Question
1.Recording an expense to conceal fraud involves making a fictitious journal entry. A faulty journal entry is an example of which fraud symptom? A. Accounting
1.Recording an expense to conceal fraud involves making a fictitious journal entry. A faulty journal entry is an example of which fraud symptom?
A. Accounting anomaly
B.Internal control weakness
C.Unusual behavior
D.Analytical anomaly
2.The proactive method of fraud detection is a six-step process. Which of the following is the correct process sequence?
A.Identify possible frauds that could exist; catalog possible fraud symptoms; understand the business; use technology to gather data about symptoms; automatic detection procedures; analyze results; and investigate symptoms.
B.Catalog possible fraud symptoms; understand the business; identify possible frauds that could exist; analyze results; use technology to gather data about symptoms; and investigate symptoms.
C.Understand business; identify possible frauds that could exist; catalog possible fraud symptoms; investigate symptoms; use technology to gather data about symptoms; and analyze results.
D.Understand the business; identify possible frauds that could exist; catalog possible fraud symptoms; use technology to gather data about symptoms; analyze results; and investigate symptoms.
3.Which of the following is the most direct method of focusing on changes in the company's balance sheet and income statement?
A.Calculating key ratios and comparing them from period to period.
B.Comparing account balances in the statements from one period to the next.
C.Performing a vertical analysis.
D.Performing a horizontal analysis.
E.None of the above
4.Which of the following is an analytical symptom of a kickback?
A.Decreasing purchases from other vendors.
B.Charging normal price for goods supplied.
C.Providing better quality goods.
D.Smaller purchase quantities and more frequent orders.
5.Digital analysis is:
A.The art of analyzing the digits that make up numbers like invoice amounts, reported hours, and costs.
B.A technique which calculates the average probability for each grouping of data.
C.The searching for expected relationships between numbers.
D.The use of numeric values for decision making.
6.When investigating fraud, investigators should usually interview suspects:
A.At the beginning of the investigative process to really put the heat on them.
B.In the middle of the investigative process to make them feel that they are not really a suspect.
C.At the end of the investigative process so that they can gather sufficient evidence against them.
D.Any time during the investigative process to avoid creating undue stress and suspicion among other employees.
7.What is invigilation?
A.A theft investigation technique which records the physical evidence, facts, and movements, which form part of a fraud.
B.A theft investigation technique which involves close supervision of the suspects during the examination period.
C.A theft investigation technique which is used when large scale fraud is likely and other methods of investigation fail.
D.A theft investigation technique which involves confiscating and searching computers and other electronic sources of information.
E.None of the above
8.An investigator locates the scene that should be observed, anticipates the action that is most likely to occur at the scene, and keeps detailed notes on all activities involving the suspect. Which type of surveillance is being used here?
A.Static surveillance.
B.Electronic surveillance.
C.Stationary surveillance.
D.Moving surveillance.
9.Undercover operations are costly and time-consuming and should be used with extreme care. In which of the following situations would it be ineffective to conduct an undercover operation?
A.When law enforcement authorities are informed.
B.When the investigation can be closely monitored.
C.When other investigation methods are available.
D.When the investigation can remain secretive.
10.Several factors are considered in deciding whether or not to investigate fraud. Which of the following is NOT one of them?
A.The signal that investigation or noninvestigation will send to others in the organization.
B.Perceived cost of the investigation.
C.Exposure or amount that could have been taken.
D.Perceived strength of the predication.
E.Preparation of a surveillance log.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started