Data Analysis And Reporting Tools….2 Answers Missing Flashcards
Machine learning programs are ONLY capable of identifying patterns that have been identified by humans.
A. True
B. False
False
Which of the following data analysis functions can be used to determine the relationship between two variables in raw data?
A. Correlation analysis
B. Duplicate testing
C. Benford’s Law analysis
D. Gap testing
A. Correlation analysis
For a Benford’s Law analysis, an employee identification number would be considered a natural number.
A. True
B. False
False
Which of the following functions does a Benford’s Law analysis help to achieve?
A. Extracting usable information from unstructured text data
B. Identifying fictitious numbers
C. Identifying duplicate payments
D. Measuring the relationship between items on financial statements by expressing accounts as percentages
B. Identifying fictitious numbers
Which of the following is an example of a data analysis function that can be performed to help detect fraud through examination of fixed asset accounts?
A. Recalculate expense and reserve amounts using replacement costs
B. Select samples for asset existence verification
C. Compare book and tax depreciation and indicate variances
D. All of the above
D. All of the above
Understanding the structure and availability of existing data during a data analysis engagement helps to ensure that the fraud examiner can build workable tests to run on the data.
A. True
B. False
True
When conducting a data analysis engagement to detect fraud, it is important to build a profile of potential frauds before identifying, obtaining, and analyzing the data.
A. True
B. False
True
A fraud examiner is conducting textual analytics on journal entry data and runs a keyword search using the terms override, write off, and reserve/provision. With which component of the Fraud Triangle are these fraud keywords typically associated?
A. Capability
B. Rationalization
C. Pressure
D. Opportunity
D. Opportunity
On which of the following data fields would a fraud examiner be MOST LIKELY to run a duplicate test to search for a duplicate value?
A. Product numbers
B. Invoice numbers
C. Inventory counts
D. Account balances
B. Invoice numbers
During which phase of the data analysis process does the fraud examiner identify, obtain, and verify the relevant or requested data?
A. The post-analysis phase
B. The planning phase
C. The testing and interpretation phase
D. The preparation phase
D. The preparation phase
Black, a fraud examiner, is conducting textual analytics on emails sent to and from specific employees that her client has identified as fraud suspects. She is using the Fraud Triangle to create a list of fraud keywords to use in her search. Which of the following words found in email text might indicate a fraudster is rationalizing their actions?
A. Override
B. Write off
C. Quota
D. Deserve
D. Deserve
Victoria, a fraud examiner, is concerned that employees are abusing their expense accounts and are spending more than the amount allowed per day for meals. Which of the following is the MOST APPROPRIATE data analysis function for locating meal expenses greater than thirty dollars?
A. Compliance verification
B. Gap testing
C. Duplicate testing
D. Multi-file processing
A. Compliance verification
Which of the following is a core data analysis function that can be performed with most data analysis software applications?
A. Sorting
B. Joining files
C. Duplicate testing
D. All of the above
D. All of the above
Which of the following is TRUE regarding textual analytics?
A. There is a universal list of fraud keywords to use when implementing textual analytics that is applicable to any fraud examination.
B. The purpose of performing textual analytics is to find and extract an admission of fraud that can be presented in court.
C. Textual analytics can be used to categorize data to reveal patterns, sentiments, and relationships that are indicative of fraud.
D. Textual analytics is used to determine whether someone is lying or telling the truth based on clues within the data.
C. Textual analytics can be used to categorize data to reveal patterns, sentiments, and relationships that are indicative of fraud.
A fraud examiner is conducting textual analytics on journal entry data and runs a keyword search using the terms deadline, quota, and trouble. With which component of the Fraud Triangle are these fraud keywords typically associated?
A. Pressure
B. Opportunity
C. Capability
D. Rationalization
A. Pressure
Why do fraud examiners perform textual analytics?
A. To reveal patterns, sentiments, and relationships that are indicative of fraud
B. To gauge the pressures/incentives, opportunities, and rationalizations to commit fraud
C. To uncover warning signs of potentially fraudulent employee behavior
D. All of the above
D. All of the above
Artificial intelligence refers to computer systems that perform human tasks, such as visual perception and decision-making.
A. True
B. False
True
Text-based data are typically considered:
A. Structured data
B. Narrative data
C. Unstructured data
D. Documentary data
C. Unstructured data
Why would a fraud examiner perform duplicate testing on data?
A. To identify missing items in a sequence or series
B. To identify transactions with matching values in the same field
C. To determine the relationship among different variables in raw data
D. To determine whether company policies are met by employee transactions
B. To identify transactions with matching values in the same field
Which of the following is an example of a data analysis function that can be performed to help detect fraud through examination of payroll accounts?
A. Compare customer credit limits and current or past balances.
B. Compare approved vendors to the cash disbursement payee list.
C. Check proper supervisory authorization on payroll disbursements.
D. Generate depreciation to asset cost reports.
C. Check proper supervisory authorization on payroll disbursements.