Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Fraud Examination Study Set 3
Quiz 7: Investigating Theft Acts
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
Concealment investigative techniques do not work well in kickback situations. Why?
Question 22
Multiple Choice
What is used in court cases to prove that data has not been adversely affected during analysis?
Question 23
Multiple Choice
Identify the first step in any electronic evidence collection process.
Question 24
Multiple Choice
Which of the following observations concerning physical evidence is true?
Question 25
Multiple Choice
Which investigative method is most useful after you have gathered other types of evidence and know who to interview and what questions to ask?
Question 26
Multiple Choice
Which of the following is a form of surveillance that is usually only available to law enforcement officers?
Question 27
Multiple Choice
A divisional manager is suspected of adding ghost employees to the payroll. Which investigative method can most easily uncover this type of fraud?
Question 28
Multiple Choice
Electronic surveillance may have only limited value in the investigation of employee frauds and many other white- collar crimes. Why?
Question 29
Multiple Choice
Which of the following are theft act investigation methods that usually involve observing or listening to potential perpetrators?
Question 30
Multiple Choice
For fraud to occur, usually three elements are necessary: pressure, opportunity, and:
Question 31
Multiple Choice
Which general term refers to the gathering of electronic evidence?
Question 32
Multiple Choice
Which investigation technique usually does not work well in kickback situations?
Question 33
Multiple Choice
The two primary checksum methods used today are:
Question 34
Multiple Choice
Which checksum method is considered more advanced and secure than the method it replaced?
Question 35
Multiple Choice
Which step in the electronic evidence collection process is important to ensure that the original disk is kept in its seized state?
Question 36
Multiple Choice
Which of the following is a basic objective of surveillance, whether manual or electronic?
Question 37
Multiple Choice
Which of the following is important regarding invigilation?
Question 38
Multiple Choice
Which of the following is NOT a component of a vulnerability chart?
Question 39
Multiple Choice
What is the term for a calculation (using encryption technologies) based on the contents of a disk or file that are engineered so that even small changes in the source data will produce significantly different checksum results?