CFE Investigation Flashcards
Structure data is?
the type of data found in a database, consisting of recognizable and predictable structures.
Unstructured data is?
data that would not be found in a traditional spreadsheet or database. They are typically text base.
Controlled answer techniques are used to what?
to stimulate a desired answer or impression. These techniques direct the interview toward a specific point.
Pretexting is?
the act of impersonating someone else or making false or misleading statements to obtain, sell, or buy information about a person or organization.
Under the Gramm-Leach-Bliley Act made it a criminal offense to engage in pretexting with financial institutions. In this context, pretexting is?
the act of obtaining customer information from financial institutions using deceptive tactics.
Steganography is?
the process of hiding one piece of information within an apparently innocent file
A fraud examination report documents what?
the results of a fraud examination and is generally created by one or more critical members of the fraud examination team
The purpose of an expert report is to what?
inform the parties, the judge, and the jury (if applicable) about the expert’s opinion of the case, as well as his credibility for commenting on such issues.
During the introductory portion of an interview, the interviewer must state the interview’s purpose in a general way. This is known as?
establishing the interview theme.
Predication is?
the totality of circumstances that would lead a reasonable, professionally trained, and prudent individual to believe that a fraud has occurred, is occurring, or will occur.
These types of questions have a suggested answer?
Leading questions
Calibrating (or norming) is the process of?
observing behavior before critical questions are asked, as opposed to doing so during questioning.
The first phase of the data analysis process is the?
The planning phase. This phase consists of several important steps, including:
- Understanding the data
- Defining examination objectives
- Building a profile of potential frauds
- Determining whether predication exists
Natural numbers are those numbers that are?
not ordered in a particular numbering scheme and are not human-generated or generated from a random number system. For example, most vendor invoice totals or listings of payment amounts will be populated by currency values that are natural numbers.
non-natural numbers are?
designed systematically to convey information that restricts the natural nature of the number. Any number that is arbitrarily determined, such as the price of inventory held for sale, is considered a non-natural number.
(e.g., employee identification numbers and telephone numbers
The U.S. Privacy Act of 1974 establishes a code of information practices that regulates what?
the collection, maintenance, consumption, and distribution of personally identifiable information that is maintained by federal agencies.
What is a letter rogatory?
A formal request by the courts of one country seeking judicial assistance from the courts of another country
The fraud theory approach is?
an investigative tool designed to help fraud examiners organize and direct examinations based on the information available at the time. According to the fraud theory approach, when conducting investigations into allegations or signs of fraud, the fraud examiner should:
- Analyze the available data.
- Create a hypothesis.
- Test the hypothesis.
- Refine and amend the hypothesis.