
In considering the fraud triangle plus inquiry approach to investigation, surveillance, invigilation, and physical evidence are all:

A) Theft act investigation methods
B) Conversion investigations methods
C) Inquiry investigation methods
D) Concealment investigations methods
Question
The final step in a fraud investigation is

A) Search public records
B) Interview former employers and co-workers
C) Surveillance and invigilation.
D) Interview suspect
Question
Characteristics of invigilation include which of the following?

A) A method of creating a loosely monitored environment that catches the fraudulent action
B) An inexpensive method to monitor the suspect for a short time period.
C) A method comparing regular periods with a temporary period of enhanced controls
D) A method of watching and recording physical facts and movement
Question
Invigilation is

A) A theft investigation technique that analyzes physical evidence
B) A theft investigation technique that closely supervises suspects closely
C) A type of undercover operation
D) Interviewing the suspect at the beginning of the investigation
Question
Which of the following is the last step in an investigation?

A) Interview suspect
B) Interview former employees
C) Interview other buyers or co-workers
D) Invigilation
Question
Which of the following is not an essential part of documenting a surveillance or observation investigation?

A) Name of observer
B) Position of observance
C) Time of observance
D) Distance from scene
E) All of the above are essential
Question
Surveillance is usually used to investigate

A) Theft acts
B) Concealment
C) Conversion
Question
When would an undercover operation not be recommended?

A) When large-scale collusion is suspected
B) When other investigation methods have failed
C) When investigation is difficult to monitor
D) When there is significant reason to believe that massive fraud is occurring
Question
The best pattern to use to conduct a fraud/theft investigation includes:

A) Search public records, interview suspect, invigilation
B) Check personnel records, invigilation, interview suspect
C) Interview suspect, invigilation, interview former employers
D) Interview co-workers, interview former employers, interview suspect
Question
Invigilation is one of the techniques used as a method for ________ investigation.

A) Concealment
B) Theft
C) Conversion
D) Inquiry
Question
Which of the following statements is false?

A) Seasoned fraud investigators are careful to begin their investigations in a manner that does not arouse suspicion.
B) Seasoned fraud investigators avoid using words like "investigation"
C) Seasoned fraud investigators usually start by approaching a suspect
D) Seasoned fraud investigators focus on gathering the strongest types of evidence.
Question
Which of the following is not an investigation technique for fraud?

A) Theft act investigation methods
B) Concealment investigation methods
C) Inquiry investigation methods
D) Rationalization investigation methods.
Question
Subjects of covert operations are protected against unreasonable breaches of privacy under:

A) The Fourth Amendment.
B) The Fifth Amendment.
C) Foreign Corrupts Practices Act.
D) The Seventh Amendment.
Question
Undercover operations should only be used when:

A) Other investigation methods fail.
B) The results can remain hidden from law enforcement.
C) Small-scale or irregular fraud is suspected.
D) A top manager is the suspected perpetrator.
Question
Which of the following is not a type of surveillance?

A) Stationary or fixed point
B) Covert invigilation
C) Moving or tailing
D) Electronic surveillance
Question
Which of the following is not a method for theft investigation?

A) covert operations (surveillance)
B) computer searches
C) Invigilation
D) Physical Evidence
Question
Methods for theft act investigations include all of the following EXCEPT:

A) Surveillance and covert operations
B) Interviews and interrogation
C) Invigilation
D) Physical evidence
Question
When investigating fraud, detectives should usually interview suspects:

A) At the beginning of the investigation to really put the heat on them
B) In the middle of the investigation to make them feel like their not really a suspect
C) At the end of the investigation to allow time to find the most evidence against them
Question
Which of the following should not be the first step you take in a fraud investigation?

A) Interview employees who are not suspects
B) Check company records
C) Search public records
D) Interview suspects
Question
All of the following could be used in an investigation of suspected kickbacks except:

A) Interview unsuccessful buyers
B) Search public records to gather evidence about the person's lifestyle
C) Check the employee's personnel records of financial difficulties
D) Interview unsuccessful vendors
E) All of above could be used in the investigation
Question
The following are all part of the process for gathering electronic evidence except:

A) Clone the device
B) Calculate CRC checksum
C) Scan the device for errors
D) Check the device manually
E) All of the above are part of the process for gathering electronic evidence
Question
The following are all types of surveillance except:

A) Stationary surveillance
B) Moving surveillance
C) Electronic surveillance
D) Wiretapping
E) All of the above are types of surveillance
Question
__________ is much more risky than stationary surveillance and is a job best left to professionals.

A) Forensic accounting
B) Electronic surveillance
C) Invigilation
D) Tailing
Question
Locating a scene to be observed, anticipating the actions that are most likely to occur at the scene, and keeping detailed notes on tape or film is:

A) Static surveillance
B) Electronic Surveillance
C) Stationary surveillance
D) Moving surveillance
Question
Which of the following is true about invigilation?

A) Detailed records are obtained before and after the period of invigilation
B) During the period of invigilation, evidence is presented to suspects with the hopes of getting a confession
C) When invigilation is conducted, it is best to cover all aspects of the business
D) Invigilation can be accomplished in as short as 2-3 days
Question
Imposing strict temporary controls to supervise an employee is an example of:

A) Vulnerability chart analysis
B) Surveillance
C) Honesty Testing
D) Invigilation
Question
A vulnerability chart coordinates the various elements of a possible fraud including all the following except:

A) Pressures on the company
B) Concealment possibilities
C) Conversion possibilities
D) Symptoms observed
E) A, B, and D
F) None of the above
Question
In most investigations of a fraud suspect, investigators should begin by:

A) Confronting the suspect.
B) Checking personal and company records
C) Interviewing co-workers.
D) Performing invigilation.
Question
Undercover operations are costly and time-consuming and should be used with extreme care. In which of the following situations would it be ineffective to conduct an undercover operation?

A) When Law enforcement authorities are informed.
B) When the investigation can be closely monitored
C) When other investigation methods are applicable
D) When the investigation can remain secretive
Question
Invigilation is an effective way to remove which element of the fraud triangle?

A) Rationalization
B) Opportunity
C) Pressure
D) None of the above
Question
Which of the following conditions is not necessary to conduct undercover operations:

A) The investigation can remain secretive
B) Large-scale collusion is likely
C) Subpoena has been issued by a court
D) Other investigation methods fail
Question
A ___________________ is a tool that coordinates the various elements of a fraud investigation to help identify possible suspects.

A) Vulnerability chart
B) Subpoena
C) Chain of custody
D) Invigilation
Question
Legal undercover operations are __________ and ____________ and should be used with extreme care. (Choose the option that best describes legal undercover operations.)

A) Costly, time-consuming
B) Fun , exciting
C) Invasive, embarrassing
D) Quick, Dangerous
Question
Undercover operations are costly and time-consuming and should be used with extreme care. In which situation would it better NOT to conduct an undercover operation?

A) Law enforcement authorities are informed when appropriate evidence has been accumulated
B) The investigation can be closely monitored
C) Other investigation methods are applicable
D) The investigation can remain secretive
Question
Why do fraud investigations initially involve few people and avoid the word "investigation?"

A) To avoid alerting suspects about the investigation
B) To avoid incriminating innocent people
C) To avoid unnecessary stress or suspicion among employees
D) All of the above
Question
Theft investigation usually begins with which of the following.

A) Involve very few people and avoid using words like 'investigation'
B) Interview the prime suspect
C) Interview other buyers, co-workers, etc.
D) Inform employees that an investigation is under way.
Question
Which of the following are not methods of investigations for theft?

A) Surveillance
B) Invigilation
C) Physical Evidence
D) None of the Above
Question
Experts recommend that invigilation must continue for at least:

A) 7 days
B) 14 days
C) 21 days
D) Experts do not agree on the length that invigilation must continue
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/40
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Investigating Theft Acts
1
Which investigation technique relies on a person's senses, especially hearing and seeing?

A) Invigilation
B) Surveillance and covert operations
C) Computer-based searches
D) Honesty testing
B
A: It does not rely on the senses
C: It does not rely on the senses
D: It does not rely on the senses
2
A vulnerability chart is used to

A) Organize answers to investigative questions
B) Identify who had the opportunity to commit the fraud
C) Determine the possible motive for the fraud
D) All of the above
D
A: This is one of the purposes of a vulnerability chart, but not the only one listed as an answer.
B: This is one of the purposes of a vulnerability chart, but not the only one listed as an answer.
C: This is one of the purposes of a vulnerability chart, but not the only one listed as an answer.
D: All of the above are purposes of a vulnerability chart (p. 183)
3
In considering the fraud triangle plus inquiry approach to investigation, surveillance, invigilation, and physical evidence are all:

A) Theft act investigation methods
B) Conversion investigations methods
C) Inquiry investigation methods
D) Concealment investigations methods
A
A: Correct; they are all theft act investigation methods
4
The final step in a fraud investigation is

A) Search public records
B) Interview former employers and co-workers
C) Surveillance and invigilation.
D) Interview suspect
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
5
Characteristics of invigilation include which of the following?

A) A method of creating a loosely monitored environment that catches the fraudulent action
B) An inexpensive method to monitor the suspect for a short time period.
C) A method comparing regular periods with a temporary period of enhanced controls
D) A method of watching and recording physical facts and movement
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
6
Invigilation is

A) A theft investigation technique that analyzes physical evidence
B) A theft investigation technique that closely supervises suspects closely
C) A type of undercover operation
D) Interviewing the suspect at the beginning of the investigation
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is the last step in an investigation?

A) Interview suspect
B) Interview former employees
C) Interview other buyers or co-workers
D) Invigilation
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is not an essential part of documenting a surveillance or observation investigation?

A) Name of observer
B) Position of observance
C) Time of observance
D) Distance from scene
E) All of the above are essential
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
9
Surveillance is usually used to investigate

A) Theft acts
B) Concealment
C) Conversion
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
10
When would an undercover operation not be recommended?

A) When large-scale collusion is suspected
B) When other investigation methods have failed
C) When investigation is difficult to monitor
D) When there is significant reason to believe that massive fraud is occurring
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
11
The best pattern to use to conduct a fraud/theft investigation includes:

A) Search public records, interview suspect, invigilation
B) Check personnel records, invigilation, interview suspect
C) Interview suspect, invigilation, interview former employers
D) Interview co-workers, interview former employers, interview suspect
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
12
Invigilation is one of the techniques used as a method for ________ investigation.

A) Concealment
B) Theft
C) Conversion
D) Inquiry
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following statements is false?

A) Seasoned fraud investigators are careful to begin their investigations in a manner that does not arouse suspicion.
B) Seasoned fraud investigators avoid using words like "investigation"
C) Seasoned fraud investigators usually start by approaching a suspect
D) Seasoned fraud investigators focus on gathering the strongest types of evidence.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is not an investigation technique for fraud?

A) Theft act investigation methods
B) Concealment investigation methods
C) Inquiry investigation methods
D) Rationalization investigation methods.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
15
Subjects of covert operations are protected against unreasonable breaches of privacy under:

A) The Fourth Amendment.
B) The Fifth Amendment.
C) Foreign Corrupts Practices Act.
D) The Seventh Amendment.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
16
Undercover operations should only be used when:

A) Other investigation methods fail.
B) The results can remain hidden from law enforcement.
C) Small-scale or irregular fraud is suspected.
D) A top manager is the suspected perpetrator.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is not a type of surveillance?

A) Stationary or fixed point
B) Covert invigilation
C) Moving or tailing
D) Electronic surveillance
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is not a method for theft investigation?

A) covert operations (surveillance)
B) computer searches
C) Invigilation
D) Physical Evidence
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
19
Methods for theft act investigations include all of the following EXCEPT:

A) Surveillance and covert operations
B) Interviews and interrogation
C) Invigilation
D) Physical evidence
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
20
When investigating fraud, detectives should usually interview suspects:

A) At the beginning of the investigation to really put the heat on them
B) In the middle of the investigation to make them feel like their not really a suspect
C) At the end of the investigation to allow time to find the most evidence against them
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following should not be the first step you take in a fraud investigation?

A) Interview employees who are not suspects
B) Check company records
C) Search public records
D) Interview suspects
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
22
All of the following could be used in an investigation of suspected kickbacks except:

A) Interview unsuccessful buyers
B) Search public records to gather evidence about the person's lifestyle
C) Check the employee's personnel records of financial difficulties
D) Interview unsuccessful vendors
E) All of above could be used in the investigation
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
23
The following are all part of the process for gathering electronic evidence except:

A) Clone the device
B) Calculate CRC checksum
C) Scan the device for errors
D) Check the device manually
E) All of the above are part of the process for gathering electronic evidence
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
24
The following are all types of surveillance except:

A) Stationary surveillance
B) Moving surveillance
C) Electronic surveillance
D) Wiretapping
E) All of the above are types of surveillance
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
25
__________ is much more risky than stationary surveillance and is a job best left to professionals.

A) Forensic accounting
B) Electronic surveillance
C) Invigilation
D) Tailing
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
26
Locating a scene to be observed, anticipating the actions that are most likely to occur at the scene, and keeping detailed notes on tape or film is:

A) Static surveillance
B) Electronic Surveillance
C) Stationary surveillance
D) Moving surveillance
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following is true about invigilation?

A) Detailed records are obtained before and after the period of invigilation
B) During the period of invigilation, evidence is presented to suspects with the hopes of getting a confession
C) When invigilation is conducted, it is best to cover all aspects of the business
D) Invigilation can be accomplished in as short as 2-3 days
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
28
Imposing strict temporary controls to supervise an employee is an example of:

A) Vulnerability chart analysis
B) Surveillance
C) Honesty Testing
D) Invigilation
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
29
A vulnerability chart coordinates the various elements of a possible fraud including all the following except:

A) Pressures on the company
B) Concealment possibilities
C) Conversion possibilities
D) Symptoms observed
E) A, B, and D
F) None of the above
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
30
In most investigations of a fraud suspect, investigators should begin by:

A) Confronting the suspect.
B) Checking personal and company records
C) Interviewing co-workers.
D) Performing invigilation.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
31
Undercover operations are costly and time-consuming and should be used with extreme care. In which of the following situations would it be ineffective to conduct an undercover operation?

A) When Law enforcement authorities are informed.
B) When the investigation can be closely monitored
C) When other investigation methods are applicable
D) When the investigation can remain secretive
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
32
Invigilation is an effective way to remove which element of the fraud triangle?

A) Rationalization
B) Opportunity
C) Pressure
D) None of the above
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following conditions is not necessary to conduct undercover operations:

A) The investigation can remain secretive
B) Large-scale collusion is likely
C) Subpoena has been issued by a court
D) Other investigation methods fail
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
34
A ___________________ is a tool that coordinates the various elements of a fraud investigation to help identify possible suspects.

A) Vulnerability chart
B) Subpoena
C) Chain of custody
D) Invigilation
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
35
Legal undercover operations are __________ and ____________ and should be used with extreme care. (Choose the option that best describes legal undercover operations.)

A) Costly, time-consuming
B) Fun , exciting
C) Invasive, embarrassing
D) Quick, Dangerous
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
36
Undercover operations are costly and time-consuming and should be used with extreme care. In which situation would it better NOT to conduct an undercover operation?

A) Law enforcement authorities are informed when appropriate evidence has been accumulated
B) The investigation can be closely monitored
C) Other investigation methods are applicable
D) The investigation can remain secretive
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
37
Why do fraud investigations initially involve few people and avoid the word "investigation?"

A) To avoid alerting suspects about the investigation
B) To avoid incriminating innocent people
C) To avoid unnecessary stress or suspicion among employees
D) All of the above
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
38
Theft investigation usually begins with which of the following.

A) Involve very few people and avoid using words like 'investigation'
B) Interview the prime suspect
C) Interview other buyers, co-workers, etc.
D) Inform employees that an investigation is under way.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following are not methods of investigations for theft?

A) Surveillance
B) Invigilation
C) Physical Evidence
D) None of the Above
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
40
Experts recommend that invigilation must continue for at least:

A) 7 days
B) 14 days
C) 21 days
D) Experts do not agree on the length that invigilation must continue
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 40 flashcards in this deck.