Deck 8: Investigating Concealment
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/26
العب
ملء الشاشة (f)
Deck 8: Investigating Concealment
1
Each of the following is true about concealment investigation EXCEPT:
A) Concealment investigation includes document investigation, physical asset counts, and computer searches.
B) Many concealment investigation techniques focus on obtaining documentary evidence
C) Audits are considered a concealment investigation technique.
D) Invigilation (tightening controls to establish a fraud-free baseline and closely supervising the suspects during an examination period) is considered a concealment investigation technique.
A) Concealment investigation includes document investigation, physical asset counts, and computer searches.
B) Many concealment investigation techniques focus on obtaining documentary evidence
C) Audits are considered a concealment investigation technique.
D) Invigilation (tightening controls to establish a fraud-free baseline and closely supervising the suspects during an examination period) is considered a concealment investigation technique.
D
D: Invigilation is part of the theft investigation process. the other statements are part of the concealment investigation process.
D: Invigilation is part of the theft investigation process. the other statements are part of the concealment investigation process.
2
Documents presented in court are often disputed. The following are questions that arise from disputed documents except:
A) Was the signature written before the rest of the document?
B) Is the signature genuine?
C) Was the writing disguised?
D) How old are the paper, printing and ink used?
E) All of the above are questions that arise from disputed documents
A) Was the signature written before the rest of the document?
B) Is the signature genuine?
C) Was the writing disguised?
D) How old are the paper, printing and ink used?
E) All of the above are questions that arise from disputed documents
A
E: All of the above are correct.
E: All of the above are correct.
3
Which of the following is generally not an approach to investigate the concealment aspect of fraud?
A) Document examination
B) Audits
C) Computer searches
D) Polygraph tests
A) Document examination
B) Audits
C) Computer searches
D) Polygraph tests
D
D: Polygraph testing is an approach usually associated with honesty testing, not investigating concealment.
D: Polygraph testing is an approach usually associated with honesty testing, not investigating concealment.
4
Three most common ways to obtain documentary evidence that is usually difficult to get are _____________.
A) By subpoena, voluntary consent, and invigilation
B) By subpoena, search warrant, and voluntary consent
C) Search warrant, invigilation, and surveillance
D) Voluntary consent, surveillance, and invigilation
A) By subpoena, voluntary consent, and invigilation
B) By subpoena, search warrant, and voluntary consent
C) Search warrant, invigilation, and surveillance
D) Voluntary consent, surveillance, and invigilation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
5
__________ are commonly used by attorneys involved in litigation to track documents
A) RFID tags
B) Bates numbers
C) Bar codes
D) All of the above
A) RFID tags
B) Bates numbers
C) Bar codes
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
6
Three most common ways to obtain documentary evidence are _____________.
A) By subpoena, voluntary consent, and invigilation
B) By subpoena, search warrant, and voluntary consent
C) Search warrant, invigilation, and surveillance
D) Voluntary consent, surveillance, and invigilation
A) By subpoena, voluntary consent, and invigilation
B) By subpoena, search warrant, and voluntary consent
C) Search warrant, invigilation, and surveillance
D) Voluntary consent, surveillance, and invigilation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following is not a common way to obtain hard-to-get documentary evidence?
A) Subpoena
B) Search Warrant
C) Voluntary Consent
D) Force
A) Subpoena
B) Search Warrant
C) Voluntary Consent
D) Force
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
8
An audit is a method of what investigation?
A) Theft Investigation
B) Conversion Investigation
C) Concealment investigation
D) Inquiry Investigation
A) Theft Investigation
B) Conversion Investigation
C) Concealment investigation
D) Inquiry Investigation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
9
Computer searches and physical asset counts are methods for ___________.
A) Theft investigation
B) Concealment investigation
C) Conversion investigation
D) Inquiry investigation
A) Theft investigation
B) Concealment investigation
C) Conversion investigation
D) Inquiry investigation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
10
All of the following information can be obtained from a cancelled check except:
A) Account number of the maker
B) Account number of the person who presented the check
C) A trail of all people who transferred the check (assignees and assignors)
D) Nature of transaction (cashed, deposited, presented for payment)
A) Account number of the maker
B) Account number of the person who presented the check
C) A trail of all people who transferred the check (assignees and assignors)
D) Nature of transaction (cashed, deposited, presented for payment)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following terms describes the risk that the sample is not representative of the population?
A) Errors
B) Non-sampling risk
C) Sampling risk
D) Detection risk
A) Errors
B) Non-sampling risk
C) Sampling risk
D) Detection risk
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following issues is often disputed in court?
A) Is the signature genuine?
B) Was printing performed before or after a signature?
C) How old is the paper, printing and ink used?
D) All of the above issues are often disputed in court.
A) Is the signature genuine?
B) Was printing performed before or after a signature?
C) How old is the paper, printing and ink used?
D) All of the above issues are often disputed in court.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following does not appear on a check, which has been cashed?
A) Teller number
B) Date
C) Transaction number
D) Time of the transaction
A) Teller number
B) Date
C) Transaction number
D) Time of the transaction
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
14
Computer searches and physical asset counts usually focus on which element of a fraud?
A) Theft act
B) Concealment
C) Conversion
D) Inquiry investigation
A) Theft act
B) Concealment
C) Conversion
D) Inquiry investigation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
15
Moe owns a 24-hour convenience store. He has noticed that the amounts of liquor inventory purchases have gotten bigger and frequent lately. Nevertheless, sales provided by this particular item haven't increased. He is concerned that the two night-shift employees might be involved. The best method to use for this investigation is:
A) Theft investigation
B) Conversion investigation
C) Embezzlement investigation
D) Concealment investigation
A) Theft investigation
B) Conversion investigation
C) Embezzlement investigation
D) Concealment investigation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
16
You are completely sure of which variable to examine in a concealment fraud case. The most efficient investigation method would be:
A) Computer searches, since they better identify signals of fraud
B) Random sampling
C) Discovery sampling, since they better identify signals of fraud
D) Check all records, because it eliminates both sampling and non-sampling risk
A) Computer searches, since they better identify signals of fraud
B) Random sampling
C) Discovery sampling, since they better identify signals of fraud
D) Check all records, because it eliminates both sampling and non-sampling risk
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following is not a type of Financial Statement Fraud?
A) Overstated revenues
B) Understated revenues
C) Stealing company money
D) Early revenue recognition
A) Overstated revenues
B) Understated revenues
C) Stealing company money
D) Early revenue recognition
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
18
The risk that an auditor examines a fraudulent check and does not recognize it as being fraudulent is called:
A) Sampling Risk
B) Non-Sampling Risk
C) Discovery Sampling Risk
D) Population Sampling Risk
A) Sampling Risk
B) Non-Sampling Risk
C) Discovery Sampling Risk
D) Population Sampling Risk
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
19
Methods for concealment investigation include all but which of the following?
A) Document examination
B) Honesty testing
C) Audits
D) Computer searches
A) Document examination
B) Honesty testing
C) Audits
D) Computer searches
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
20
Secondary evidence may be used in all of the following instances except:
A) The original document has been lost or destroyed without the intent or fault of the party seeking to introduce the secondary evidence.
B) The original document is in the possession of an adverse party who fails to produce it after a written notice to do so.
C) The original documents are too voluminous to permit careful examination.
D) The original documents are too fragile to be handled.
A) The original document has been lost or destroyed without the intent or fault of the party seeking to introduce the secondary evidence.
B) The original document is in the possession of an adverse party who fails to produce it after a written notice to do so.
C) The original documents are too voluminous to permit careful examination.
D) The original documents are too fragile to be handled.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
21
Documents are a great source of evidence because of the following:
A) They do not forget
B) They cannot be cross-examined or confused by attorneys
C) They cannot commit perjury
D) They never tell inconsistent stories of different occasions
E) All of the above
A) They do not forget
B) They cannot be cross-examined or confused by attorneys
C) They cannot commit perjury
D) They never tell inconsistent stories of different occasions
E) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which of the following is a common method used by auditors to look for the existence of fraud?
A) By asking clients about past fraud experiences
B) By gathering documentary evidence and checking for fraud symptoms
C) By conducting anti-fraud training sessions for all employees
D) None of the above
A) By asking clients about past fraud experiences
B) By gathering documentary evidence and checking for fraud symptoms
C) By conducting anti-fraud training sessions for all employees
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
23
Documents are often the incriminating evidence for fraud. Which of the following should be used when ensuring that the documents are legitimate and accessible for trial?
A) Photograph the evidence
B) Digitally enhance the evidence
C) Mark the evidence
D) Preserve the evidence in a non-transparent container
A) Photograph the evidence
B) Digitally enhance the evidence
C) Mark the evidence
D) Preserve the evidence in a non-transparent container
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
24
DocLab is a division of which organization?
A) US Marshals
B) FBI
C) CIA
D) ACFE
A) US Marshals
B) FBI
C) CIA
D) ACFE
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
25
Concealment is generally accomplished by manipulating any of the following documents except:
A) Bills of laden
B) Sales receipts
C) Titles
D) Insurance policies
E) All of the above can be manipulated to conceal a fraud
A) Bills of laden
B) Sales receipts
C) Titles
D) Insurance policies
E) All of the above can be manipulated to conceal a fraud
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
26
Case Management software
A) Helps organize large cases with many investigators
B) Shows link analysis charts to help connect people, places, and events
C) Is inexpensive and available on the Internet
D) All of the above
E) A & B
A) Helps organize large cases with many investigators
B) Shows link analysis charts to help connect people, places, and events
C) Is inexpensive and available on the Internet
D) All of the above
E) A & B
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck