Fraud Examination Final - Ch.8, 9, 10, 11, 14, 15

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/95

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

96 Terms

1
New cards

An audit is a method of what kind of investigation?

Concealment investigation

2
New cards

Concealment investigation

Computer searches and physical asset counts are methods for ___.

3
New cards

Secondary evidence may be used in all of the following instances except:

The original documents are too fragile to be handled.

4
New cards

DocLab is a division of which organization?

FBI

5
New cards

Moe owns a 24-hour convenience store. He has noticed that the amounts of liquor inventory purchases have gotten bigger and frequent lately. Nevertheless, sales provided by this particular item haven't increased. He is concerned that the two night-shift employees might be involved. The best method to use for this investigation is:

Concealment investigation

6
New cards

Non-sampling risk

The risk that an auditor examines a fraudulent check and does not recognize it as being fraudulent is called:

7
New cards

Methods for a concealment investigation do not include?

Honesty Testing

8
New cards

Bills of Laden, Sales Receipts, Titles, Insurance Policies

Concealment is generally accomplished by manipulating any of the following documents:

9
New cards

Which of the following is generally not an approach to investigate the concealment aspect of fraud?

Polygraph Tests

10
New cards

Which of the following is a common method used by auditors to look for the existence of fraud?

Gathering evidence and checking for fraud symptoms.

11
New cards

Which of the following should be used when ensuring that the documents are legitimate and accessible for trial?

Marking the evidence

12
New cards

The three most common ways to obtain documentary evidence are___.

By subpoena, search warrant, and voluntary consent.

13
New cards

Each of the following is true about concealment investigation EXCEPT:

Invigilation (tightening controls to establish a fraud-free baseline and closely supervising the suspects during an examination period) is considered a concealment investigation technique.

14
New cards

Which of the following is not a common way to obtain hard-to-get documentary evidence?

Force

15
New cards

What information cannot be obtained from an internet search?

A perpetrator’s purchase of expensive jewelry.

16
New cards

Searching through someone’s garbage is considered a legal activity when:

The trash has left the person’s home or sidewalk.

17
New cards

What are the “financial footprints” of investigating conversion that fraud investigators look for?

Changes in lifestyle, net wroth and assets.

18
New cards

Which is not a federal source of information?

Secretary of State

19
New cards

To effectively conduct conversion investigations, what is not necessary for a fraud examiner to understand?

The different types of audits that can be conducted

20
New cards

To effectively conduct conversion investigations, a fraud examiner must thoroughly understand all of the following:

how to search records for information, types of information available, and net worth method of spending and analyzing spending information.

21
New cards

Which of the following is an example of a state source of information?

Department of Motor Vehicles

22
New cards

All of the following federal agencies maintain information that can help fraud investigations:

Social Security Information, Dept. of Justice, Postal Service

23
New cards

Because the use of ____ is so common in frauds, the ____ can be a fraud investigators most important ally.

mail, Postal Service

24
New cards

Which of the following statements are true:

The amounts determined to be stolen using the net worth method are usually readily accepted as evidence by courts.

Net worth calculations tend to give a conservative estimate of stolen funds.

Both are correct statements

25
New cards

Funds from Unknown Sources equals:

Income - Funds from Known Sources

26
New cards

Under the "Net Worth Method," a person who has an increase in net worth of $100,000, known income of $80,000, and a salary of $60,000 would have unknown income of

$20,000 (100,000 - 80,000)

27
New cards

Which of the types of information do credit reporting agencies maintain?

  1. Information of current and former employers

  2. Account information

  3. Marketing information such as customer breakdowns

  4. Consumer information such as addresses and family members

28
New cards

In the sequence of reactions to a crisis, which is the most dangerous time to attempt to solve a fraud?

Anger

29
New cards

Which is not a reaction to crisis:

Apathy

30
New cards

Common Reactions to Crisis:

Denial, Depression, Barging, Acceptance

31
New cards

During which stage of the reactionary process is the most useful time to interview individuals who are dealing with fraud?

acceptance

32
New cards

Which is the last reaction in the predictable sequence of reactions?

Acceptance

33
New cards

Which is one of the most important personality traits of being an effective interviewer?

Outgoing

34
New cards

What is a characteristic for a good interviewer?

One who is able to get others to open up and share information.

35
New cards

All of the following are true concerning the preparation for an interview:

  • Interview room should establish privacy

  • Investigator should not suggest counsel present

EXCEPT: investigator must give Miranda warnings to the accused

36
New cards

Which item about the interviewee is not a fact that needs to be obtained while planning an interview?

Information about the interviewee’s legal counsel.

37
New cards

Which is not a characteristic of a good interview?

The interview is short in length, and interview is conducted as far away from the event as possible

38
New cards

Which is NOT a step in an admission-seeking interview?

Intimidation Tactics

39
New cards

Which is NOT an important Closing Question?

“In conclusion, what do you think should be done?”

40
New cards

What is NOT considered a basic strategy in admission-seeking interviews?

Minimizing sympathy

41
New cards

What is an element of a leading question?

It contains the answer in it.

42
New cards

Which of the following is TRUE concerning signed statements?

Declarants should read and sign the statements without undue delay.

43
New cards

Understanding a company’s relationships with financial institutions and bondholders is important because:

it can indicate the extent to which the company is leveraged

44
New cards

If a law firm no longer wants to conduct business with a client, after long years of profitable business, this may be a warning sign for:

financial statement fraud occurring

45
New cards

The ___ is the most likely executive to orchestrate and commit fraud.

CEO

46
New cards

Which organizational characteristic is a red flag for fraud:

An audit committee comprised mainly of insiders.

47
New cards

Lifestyle changes are usually not factors in detecting:

financial statement fraud

48
New cards

Fraudulent related-party transactions are discovered by doing the following:

Examining large or unusual transactions

49
New cards

Relationships with related parties are heavily investigated for fraud because:

They allow for other than arms-length transactions

50
New cards

If during an audit, fraudulent financial reporting is found, who is most likely to have committed the fraud?

Top Management

51
New cards

Frauds are more likely to occur in what kind of environment?

Smaller companies where one or two individuals have almost all control in decision making.

52
New cards

Which of the following is not a common red flag for financial statement fraud?

Previous net losses

53
New cards

Common financial statement fraud red flags?

Missing Documents, out of balance general ledger, unexpected analytical relationships

54
New cards

In addition to changes in financial statements, which of the following can indicate financial statement fraud has occurred?

Information in the footnotes to the financial statements.

55
New cards

What are NOT common ways that financial statement fraud is perpetrated?

Overstating Liabilities

56
New cards

In which of the following situations is fraud most likely to occur?

Small companies with autocratic leadership

57
New cards

A characteristic prevalent in most frauds:

The company CEO was the perpetrator

58
New cards

The termination of an auditor-auditee relationship can be caused by all but which of the following?

State government mandate to break long term audit relationships.

59
New cards

Causes of a termination of an auditor-auditee relationship

Failure of the client to pay, disagreements, auditor’s suspicion of fraud

60
New cards

Financial Statement fraud is usually committed by:

Upper Management

61
New cards

______ must model ______ behavior for others to follow.

Management, ethical

62
New cards

Worldcom's fraud was caused by

overstated cash flows by recording operating expenses as capital expenses

63
New cards

What led to large accounting frauds in the early 2000s?

Individual and collective greed involving management, auditors, accountants, bankers, lawyers, and rating agencies

64
New cards

Enron’s principal method of financial statement fraud…

overstated earnings with related party transactions, special purpose entities, and off balance sheet transactions.

65
New cards

Four types of corruption

Bribery, conflicts of interest, extortion, and illegal gratuities

66
New cards

Types of Fraudulent Disbursement

Expense reimbursement scheme, check tampering, payroll schemes

67
New cards

Check Tampering is a form of…

committing disbursement fraud

68
New cards

Understating sales by recording false or larger-than reality sales discounts

An example of theft of cash through skimming

69
New cards

What would NOT be an example of a billing scheme?

Making a claim for reimbursement of a fictitious or inflated business expenses

70
New cards

Thefts of inventory are divided into which of the following two groups:

Larceny and misuse

71
New cards

Which is not one of the four types of corruption?

Larceny

72
New cards

Bid-rigging is a form of:

Bribery

73
New cards

Intercepting checks intended for a third party and convert the checks to cash for their own use

An example of Check Tampering

74
New cards

A conflict of interest is corruption that can be defined as:

An employee having an undisclosed economic or personal stake in a transaction that adversely affects the company.

75
New cards

According to the text, skimming is a subset of which type of asset misappropriation?

Theft of cash

76
New cards

Claiming personal travel as a business expense, altering a receipt to reflect higher amount than was actually paid, or submitting fictious receipts is an example of ?

Expense reporting fraud (occupational fraud type)

77
New cards

Which of the following is one of the three main categories of occupational fraud?

Corruption

78
New cards

Which of the following disbursement fraud schemes occurs most frequently?

Billing Schemes

79
New cards

Credit Reporting Agencies

TransUnion, Equifax, and Experian are examples of:

80
New cards

Largest Type of consumer fraud:

Identity Theft

81
New cards

Cookies on the Word Wide Web can be used to…

gather personal and confidential information about a consumer

82
New cards

The elderly are often targets for consumer fraud because…

they are trusting, embarrassed, or lonely

83
New cards

Which organization should the victims of identity theft contact first?

Federal Trade Commission

84
New cards

A Nigerian money offer email scam is a form of…

Foreign advance-fee scam

85
New cards

A Nigerian money offer scam normally does all of the following

States urgent need, makes victim feel as only recipient, tries to build confidence and trust with victim

86
New cards

Demographics susceptible to consumer fraud:

uneducated, elderly, gullible, trusting

87
New cards

Snake oil plans usually include…

miracle products

88
New cards

A clearing house scam involves the victim receiving a letter that…

falsely claims the writer represents a foreign bank

89
New cards

Product testing scams are frauds that…

ask consumers to review “new” products for a price.

90
New cards

Consumer fraud is described as any fraud that…

takes place against an individual

91
New cards

Red flags for potential investment scams…

pressure to get in on an early investment, business with history of bankruptcy, use of special tax loophole

92
New cards

True or False: Multi-level Marketing Companies are illegal in the United States

False

93
New cards

Multi-level Marketing schemes have been dubbed…

Ponzi Schemes

94
New cards

When representatives of MLMs are required to buy large, expensive amounts of inventory:

Front Loading

95
New cards

A method that uses the internet to steal information…

Phishing

96
New cards

A method where criminals watch consumers from a nearby location to view credit cards or PIN numbers:

Shoulder Surfing