ACC 5375- Forensic Accounting-FINAL

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/199

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:08 PM on 4/28/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

200 Terms

1
New cards

Which legal code makes the bribing of public officials illegal?

Title 18, US Code Section 201

2
New cards

Which of the following statements about criminal and civil cases is correct?

The purpose of a criminal case is to right a wrong , the purpose of civil case if to obtain a remedy

3
New cards

Which of the following skills would be LEAST beneficial in a career as a fraud fighting professional?

Mechanical Skills

4
New cards

Fraud stats comes from all of the following sources EXCEPT

Fraud perpetrators

5
New cards

Who are the primary victims of financial statement fraud?

Stockholders

6
New cards

Fraud in companies such as world com, eron , and parmalat are examples of

Management Fraud

7
New cards

One way that criminal law differs from civil law is that it:

Must yeild a unanimous verdict

8
New cards

Which individual listed is most likely to commit finanacial statement fraud in order to benefit an organization?

An executive

9
New cards

Civil claims begin when one party files a complain against another, usually for the purpose of

Being awarded financial restitution

10
New cards

Which of the following frauds is usually the most expensive?

Management (Financial Statement) Fraud

11
New cards

Which of the following is NOT an example of a fraud fighting career?

Serving as an expert witness

12
New cards

Which of the following is NOT an element of a Ponzi Scheme?

Maintaining the security of public records

13
New cards

Which of the following is a result of the presense of fraud prevention controls within an organization?

Employees are less likely to commit fraud

14
New cards

Which of the following is true about legal action taken by orgizations that are the victims of fraud?

Legal action is taken in fewer than half of the fraud committed

15
New cards

Which of the following is an example of an authorization control procedure?

Password protection

16
New cards

A person may have very strong ethics in the way they treat family and friends, but not understand how failure to submit to unethical or fraudulent behavior. This is an ethical issue in which level of the ethical maturity model?

Application of ethics to bussiness situations

17
New cards

Which of the following observations is true ?

Most fraud perpetrators have profiles that are similar to those of other people.

18
New cards

In the ethical maturity model, instilling in others desire to develop ethical awareness an courage is referred to as:

Ethical leadership

19
New cards

Which of the following is NOT a possible control activity?

Supervisory review of each task completed by employees

20
New cards

An orginazation that requires that employee in its accounting department take mandatory vactions once a year. Which control activity is the company using?

Independent checks

21
New cards

Which of the following indicates proactive frauds auditing?

Creating an awareness amoung employees that their actions can be reviewed at any time

22
New cards

How does a smart embezzler manipulate accounting records to conceal fraud?

By increasing Expenses

23
New cards

Which of the following is true statement in regards to the actions of a person who has commited fraud?

A fraud perpetrator may start entertaining co workers more often and more lavishly

24
New cards

Which of the following acts by management could discourage someone frome reporting an observed act of fraud?

Providing a clear list or possible consequences

25
New cards

Which of the following is a highly suspicious financial statement relationship?

Increased inventory with decreased payables

26
New cards

Indentify the formula used to calculate z score

(Value - Mean) / Standard Deviation

27
New cards

The proactive method of fraud dection is a 6 step process. Which of the following is the correct process sequence?

1- Understand the business
2- Identify possible frauds that could exist
3- Catalog possible fraud symptoms
4- Use technology to gather data about symptoms
5- Analyze results
6- Investigate symptoms

28
New cards

Specific implementations of delimited text are called TSV. What does TSV stand for?

Tab seperated values

29
New cards

Which of the following is least effective while searching for anomalies?

Comparing account balances in the statements from one period to the next

30
New cards

What is the primary drawbacks of the data driven approach?

More expensive and time intensive than the traditional approach

31
New cards

Most software packages have functions for generating _____ about columns of data, which include statistical summaries like control totals, mean, maximum, minimum, standard deviation, number of zero values, number of empty records, and so on.

Descriptives

32
New cards

One of the most common errors investigators make when analyzing time trend is:

Not standardizing time

33
New cards

According to Benford's law, 5 will be the first digit of a random number set:

Less often then 4

34
New cards

Telemarketing fraud usually falls in this category

Investment scams

35
New cards

The burder of proof in a criminal case

Is beyond a resonable doubt

36
New cards

Which of the following is a common example of vendor fraud

Fraud perpetrated through collusion between buyers and vendors

37
New cards

To be successful, plaintiffs in civil cases must prove their cases by which of the following?

By the preponderance of the evidence

38
New cards

Which of the following is the most common type of occupational fraud?

Employee Embezzlement

39
New cards

Which of the following is NOT a characteristic of a crimninal Proceeding?

Consequenses include restitution and damage payments

40
New cards

The ACFE does NOT include which of the following major categories of occupational fraud?

Pension fraud

41
New cards

The word "Con" Whihc means to deceive, comes from the word :

Confidence

42
New cards

Which level in the ethical maturity model can be summarized as a "willingness to pay the price for ethics"?

Ethical Courage

43
New cards

Individuals often partcipate in fraud because they believe that by not participating in the fraud scheme, they may lose:

Coercive power

44
New cards

In recent years, organizations have implemented a number of initiatives to more proactively detect fraud. The first and most common proactive fraud detection approach has been to:

Install reporting hotlines

45
New cards

Which of the following is NOT a proactive hiring procedure?

Instilling in employees a desire to develop ethical awareness and courage to do the right thing

46
New cards

Which of the following is NOT a part of the evidence square?

Management evidence

47
New cards

Which of the following is NOT a true statement?

Perceived opportunity diminishes when fraud prepetrators are prosecuted

48
New cards

Which of the following is NOT one of the key elements common to all frauds?

Perceived inequality

49
New cards

Which type of evidence is gathered from individuals using investigative techniques such as interviewing and interrogation?

Testimonial Evidence

50
New cards

An employee who has the resonsibility of both writing checks and making bank deposits would have ___ to commit fraud

A percieved opportunity

51
New cards

Most fraud perpeturators have profiles that looks like:

Those of honest people

52
New cards

What is the most important element in a control environment?

Managment's role and example

53
New cards

Which of the following is FALSE concerning legal actions by organizations regarding fraud?

Legal action stops future frauds

54
New cards

In an orgnization, individuasls who suspect fraud usually dont come forward because they:

Fear beinf branded a whistle blower

55
New cards

Implementing a system of independent checks is one of the most effective ways to deter fraud. Which one of the following is NOT a way of providing independent checks on employees?

Authorization required for purchases of over $2,000.00 or more

56
New cards

Which of the following is FALSE regarding a comprehensive approach of fighting fraud?

Detecting fraud is the responsilibity of the independent auditors

57
New cards

Which of the following observations concerning collusive frauds is TRUE?

They are usually slower to develop then fruds committed by one individual.

58
New cards

In order to detect fraud at the earliest, a manager should pay attention to:

Present lifestyle

59
New cards

Which of the following is NOT an analytical fraud symptom?

Overriding of existing

60
New cards

Preventing controls includes:

Segregation of duties

61
New cards

Which of the following actions would most likely create a opportunity for fraud?

Requiring one password code for each entire department to enter the store room

62
New cards

Which of the following is a true statement in regards to tell tell signs of fraud in employees?

Lifestyle changes are often the easiest fraud symptoms to detect

63
New cards

Which of the following is the fondation fo rall other componets of internal control, providing discipline and structure?

Control Enviroment

64
New cards

Approximately ___ of all frauds are commited by an individual acting alone. The remaining___ involve collusion and often involve the ___ thefts

71% , 29%, Largest

65
New cards

Which term refers to people who commit a fraud or other crime and do not feel guilt or stress?

Psycopaths

66
New cards

The correst order of the 6 elements of the fraud fighting moedl is:

1- Tone at the top
2- Education and training
3- Integrity risk and controls
4- Reporting and monitoring
5- Proactive detection
6- Investigation and follow up

67
New cards

Research in psychology indicated that when people commit a crime, they are initially overwhelmed by ___ and ___

Guilt and Fear

68
New cards

One way to create and communicate clear expectations about what is and is not acceptable in an organization is :

Having a clearly defined code of conduct in place

69
New cards

A red flag search to detect kickbacks would include:

Price increases greater than 20% for several consecutive years

70
New cards

While using n-grams, a match percentage of ________ or ________ generally indicates very similar values.

20% or Greater

71
New cards

Horizontal Analysis is performed when:

financial statement data are shown for two periods with the amount and percentage of change for each line item.

72
New cards

Which of the following record data for each case in a graph and analyzes the slope?

Time trend analysis

73
New cards

Kickbacks from vendors to buyers might generate which one of the following symptoms?

Buyer not relating well to other buyers and vendors

74
New cards

Which of the following financial statements can be used to answer the question, "where did the cash come from to pay dididends?"

Statement of cash flows

75
New cards

Which of the following statements regarding ODBC is NOT accurate?

ODBC stands for Open Datebase Communications

76
New cards

Bendford's Law

Applies best to numbers that occur naturally

77
New cards

One of the disadvantages of Bendford's Law in detecting fraud is:

It only broadly identifies the possible existense of fraud, it fails to narrow possibilities to a manageable field of promising leads

78
New cards

Which of the following ratios can be used to assess a company's Sovency?

Current Ratio

79
New cards

What is the primary advantage of the data driven approach?

The investigator takes charge of the fraud investigation process

80
New cards

Which of the following is true of most accounting errors?

They are problems caused by failure in systems, procedure and policies

81
New cards

Surveillance is usually used to investigate

Theft acts.

82
New cards

Which of the following is a basic objective of surveillance, whether manual or electronic

Catch fraud at the theft act stage

83
New cards

An investigatior locates the scence that should observed, anticipated the action that is most likely to occur at the scenece, and keeps detailed notes on all activities involving the suspect. Which type of surveillance is being used here?

Stationary Surveillance

84
New cards

What is used in court cases to prove that data has not been adversely affected during analysis?

Checksums

85
New cards

Which of the following statements regarding invigilation is accurate?

It is most commonly used in such high risk areas such as expensive inventory

86
New cards

Which of the following is a benefit of creating a vulnerability chart?

It forces the investigators to explicitly consider all aspects of a fraud act

87
New cards

A divisional manager is suspected of adding ghost employees to the payroll. Which investigative method can most easily uncover this type of fraud?

Concealment

88
New cards

Web based e mail within a user's browser

Is especially easy to search requiring no search warrant.

89
New cards

Which investigation technique usually does not work well in kickback situations?

Concealment

90
New cards

Electronic surveillance may have only limitied value in the investigation of employee frauds and many other white collar crimes. Why?

Concerns regarding employees' privacy

91
New cards

Identify the best pattern/order to go about a theft investigation.

Check personnel record, interview former emploers, search public records, interview other buyers, and interview other buyers and interview suspects.

92
New cards

__ means that there are symptoms or red flags that a fraud may be occuring.

Predication

93
New cards

Which general term refers to the gathering of electronic evidence?

Computer forensics

94
New cards

Undercover operations should be used only when:

large scale fraud is likely and other investigation methods fail.

95
New cards

The two primary checksum methos used today are:

MDS and SHA-1

96
New cards

Concealment investigative techniques do not work well in kickback situations. Why?

There is usually no direct documentary evidence

97
New cards

Identify the first step in any electronic evidence collection process.

Seizure of the device

98
New cards

Which of the following are theft act investigation methods that usually involves observing or listening to potential perpetrators?

Surveillance and covert operations

99
New cards

Which investigation technique relies on a person's senses, especially hearing and seeing?

Surveillance and covert operations.

100
New cards

Which checksum methos is considered more advanced and secure than the method it replaced?

SHA-1