Deck 8: Investigating Concealment

ملء الشاشة (f)
exit full mode
سؤال
____ are used by attorneys involved in litigation to track all documents.

A)Link analyses
B)Bates numbers
C)Bar codes
D)RFID tags
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following is the term for keeping a record of when a document is received and what has happened to it since its receipt.

A)Organization of custody
B)Evidence chain
C)Coordination of custody
D)Chain of custody
سؤال
Which of the following statements is true?

A)Concealment investigation includes document investigation, physical asset counts, and computer searches.
B)Most concealment investigation techniques focus on obtaining eyewitness accounts as evidence.
C)Honesty testing is considered as a concealment investigation technique.
D)Concealment investigation is dependent on employee cooperation to gather evidence
سؤال
Which aspect of documentary evidence should be kept in mind to ensure that the documents can be identified later and accessible for trial?

A)Organization of evidence
B)Coordination of evidence
C)Marking of evidence
D)Chain of custody of documents
سؤال
Mark owns a 24-hour convenience store.Lately he has noticed that the liquor inventory purchases have gone up by huge amounts,although sales proceeds from this category haven't increased.He suspects his two night-shift employees.Which is the best investigative method to uncover such a fraud?

A)Electronic investigation
B)Conversion investigation
C)Inquiry investigation
D)Concealment investigation
سؤال
During a concealment investigation,an investigator fails to recognize that an invoice had been forged.This represents a:

A)sampling risk.
B)non-sampling risk.
C)systematic risk.
D)systemic risk.
سؤال
The three most common ways to obtain documentary evidence which are valuable but difficult to obtain are:

A)subpoena, voluntary consent, and searching public records
B)subpoena, search warrant, and voluntary consent
C)search warrant, invigilation, and surveillance
D)voluntary consent, surveillance, and invigilation
سؤال
Methods for concealment investigation include all but which of the following?

A)Document examination
B)Searching public records
C)Audits
D)Computer searches
سؤال
Computer searches and physical asset counts usually focus on the ________ element of the fraud triangle.

A)theft
B)concealment
C)conversion
D)inquiry
سؤال
An audit is part of which type of investigative method?

A)theft
B)conversion
C)concealment
D)inquiry
سؤال
What is the most common way to obtain private documents (either oral or written)?

A)subpoena
B)search warrant
C)voluntary consent
D)audit
سؤال
_______ are executed only by law enforcement officials and are generally used only in criminal cases.

A)Subpoenas
B)Voluntary consents
C)Search warrants
D)Interviews
سؤال
Which statistical sampling allows an auditor to generalize and make inferences from the sample to the population?

A)Probability sampling
B)Random sampling
C)Discovery sampling
D)Quota sampling
سؤال
The risk that an auditor will examine a fraudulent check and not recognize it as being fraudulent is called _________ .

A)sampling risk
B)non-sampling risk
C)systematic risk
D)systemic risk
سؤال
What is the term for the risk that the sample was not representative of the population.

A)Systematic risk
B)Non-sampling risk
C)Sampling risk
D)Compliance risk
سؤال
Which of the following does NOT appear on a check that has been cashed?

A)Teller number
B)Date of the transaction
C)Transaction number
D)Time of the transaction
سؤال
Which of the following is generally considered a best practice while handling documentary evidence?

A)Copies of the document should be used during the investigation and trial and should be kept in the same file where the original is kept.
B)Photocopies are always preferable to original documents as evidence, as the original could be tampered with.
C)Copies of the document should not be made and only the original document should be used during investigation and trial.
D)Generally, a summary of the original document should be made for investigation and trial.
سؤال
When the document is in the custody of a public office:

A)it is permissible to obtain photocopies, which are considered secondary evidence, in a court of law.
B)copies of the document should be made but kept separate from the original document.
C)the document (or a copy) cannot be used as evidence, in a court of law.
D)a summary of the document will suffice.
سؤال
________ is a simple,statistically based method of analyzing a subset of transactions from a larger pool.

A)Structured sampling
B)Probability sampling
C)Cluster sampling
D)Discovery sampling
سؤال
Which of the following is a popular program used to index and store evidence?

A)CaseCentral
B)IDEA
C)TANZAN
D)SQL
سؤال
​Which of the following is NOT utilized to make determinations about the document being examined?

A)​forensic chemistry
B)​microscopy
C)​photography
D)​radiology
سؤال
Which of the following observations about discovery sampling is TRUE?

A)It is one of the more difficult statistical sampling variations to understand.
B)Auditors using this method can always be certain that fraud does not exist in a population of checks.
C)It allows an auditor to generalize and make inferences from the population to the sample.
D)Auditors can quantify both the risk and samples until they have sufficient evidence that fraud does not likely exist.
سؤال
Which of the following products can be useful to coordinate the evidence in large cases that involve investigators,legal counsel,accountants,expert witnesses,and management representatives?

A)DatiCon
B)Analyst's Notebook
C)CaseMap
D)Ringtail
سؤال
Which of the following is an alternative when original documents are too voluminous to permit careful examination?

A)A photocopy of the original document will suffice.
B)It will have to be excluded from usage as evidence.
C)A summary of its contents is acceptable.
D)There are no alternatives.The original has to be produced.
سؤال
What is another term used for discovery sampling?

A)investigative sampling
B)probability sampling
C)statistical random sampling
D)stop-and-go
سؤال
Once investigators enter their indicators into the centralized database,the software performs _______ to find connections between people,places,and events.

A)regression analysis
B)search analysis
C)link analysis
D)correlation analysis
سؤال
The least reliable method of obtaining documentary evidence is:

A)through traditional audits.
B)through computer-based queries
C)by using statistical techniques.
D)by accident.
سؤال
​Computer-based queries of accounting and other data bases are utilized in which of the following investigation methods?

A)​theft
B)​conversion
C)​concealment
D)​inquiry
سؤال
Which of the following statements about subpoenas is correct?​

A)​A subpoena can only be issued by agents of a grand jury or of the court.
B)​A subpoena is one of the two ways to gain access to difficult to obtain information.
C)​A subpoena must be signed by the chair of the grand jury.
D)​A subpoena's only purpose is to access difficult to obtain documents.
سؤال
The four most common examples of documentary evidence which are valuable but difficult to obtain are:

A)Web-based e-mail accounts, private bank records, tax returns, and brokerage records.
B)Sample analytical reports, photographs and videos, tax returns, and SEC filings.
C)Office e-mail accounts, private bank records, maps and diagrams, and sample analytical reports.
D)Photographs and videos, private bank records, tax returns, and brokerage records.
سؤال
Orders issued by a court or a grand jury to produce documents are called:

A)writs of certiorari.
B)search warrants.
C)voluntary consent.
D)subpoenas.
سؤال
​Which of the following statements is FALSE regarding a search warrant?

A)​A 'possible cause' condition must be met before a search warrant is issued.
B)​There is a belief that the documents have been used in committing a crime.
C)​Only law enforcement officials can execute a search warrant.
D)​Search warrants are generally used only in criminal cases.
سؤال
​Which of the following is an example of secondary evidence?

A)​testimony of recipient of stolen assets
B)​confession outside vendors who paid bribes
C)​testimony of witnesses of the fraud act
D)​photocopies of improper documents
سؤال
The best way to obtain documentary evidence is:

A)by chance, accident or tip discovery.
B)through computer-based queries of full-population accounting and other databases.
C)through interviews and interrogations.
D)through traditional audits like discovery sampling.
سؤال
​The FBI's Document Conversion Lab does NOT do which of the following?

A)​It saves an incredible amount of time searching documents.
B)​It increases search capabilities regarding relevant documents.
C)​It increases the amount of documentation evidence available.
D)​It enables the sharing of document information.
سؤال
Which of the following observations is true about subpoenas?

A)Subpoenas are generally used only in criminal cases.
B)Subpoenas are orders issued by the Company Law Board to produce documents.
C)Failure to honor a subpoena is punishable by law.
D)Every subpoena must be signed by the plaintiff and the accused.
سؤال
​Which of the following is a FALSE statement regarding how the testimony of witnesses can be problematic?

A)​Witnesses can forget important facts.
B)​Witnesses can be confused by opposing attorneys.
C)​Witnesses can commit perjury.
D)​Witnesses may depend on their written summary of the facts.
سؤال
Which of the following statements regarding sampling risk is FALSE?

A)To reduce sampling risk, the investigator can increase the sample size.
B)Sampling risk can only be slightly reduced by careful planning of the sampling procedure.
C)To reduce sampling risk, the investigator can use a random number table.
D)In fraud examination, sampling risk can be significant.
سؤال
​Which of the following is NOT an action by the fraud perpetrators to hide/conceal their illegal act(s)?

A)​manipulating documentary evidence
B)​modifying records in computer databases
C)​photocopying fraud-related documents
D)​deleting records in computer databases
سؤال
​Which of the following is NOT a warning sign indicating a possible problem with a document?

A)​disguised or unnatural handwriting
B)​authorized initialed changes
C)​inconsistency or disruption in the continuity of the content
D)​use of two or more different colors of ink
سؤال
​Which of the following statements is NOT included in a subpoena?

A)​the location of the documents being requested
B)​the identity of who is making the request for the documents
C)​the exact information being requested
D)​the signature of a judge or court commissioner
سؤال
​Which amendment provides the right of the people against unreasonable searches and seizures?

A)First
B)​Second
C)Third
D)​Fourth
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 8: Investigating Concealment
1
____ are used by attorneys involved in litigation to track all documents.

A)Link analyses
B)Bates numbers
C)Bar codes
D)RFID tags
B
2
Which of the following is the term for keeping a record of when a document is received and what has happened to it since its receipt.

A)Organization of custody
B)Evidence chain
C)Coordination of custody
D)Chain of custody
D
3
Which of the following statements is true?

A)Concealment investigation includes document investigation, physical asset counts, and computer searches.
B)Most concealment investigation techniques focus on obtaining eyewitness accounts as evidence.
C)Honesty testing is considered as a concealment investigation technique.
D)Concealment investigation is dependent on employee cooperation to gather evidence
A
4
Which aspect of documentary evidence should be kept in mind to ensure that the documents can be identified later and accessible for trial?

A)Organization of evidence
B)Coordination of evidence
C)Marking of evidence
D)Chain of custody of documents
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
Mark owns a 24-hour convenience store.Lately he has noticed that the liquor inventory purchases have gone up by huge amounts,although sales proceeds from this category haven't increased.He suspects his two night-shift employees.Which is the best investigative method to uncover such a fraud?

A)Electronic investigation
B)Conversion investigation
C)Inquiry investigation
D)Concealment investigation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
During a concealment investigation,an investigator fails to recognize that an invoice had been forged.This represents a:

A)sampling risk.
B)non-sampling risk.
C)systematic risk.
D)systemic risk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
The three most common ways to obtain documentary evidence which are valuable but difficult to obtain are:

A)subpoena, voluntary consent, and searching public records
B)subpoena, search warrant, and voluntary consent
C)search warrant, invigilation, and surveillance
D)voluntary consent, surveillance, and invigilation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
Methods for concealment investigation include all but which of the following?

A)Document examination
B)Searching public records
C)Audits
D)Computer searches
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
Computer searches and physical asset counts usually focus on the ________ element of the fraud triangle.

A)theft
B)concealment
C)conversion
D)inquiry
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
An audit is part of which type of investigative method?

A)theft
B)conversion
C)concealment
D)inquiry
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
What is the most common way to obtain private documents (either oral or written)?

A)subpoena
B)search warrant
C)voluntary consent
D)audit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
_______ are executed only by law enforcement officials and are generally used only in criminal cases.

A)Subpoenas
B)Voluntary consents
C)Search warrants
D)Interviews
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which statistical sampling allows an auditor to generalize and make inferences from the sample to the population?

A)Probability sampling
B)Random sampling
C)Discovery sampling
D)Quota sampling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
The risk that an auditor will examine a fraudulent check and not recognize it as being fraudulent is called _________ .

A)sampling risk
B)non-sampling risk
C)systematic risk
D)systemic risk
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
What is the term for the risk that the sample was not representative of the population.

A)Systematic risk
B)Non-sampling risk
C)Sampling risk
D)Compliance risk
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following does NOT appear on a check that has been cashed?

A)Teller number
B)Date of the transaction
C)Transaction number
D)Time of the transaction
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following is generally considered a best practice while handling documentary evidence?

A)Copies of the document should be used during the investigation and trial and should be kept in the same file where the original is kept.
B)Photocopies are always preferable to original documents as evidence, as the original could be tampered with.
C)Copies of the document should not be made and only the original document should be used during investigation and trial.
D)Generally, a summary of the original document should be made for investigation and trial.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
When the document is in the custody of a public office:

A)it is permissible to obtain photocopies, which are considered secondary evidence, in a court of law.
B)copies of the document should be made but kept separate from the original document.
C)the document (or a copy) cannot be used as evidence, in a court of law.
D)a summary of the document will suffice.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
________ is a simple,statistically based method of analyzing a subset of transactions from a larger pool.

A)Structured sampling
B)Probability sampling
C)Cluster sampling
D)Discovery sampling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following is a popular program used to index and store evidence?

A)CaseCentral
B)IDEA
C)TANZAN
D)SQL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
​Which of the following is NOT utilized to make determinations about the document being examined?

A)​forensic chemistry
B)​microscopy
C)​photography
D)​radiology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which of the following observations about discovery sampling is TRUE?

A)It is one of the more difficult statistical sampling variations to understand.
B)Auditors using this method can always be certain that fraud does not exist in a population of checks.
C)It allows an auditor to generalize and make inferences from the population to the sample.
D)Auditors can quantify both the risk and samples until they have sufficient evidence that fraud does not likely exist.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
Which of the following products can be useful to coordinate the evidence in large cases that involve investigators,legal counsel,accountants,expert witnesses,and management representatives?

A)DatiCon
B)Analyst's Notebook
C)CaseMap
D)Ringtail
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which of the following is an alternative when original documents are too voluminous to permit careful examination?

A)A photocopy of the original document will suffice.
B)It will have to be excluded from usage as evidence.
C)A summary of its contents is acceptable.
D)There are no alternatives.The original has to be produced.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
What is another term used for discovery sampling?

A)investigative sampling
B)probability sampling
C)statistical random sampling
D)stop-and-go
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
Once investigators enter their indicators into the centralized database,the software performs _______ to find connections between people,places,and events.

A)regression analysis
B)search analysis
C)link analysis
D)correlation analysis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
The least reliable method of obtaining documentary evidence is:

A)through traditional audits.
B)through computer-based queries
C)by using statistical techniques.
D)by accident.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
​Computer-based queries of accounting and other data bases are utilized in which of the following investigation methods?

A)​theft
B)​conversion
C)​concealment
D)​inquiry
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
Which of the following statements about subpoenas is correct?​

A)​A subpoena can only be issued by agents of a grand jury or of the court.
B)​A subpoena is one of the two ways to gain access to difficult to obtain information.
C)​A subpoena must be signed by the chair of the grand jury.
D)​A subpoena's only purpose is to access difficult to obtain documents.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
The four most common examples of documentary evidence which are valuable but difficult to obtain are:

A)Web-based e-mail accounts, private bank records, tax returns, and brokerage records.
B)Sample analytical reports, photographs and videos, tax returns, and SEC filings.
C)Office e-mail accounts, private bank records, maps and diagrams, and sample analytical reports.
D)Photographs and videos, private bank records, tax returns, and brokerage records.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
Orders issued by a court or a grand jury to produce documents are called:

A)writs of certiorari.
B)search warrants.
C)voluntary consent.
D)subpoenas.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
​Which of the following statements is FALSE regarding a search warrant?

A)​A 'possible cause' condition must be met before a search warrant is issued.
B)​There is a belief that the documents have been used in committing a crime.
C)​Only law enforcement officials can execute a search warrant.
D)​Search warrants are generally used only in criminal cases.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
​Which of the following is an example of secondary evidence?

A)​testimony of recipient of stolen assets
B)​confession outside vendors who paid bribes
C)​testimony of witnesses of the fraud act
D)​photocopies of improper documents
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
The best way to obtain documentary evidence is:

A)by chance, accident or tip discovery.
B)through computer-based queries of full-population accounting and other databases.
C)through interviews and interrogations.
D)through traditional audits like discovery sampling.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
​The FBI's Document Conversion Lab does NOT do which of the following?

A)​It saves an incredible amount of time searching documents.
B)​It increases search capabilities regarding relevant documents.
C)​It increases the amount of documentation evidence available.
D)​It enables the sharing of document information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
Which of the following observations is true about subpoenas?

A)Subpoenas are generally used only in criminal cases.
B)Subpoenas are orders issued by the Company Law Board to produce documents.
C)Failure to honor a subpoena is punishable by law.
D)Every subpoena must be signed by the plaintiff and the accused.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
​Which of the following is a FALSE statement regarding how the testimony of witnesses can be problematic?

A)​Witnesses can forget important facts.
B)​Witnesses can be confused by opposing attorneys.
C)​Witnesses can commit perjury.
D)​Witnesses may depend on their written summary of the facts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
Which of the following statements regarding sampling risk is FALSE?

A)To reduce sampling risk, the investigator can increase the sample size.
B)Sampling risk can only be slightly reduced by careful planning of the sampling procedure.
C)To reduce sampling risk, the investigator can use a random number table.
D)In fraud examination, sampling risk can be significant.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
​Which of the following is NOT an action by the fraud perpetrators to hide/conceal their illegal act(s)?

A)​manipulating documentary evidence
B)​modifying records in computer databases
C)​photocopying fraud-related documents
D)​deleting records in computer databases
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
​Which of the following is NOT a warning sign indicating a possible problem with a document?

A)​disguised or unnatural handwriting
B)​authorized initialed changes
C)​inconsistency or disruption in the continuity of the content
D)​use of two or more different colors of ink
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
​Which of the following statements is NOT included in a subpoena?

A)​the location of the documents being requested
B)​the identity of who is making the request for the documents
C)​the exact information being requested
D)​the signature of a judge or court commissioner
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
​Which amendment provides the right of the people against unreasonable searches and seizures?

A)First
B)​Second
C)Third
D)​Fourth
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.