Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

The starting point for the use of electronic data in the fraud or forensic accounting area, as a means of fraud prevention and deterrence is

The starting point for the use of electronic data in the fraud or forensic accounting area, as a means of fraud prevention and deterrence is a/an _______________________.

Group of answer choices

Evaluation of the integrity of the data and their related systems

Robust antifraud training program focused on the IT infrastructure

Anti-virus, malware detection system running in the background of all company IT

Suitable software that can crunch big data sets (such as Excel or IDEA)

Flag this Question

Question 2

4pts

Many of the process controls applicable to paper-based information systems are analogous to the internal controls surrounding digital information systems. An information technology system (IT) audit consists of (1) planning, (2) test of controls, and (3) _____________.

Group of answer choices

Auditor training on specific systems with which the fraud examiner may be unfamiliar

Substantive tests

An audit plan whose scope limitations receive buy-in from the company

Establish a materiality threshold for IT errors that may be encountered

Flag this Question

Question 3

4pts

Batch controls are __________________ that ensure data integrity for groups of transactions as they move through the system.

Group of answer choices

System-generated criteria

Used to detect input errors by flagging those transactions that fall outside accepted ranges

Techniques to ensure that data relationships within a record make sense

Operator generated flags

Flag this Question

Question 4

4pts

Fraud professionals in the IT audit environment need to be cognizant of the possibility that ___________________________________________________.

Group of answer choices

IT personnel may not understand accounting standards and terminology

Sophisticated spear-phishing attacks may have altered the data in the system

One or more of the IT systems personnel may be colluding with others to commit or conceal fraud.

Ghost IT systems can exist within a company (much like shell companies) that can be almost impossible to detect

Flag this Question

Question 5

4pts

The IT professional may be in a unique position to commit and conceal a fraud, simply because ______________________________________.

Group of answer choices

They can make important data disappear while credibly explaining it was caused by malware or a hard drive crash

They sometimes have access to all of a company's financial transaction data

So few others understand IT and how data can be manipulated

They often know how to navigate the Dark Web undetected

Flag this Question

Question 6

4pts

The assertions of management related to financial statements include (1) the existence of assets and transactions, (2) the completeness of the transactions reflected in the financial statements and related notes, (3) proper disclosure of all rights and obligations associated with assets and liabilities, (4) the reasonableness of the valuation of transactions and balances reflected in the financial statements, and (5) _____________________________________.

Group of answer choices

Proper financial statement presentation and disclosure of the related notes

Certification of responsibility for the internal control environment

Formal attestation of any incidents of known fraud since prior audit

Internal auditor statement that they have not been coerced into overriding controls

Flag this Question

Question 7

4pts

Electronic evidence refers to any evidence captured ___________________.

Group of answer choices

With the assistance of IT or MIS professionals working in collaboration with investigators

By examining the unused space on computer hard drives (assuming files have not been lost due to defragging)

Through the use of digital tools such as Road MASSter 3 and EnCase

By computers and electronic devices

Flag this Question

Question 8

4pts

Students (of forensic accounting and fraud examination) should understand that, with regard to digital evidence, only those with specialized training, experience, and appropriate professional certifications should _____________________.

Group of answer choices

Be involved in establishing materiality thresholds for IT audits

Use CAATTs to do "black box" or "white box" investigations

Initially handle digital evidence

Provide expert testimony

Flag this Question

Question 9

4pts

It may be possible to recover deleted emails if _______________________.

Group of answer choices

A program such as Privacy Guardian was used by the perpetrator

The service provider is named in the warrant (e.g., Google for gmail)

An MIS or IT professional uses the "Defrag" command while the computer is in safe mode

An email recovery tool is used prior to compaction/overwrite of data storage location

Flag this Question

Question 10

4pts

Fraud examiners and auditors use data analysis software as ___________________, detecting a potential fraud in situations for which manual examination would prove extremely difficult or impossible.

Group of answer choices

A substitute for paper and pencil computations for

An internal control useful for

The ultimate system of red flags

Supplements to analytical work in

Flag this Question

Question 11

4pts

The common fraudster is usually depicted with the following characteristics: first-time offender, middle-aged, male, well-educated, married with children, trusted employee, in a position of responsibility, and possibly considered a "good citizen" through works in the community or through a church organization. The terminology used to refer to such a person has gravitated over time from "accidental" to ____________ fraudster.

Group of answer choices

"Non-accidental"

"Intentional"

"Predator"

"Situational"

Flag this Question

Question 12

4pts

A repeat offender is not a ___________ fraudster; he or she is better described as a __________.

Group of answer choices

Situational; predator

Accidental; situational fraudster

Predator; white collar criminal

White collar criminal; situational fraudster

Flag this Question

Question 13

6pts

Because the activities of predators and organizational crimes are more deliberate from the outset than those of the situational fraudster, they are _______________, have more __________________, and are _________________

Group of answer choices

More collusive by definition; offshore banking activities; more difficult to investigate

Better organized; sophisticated concealment schemes; well-prepared to deal with auditors and other oversight mechanisms

More expensive; reach into the banking system; usually foreign entities

Harder to detect; offshore banking activities; complex in their internal structure

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Advanced Accounting

Authors: Debra JeterJames Reeve, Jonathan Duchac, Horace Brock, Paul Chaney

4th Edition

0470506989, 978-0470506981

More Books

Students also viewed these Accounting questions

Question

1. Why do we trust one type of information more than another?

Answered: 1 week ago