Details of this Paper

____ 8. What is the thir...




____ 8. What is the third stage in the model that many companies normally use for handling fraud? a. Identification of fraudster d. Fraud incident occurs b. Investigation of the fraud e. Action taken c. Resolution of the fraud ____ 9. A U.S. District Court convicted Sue Johnson of mail fraud in. She does not agree with the judgment rendered by the court. What can she do next? a. Appeal to the Supreme Court d. Appeal to a Probate Court b. Nothing because judgments by U.S. District Courts are final. e. Nothing, as verdicts from the district courts cannot be appealed. c. Appeal the findings in one of 12 circuit courts of appeals ____ ____ 12. What is used in court cases to prove that data has not been adversely affected during analysis? a. Deviation measure d. Arithmetic mean b. Random sampling e. None of the above c. Checksums ____ 13. One way to view the results of multiple indicators is to use a chart called a ____________ . a. Matosas matrix d. summarization chart b. Soundex algorithm e. none of the above c. pareto chart ____ 14. Documents and records are an important control activity. Which of the following statements concerning this activity is true? a. The whole accounting system can function as a documentary control. d. Adequate accountability can exist even in their absence. b. They are poor detective controls. e. None of the above are true. c. They serve as excellent preventive controls. ____ 15. Which of the following environments will be least favorable to fraud? a. Proactive management d. Unreasonable budget expectations b. Perceived inequalities in the organization and inadequate pay e. None of the above c. High employee turnover ____ 16. Research on honesty shows that individuals fall into three groups: (1) those who will nearly always be honest, (2) those who are situationally honest, and (3) those who will always be dishonest. Which of these groups is (are) the biggest? a. Groups 1 and 3 (35% each) d. Group 1 (50%) b. Group 3 (45%) e. None of the above are correct. c. Group 2 (40%) ____ 17. Which of the following observations is TRUE? a. The profiles of most fraud perpetrators are indistinguishable from those of other honest people. d. Research shows that only people with a criminal mind set can commit fraud. b. The demographic characteristics of fraud perpetrators are different from others who don?t commit fraud. e. None of the above are true. c. When fraud does occur, the most common reaction by those around the fraud is confession. ____ 18. Fraud examiners differ from financial statement auditors in that the auditors: a. simply pair up documents to if substantiation is present and is sufficient. d. determine whether the documents are real. b. check whether all aspects of the documentation are in order. e. none of the above. c. determine whether the expenditures make sense. ____ ____ 20. Which of the following is not a "strange" financial statement relationship? a. Decreased volume with decreased cost per unit d. Increased revenues with decreased receivables b. Increased revenues with decreased inventory e. None of the above are c. Decreased inventory with decreased payables ____ 22. Which of the following is true about a motion? a. The motion explains the alleged violation of the law and the monetary expenses or damages sought in the case. d. After the jury has returned a verdict, the defendant cannot file motions to have the verdict set aside. b. A defendant may file a motion for summary judgment only after a case goes to trial. e. None of the above. c. A motion normally opposes the assertions made in a plaintiff?s initial pleading and requests the relief the defendant seeks. ____ 23. Studies indicate legal action against fraudsters is typically taken: a. Less than 25 percent of the time. d. More than 75 percent of the time. b. Less than 50 percent of the time. e. None of the above. c. At least 50 percent of the time. ____ 24. From the list below, which would not be a fraud symptom associated with internal control weaknesses? a. Lack of segregation of duties d. Lack of proper authorization b. Lack of physical safeguards e. Excessive turnover of executives c. Inadequate accounting system ____ 28. Which level in the ethical maturity model can be summarized as ?willingness to pay the price for ethics?? a. Personal ethical understanding d. Ethical positioning b. Application of ethics to business situations e. None of the above. c. Ethical courage ____ 29. All of the following are part of the fraud element triangle except: a. Theft act d. Concealment b. Layering e. All of the above are part of the fraud element triangle. c. Conversion ____ 30. Collection under which type of fidelity bond depends upon unequivocal evidence of employee theft? a. Blanket position bond. d. Name schedule fidelity bond. b. Primary commercial blanket bond. e. None of the above. c. Wall Street bond. ____ 31. One of the disadvantages of Benford's law in detecting fraud is: a. it is only an approximation of whether or not there is actually fraud. It does not reduce the prospects to a small enough number of leads to work with. d. it is very expensive to implement and use. b. that those cases with the lowest probabilities do not match Benford?s law and may need further investigation. e. none of the above. c. potential suspects are more likely to know you are trying to detect fraud than if you use such detection techniques. ____ 32. Who are primarily the injured parties in financial statement fraud? a. Middle management d. Insurers b. Organizations that buy goods or services e. Analysts c. Stockholders ____ 33. Out of the circumstances below, which would be least favorable to fraud? a. Moral decay in upper management d. Outstanding bills at home b. Mandatory vacation time e. All of the above are favorable to fraud c. Economic downturns ____ 34. A company is a victim of a $414 million fraud. At that time its profit margin is 10%. How much additional revenue should the company generate in order to recover the effect on net income? a. $414 million d. $4.14 billion b. $41.4 million e. None of the above. c. $41.4 billion ____ 35. Mark owns a 24-hour convenience store. Lately he has noticed that the liquor inventory purchases have gone up by huge amounts, although sales proceeds from this category haven't increased. He is doubting his two night-shift employees. Which is the best investigative method to uncover such a fraud? a. Concealment investigation d. Inquiry investigation b. Conversion investigation e. None of the above c. Covert operation ____ 36. Accounting anomaly fraud symptoms frequently consist of problems with various data and books of accounts. Which of the following is not one among them? a. Faulty journal entries d. Inaccuracies in ledgers b. Inaccuracies in source documents e. Both a and d. c. Rounding adjustments ____ 37. What are the key characteristics for a low-fraud environment? a. Recognition, remorse, and restitution. d. Rules, consequences, and fear. b. Opportunity, incentive, and rationalization. e. None of the above. c. Honesty, openness, and assistance. ____ 38. Which of the following observations is true about discovery sampling? a. Auditors using this method can always be certain that fraud does not exist in a population of checks. d. It is one of the more difficult statistical sampling variations to understand. b. It deals with the probability of discovering at least one error in a given sample size if the population error rate is a certain percentage. e. None of the above. c. It allows an auditor to generalize and make inferences from the population to the sample. ____ 39. Which of the following proactive fraud detection methods use Benford's Law to identify fraud? a. Vertical analysis d. Digital analysis b. Time trend analysis. e. None of the above. c. Real-time analysis ____ 40. Which of the following observations is true concerning discovery? a. It is the last stage of the civil litigation process. d. It is a series of written questions that specifically identify information needed from the opposing party. b. It is one of the stages in a civil litigation but not in a criminal litigation. e. None of the above are true. c. Frequenty it is the most difficult part of civil litigation because discovery has the potential to be costly and take up a great deal of time. ____ 41. If opportunities or perceived pressures are minimal, a person needs more ________ to commit fraud. a. motivation d. courage b. financial gain e. rationalization c. support from people at workplace ____ 42. If we looked at a summary of the characteristics for a majority of fraudsters, it would look like: a. Those who are uneducated d. Those with criminal records b. Those of other honest people e. None of the above. c. Those who use alcohol and drugs ____ 43. In the past, most frauds were detected: a. by providing ways for people to report suspected fraud. d. by inspecting documentation of transactions to determine if there are irregularities that could indicate fraud. b. by accident. e. None of the above. c. by surveillance and undercover operations. ____ 44. When only a very small amount of money has been embezzled: a. taking no action is the best course of action. d. the company should transfer the perpetrator to a position with more supervision. b. the perpetrator should be prosecuted. e. none of the above. c. the perpetrator should be punished by publishing the details of the fraud in the local newspapers. ____ 45. Although there are multiple approaches to fraud investigation, most investigators tend to rely heavily on ______. a. interviews d. surveillance b. honesty tests e. none of the above. c. invigilation ____ 46. Management fraud is often referred to as: a. stockholder fraud. d. investment fraud. b. financial statement fraud. e. both c and d. c. affinity fraud. ____ 47. The burden of proof in a criminal case must: a. be beyond a reasonable doubt. d. lie with the defendant. b. be the preponderance of knowledge and power. e. both c and d. c. be preponderance of evidence. ____ 48. Which investigation technique usually does not work well in kickback situations? a. Inquiry d. Theft b. Conversion e. None of the above work well c. Concealment ____ 49. Which of the following differentiates lower-level and higher-level trial courts? a. The number of judges. d. Higher-level trial courts are for the purpose of appeals. b. The amounts and the seriousness of the crimes. e. Both a and d. c. Availability of the court. ____ 50. A(n) ____ is a means of securing documents in the other party's possession that are relevant to the issues of the case. a. interrogatory d. request for admission b. subpoena e. none of the above c. production request ____ 51. Which statistical approach is one of the most powerful and yet simple methods for identifying outliers? a. N-grams d. Soundex algorithm b. Time-trend analysis e. None of the above c. Z-score ____ 52. Control activities can be grouped as preventive controls and detective controls. Which of the following is a detective control? a. Independent checks d. Physical safeguards b. Segregation of duties e. None of the above c. System of authorizations ____ 53. Psychological studies have found that the first feelings experienced when a crime is committed (especially the first time) are ____ and ____. a. defensiveness, confession d. anxiety, insomnia b. guilt, fear e. none of the above c. confidence, rationalization ____ 54. Which of the following key activities related to fraud, is the most economical way to reduce losses from fraud? a. Fraud prevention d. Follow-up legal action b. Early fraud detection e. None of the above. c. Fraud investigation ____ 55. Several factors are considered in deciding whether or not to investigate fraud. Which of the following is not one of them? a. Exposure or amount that could have been taken. d. Perceived strength of the predication. b. The signal that investigation or noninvestigation will send to others in the organization. e. Perceived cost of the investigation. c. Preparation of a surveillance log. ____ 56. In large cases that involve investigators, legal counsel, accountants, expert witnesses, and management representatives, coordination can be very difficult. ________ can be useful in such cases. a. CaseMap d. Ringtail b. DatiCon e. None of the above c. Analyst?s Notebook ____ 57. Surveillance is usually used to investigate: a. Conversion possibilities. d. Theft acts. b. Concealment possibilities. e. All of the above. c. Key internal controls. ____ 58. Identify the true statement about detecting fraud using financial statement reports. a. Small frauds may not affect the summarized financial statements significantly to be detected. d. Performing horizontal analysis requires converting the financial statement balances to percentages of total assets or gross sales. b. Before performing a data-driven analysis that targets fraud and corruption in financial statements, all three types of financial statements need to be converted to change statements. e. None of the above. c. Vertical analysis is the most direct method of focusing on changes from period to period. ____ 59. Which of the following statements about accounting systems is incorrect? a. An effective accounting system can almost always effectively prevent "kickbacks." d. Effective accounting systems make it hard to conceal fraud. b. The absence of a good accounting system makes it hard to differentiate between unpremeditated mistakes and fraud. e. All of the above are correct. c. Effective accounting systems give an audit trail that helps to discover frauds. ____ 60. Generally, internal controls are implemented in a corporation to help prevent which element of the fraud triangle? a. Rationalization d. Perceived pressure b. Authorization e. None of the above. c. Perceived opportunity ____ 61. Fraud occurs when perceived pressure, perceived opportunity and rationalization combine. Which of the following is related to the problem of segregation of duties? a. Samantha writes expense checks and Matt collects cash from customers. d. John records receivables and writes off bad debts. b. Steve order office supplies and deposits the company?s checks. e. None of the above. c. Julie records journal entries and orders lunch. ____ 62. Methods for concealment investigation include all but which of the following? a. Audits d. Document examination b. Honesty testing e. None of the above c. Computer searches ____ 63. Fraud in companies such as WorldCom, Enron, Waste Management are examples of: a. Customer fraud. d. Management fraud. b. Investment scams. e. Both b and c. c. Vendor fraud. ____ 64. All of the following factors can be linked to increased amounts of fraud and a negative work environment except: a. low turnover. d. lack of recognition of job performance. b. unrealistically low pay. e. All of the above are factors. c. top management that ignores the behavior of employees. ____ 65. Poor credit could become a ____ that could lead to fraud. a. Financial pressure c. Perceived opportunity b. Rationalization d. All of the above. ____ 66. The _____ is the overall tone of the organization that management establishes by the example it sets, the way it organizes the company and by the way it communicates, etc. a. support network d. control environment b. risk mitigation channel e. none of the above c. detection framework ____ 67. Which of the following is not an element of a good control environment? a. Modeling d. Trust b. Management's ability to communicate e. All of the above are elements of a good control environment. c. Suitable screening of employees before hiring. ____ 68. Preventive controls that provide a possibility of early fraud detection include: a. documents and records. d. independent checks. b. lack of proper authorization e. all of the above are preventative controls that provide a possibility of early fraud detection. c. segregation of duties. ____ 69. According to the study mentioned in the text, people who commit fraud are most similar to which of the following groups? a. College students d. Police officers b. Property offenders e. None of the above. c. Petty offenders. ____ 70. Which of the following is NOT a common rationalization of fraud perpetrators? a. I don?t deserve more. d. No one will get hurt b. I'm only borrowing the money e. All of the above are common rationalizations. c. The organization owes me ____ 71. Which of the following observations concerning occupational fraud is NOT true? a. It is committed for an indirect economic advantage to the employee. d. It always involves two or more employees. b. It costs the employer revenues and/or assets. e. It can be committed for a direct economic advantage to the employee. c. Normally it is surreptitious. ____ 72. Developing and promoting a well-defined corporate code of conduct is related to which element of the fraud-fighting model? a. Proactive fraud detection d. Tone at the top b. Education & training e. None of the above c. Investigation & follow-up ____ 73. What most weakens an expert?s credibility? a. Appearing pompous or aggressive. d. Boring the jury with long, overly detailed answers. b. Not being prepared and/or being unfamiliar with the facts of the case. e. All of the above. c. Bringing notes, work papers, or other material to the witness stand. ____ 74. A ______ is a request by one of the parties to have the court decide all or a part of the lawsuit should be dismissed because there are not any disputeable issues of fact. a. motion for summary judgment d. motion for evidence suppression b. motion for settlement e. none of the above c. motion for trial and appeal ____ 75. What is the general order of occurrence for a civil trial? a. Investigation and pleadings; discovery; motion practice and negotiation; trial and appeals. d. Trial and appeals; investigation and pleadings; discovery; motion practice and negotiation. b. Motion practice and negotiation; investigation and pleadings; discovery; trial and appeals. e. None of the above. c. Discovery; investigation and pleadings; trial and appeals; motion practice and negotiation.


Paper#4952 | Written in 18-Jul-2015

Price : $25