ANSWERS ALREADY GRADED A+
.________ involves the actual taking of cash, inventory, information, or other assets whereas
_______ involves selling stolen assets or transferring them into cash and then spending the
cash. - ANSWER-Theft
conversion
."Intentional manipulation of financial statements" describes which kind of fraud?
a. Management fraud
.b. Criminal fraud.
c. Stock market fraud.
d. Bookkeeping fraud. - ANSWER-a. Management fraud
."Predication of fraud" is defined as:
a. Reasonable belief that fraud has occurred or is occurring.
b. Irrefutable evidence that fraud has been committed.
c. Motivation for committing fraud.
d. Punishment of fraud perpetrators. - ANSWER-a. Reasonable belief that fraud has occurred
or is occurring.
."The use of one's occupation for personal enrichment through the deliberate misuse or
misapplication of the employing organization's resources or assets" is the definition of which
of the following types of fraud?
a. Employee embezzlement or occupational fraud.
b. Investment scams.
,c. Management fraud.
d. Vendor fraud. - ANSWER-a. Employee embezzlement or occupational fraud.
.A ____ is a tool for explicitly considering all aspects of the fraud and for establishing fraud
theories.
a.vulnerability chart
b.perceptual map
c.surveillance log
d.Pareto chart - ANSWER-a.vulnerability chart
.A company's control environment includes:
a. The tone that management establishes toward what is honest and acceptable behavior.
b. Corporate hiring practices.
c. Having an internal audit department.
d. All of these - ANSWER-d. All of these
.A company's control environment includes:
a. The tone that management establishes towards what is honest and acceptable behavior
b. Corporate hiring practices
c. Having an internal audit department
d. All of the above - ANSWER-d. All of the above
.A database of criminal records maintained by the FBI is:
a. the CIA
b. the III
c. The NCIC
d. both a and c
,e. both b and c - ANSWER-e. both b and c
.A database of criminal records maintained by the FBI is:
a. The CIA.
b. The III.
c. The NCIC.
d. Both the CIA and the NCIC.
e. Both the III and the NCIC. - ANSWER-e. Both the III and the NCIC.
.A detection method that focuses on the kinds of frauds that can occur and then uses
technology to determine whether those frauds actually exist is called:
a. fishing fraud detection
b. data mining
c. data-driven fraud detection
d. Benford's Law - ANSWER-c. data-driven fraud detection
.A fraud examiner can detect fraud by recognizing and pursuing: - ANSWER-symptoms
.a letter is most likely to be fraudulent if
a. it is signed by only one person
b. it is addressed to an individual, rather than a department
c. it is a photocopy of an original letter
d. it is written on outdated company letterhead - ANSWER-c. it is a photocopy of an original
letter
.A letter is most likely to be fraudulent if:
a) it is signed by only one person
b) it is addressed to an individual, rather than a department
, c) it is a photocopy of an original letter
d) it is written on outdated company letterhead - ANSWER-c) it is a photocopy of an original
letter
.A man in San Rafael County was suspected of committing workers' compensation fraud. An
anonymous tipster reported that the man had been working at an automobile auction while
he was receiving disability benefits. An investigator for the Bureau of Workers' Compensation
interviewed the owner of the auction and found that the man was being paid $200 per week
in cash for washing vehicles and performing other shop tasks that involved carrying 25-pound
bags of pet food and loading boxes. Based on the anonymous tip and the auction owner's
interview, the investigator decides there is predication for fraud and decides to pursue the
matter further.Which of the following investigative methods would be appropriate for
gathering evidence in this case?
a. Searching public records.
b. Surveillance.
c. Invigilation.
d. All of these methods would be appropriate. - ANSWER-b. Surveillance.
.A method of classifying investigative approaches into testimonial evidence, documentary
evidence, physical evidence, and personal observations is referred to as the:
a. Investigative square of evidence.
b. Investigative square.
c. Evidence square.
d. Fraud triangle plus. - ANSWER-c. Evidence square.
.A signed statement should include all of the following except:
A. A statement that the fraudster knew the conduct was wrong and intended to commit the
act
B. The date the fraudster was hired
C. Approximate losses
D. Approximate date of the offense(s) - ANSWER-B. The date the fraudster was hired