CFE Investigation Flashcards

1
Q

Structure data is?

A

the type of data found in a database, consisting of recognizable and predictable structures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Unstructured data is?

A

data that would not be found in a traditional spreadsheet or database. They are typically text base.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Controlled answer techniques are used to what?

A

to stimulate a desired answer or impression. These techniques direct the interview toward a specific point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Pretexting is?

A

the act of impersonating someone else or making false or misleading statements to obtain, sell, or buy information about a person or organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Under the Gramm-Leach-Bliley Act made it a criminal offense to engage in pretexting with financial institutions. In this context, pretexting is?

A

the act of obtaining customer information from financial institutions using deceptive tactics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Steganography is?

A

the process of hiding one piece of information within an apparently innocent file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A fraud examination report documents what?

A

the results of a fraud examination and is generally created by one or more critical members of the fraud examination team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The purpose of an expert report is to what?

A

inform the parties, the judge, and the jury (if applicable) about the expert’s opinion of the case, as well as his credibility for commenting on such issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

During the introductory portion of an interview, the interviewer must state the interview’s purpose in a general way. This is known as?

A

establishing the interview theme.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Predication is?

A

the totality of circumstances that would lead a reasonable, professionally trained, and prudent individual to believe that a fraud has occurred, is occurring, or will occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

These types of questions have a suggested answer?

A

Leading questions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Calibrating (or norming) is the process of?

A

observing behavior before critical questions are asked, as opposed to doing so during questioning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The first phase of the data analysis process is the?

A

The planning phase. This phase consists of several important steps, including:

  • Understanding the data
  • Defining examination objectives
  • Building a profile of potential frauds
  • Determining whether predication exists
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Natural numbers are those numbers that are?

A

not ordered in a particular numbering scheme and are not human-generated or generated from a random number system. For example, most vendor invoice totals or listings of payment amounts will be populated by currency values that are natural numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

non-natural numbers are?

A

designed systematically to convey information that restricts the natural nature of the number. Any number that is arbitrarily determined, such as the price of inventory held for sale, is considered a non-natural number.

(e.g., employee identification numbers and telephone numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The U.S. Privacy Act of 1974 establishes a code of information practices that regulates what?

A

the collection, maintenance, consumption, and distribution of personally identifiable information that is maintained by federal agencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a letter rogatory?

A

A formal request by the courts of one country seeking judicial assistance from the courts of another country

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The fraud theory approach is?

A

an investigative tool designed to help fraud examiners organize and direct examinations based on the information available at the time. According to the fraud theory approach, when conducting investigations into allegations or signs of fraud, the fraud examiner should:

  • Analyze the available data.
  • Create a hypothesis.
  • Test the hypothesis.
  • Refine and amend the hypothesis.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Textual analytics is?

A

a method of using software to extract usable information from unstructured text data.

Through the application of linguistic technologies and statistical techniques—including weighted fraud indicators (e.g., fraud keywords) and scoring algorithms—textual analytics software can categorize data to reveal patterns, sentiments, and relationships indicative of fraud.

20
Q

Metadata is?

A

Data about data.

21
Q

The U.S. Right to Financial Privacy Act prohibits?

A

financial institutions from disclosing financial information about individual customers to governmental agencies without the customers’ consent, a court order, a subpoena, a search warrant, or other formal demand.

22
Q

Normally, the interviewer should ask accusatory or admission-seeking questions when all of the following are true:

A
  • There is a reasonable probability that the respondent has committed the act in question.
  • All other reasonable investigative steps have been completed and as much information as possible has been developed from other sources.
  • The interviewer can reasonably control the interview’s place, time, and subject matter.
23
Q

Duplicate testing is used to identify transactions with?

A

duplicate values in specified fields.

24
Q

Illustrators are?

A

motions made primarily with the hands that demonstrate points when talking

25
Q

The primary concern when analyzing digital evidence is to?

A

maintain the integrity of the data at all times.

26
Q

A direct method uses the subject’s?

A

books and records (or financial transaction records belonging to third parties) to analyze the relationship between a suspect’s receipt and subsequent disposition of funds or assets

27
Q

an indirect method employs?

A

circumstantial evidence to analyze the relationship between a suspect’s receipt and subsequent disposition of funds or assets.

28
Q

There are three general approaches to obtaining the verbal confession:

A

chronologically, by transaction, or by event.

29
Q

The net-worth method (or comparative net-worth analysis) is used to?

A

prove illicit income circumstantially by showing that a person’s assets or expenditures for a given period exceed that which can be accounted for from known or admitted legitimate sources of income

30
Q

The three key elements in the fraud triangle are?

A

opportunity, motivation, and rationalization

31
Q

Manipulators are?

A

motions like picking lint from clothing, playing with objects such as pencils, or holding one’s hands while talking. Manipulators are displacement activities that reduce nervousness.

32
Q

The following are examples of data analysis queries that can be performed by data analysis software on asset accounts to help detect fraud:

A
  • Generate depreciation to cost reports.
  • Compare book and tax depreciation and indicate variances.
  • Sort asset values by asset type or monetary amount.
  • Select samples for asset existence verification.
  • Recalculate expense and reserve/provision amounts using replacement costs
33
Q

A matrix is a type of visual aid, in the form of a grid, that shows?

A

the relationship (or points of contacts) between a number of entities.

34
Q

The bank deposits method is recommended as a primary method of proof when?

A

most of the subject’s income is deposited in a financial institution and the subject’s books and records are unavailable, withheld, incomplete, or maintained on a cash basis.

35
Q

The net-worth method of tracing assets would yield the best result when?

A

several of the subject’s assets or liabilities have changed during the period under examination and the subject’s financial records are not available.

36
Q

Double-negative questions are?

A

questions that have two forms of negation within a single clause. Double-negative questions, or statements containing double negatives, are confusing and often suggest an answer opposite to the correct one. Therefore, they should not be used. For example: “Didn’t you suspect that something wasn’t right?”

37
Q

If a fraud examiner working in the United States needs information on registration and disciplinary information regarding firms and individuals in the U.S. futures industry, he should contact the?

A

The National Futures Association (NFA) is an industry-wide, self-regulatory organization authorized by the U.S. Commodity Exchange Act; it operates under the supervision of the Commodity Futures Trading Commission (CFTC).

The NFA oversees the commodities markets, and it is a one-stop information source for all types of registration and disciplinary information regarding firms and individuals in the futures industry. This information includes registration status and employment history; disciplinary actions filed by the NFA, the CFTC, and the commodity exchanges; and customer complaints filed under the CFTC’s Reparations Program.

38
Q

Mutual legal assistance (MLA) is?

A

a process by which countries request and provide assistance in law enforcement matters, such as gathering information, obtaining provisional remedies, and enforcing foreign orders and judgments.

39
Q

Multi-file processing allows?

A

the user to relate several files by defining relationships between multiple files, without the use of the Join command.

40
Q

is net worth analysis a direct or indirect method?

A

indirect

41
Q

Using the correlation analysis function, fraud examiners can?

A

determine the relationships among different variables in the raw data.

42
Q

What are the steps of the planning phase of the data analysis process, which is the first phase that should be undertaken?

A

Defining the examination objectives, determining whether predication exists, and building a profile of potential frauds

43
Q

During the preparation phase of the data analysis process, which is the 2nd phase, the fraud examiner must complete several important steps, including:

A
  • Identifying the relevant data
  • Obtaining the requested data
  • Verifying the data
  • Cleansing and normalizing the data
44
Q

The expenditures method (also known as the sources and application of funds method) compares what?

A

the suspect’s known expenditures and known sources of funds during a given period of time.

45
Q

The fraud examination report conveys what?

A

all evidence necessary to evaluate the case, and it can be used to corroborate previously known facts. An accurate report will add credibility to the fraud examination and to the fraud examiner’s work.