EXAM 3 Quizzes Flashcards
The _________________ provides circumstantial evidence that amounts paid for assets and expenditures exceed income from known sources for a given period of time.
Bank records method
Invigilation method
Net worth method
Lifestyle analysis method
Net worth method
The main benefit of using the elements of fraud in an investigation is that in virtually every fraud or financial crime, ____________________.
It eliminates the need to develop a compelling storyline grounded in the evidence
Fraudsters use them in attempt to outwit fraud examiners
Courts are required to consider the findings admissible
The evidence of each element can be developed
The evidence of each element can be developed
Generally, evidence is admitted at trial provided that: it is relevant to the issue at hand, any probative effect outweighs any prejudicial effect, and the evidence is ________.
Direct (rather than circumstantial)
Trustworthy
Compelling
Reasonably conclusive
Trustworthy
The value of ________, to include “smoking gun” evidence of financial crimes, fraud, motivations for activity, and other information cannot be overstated.
Wiretaps
Email
Video surveillance
Confidential informants
In essence, ____________ are where evidence intersects with the tools and techniques of the antifraud and forensic accounting profession.
Probative values
Red flags
Examinations
Daubert challenges
Examinations
The difference between a mistake and fraud is ____________. If the fraud examiner or forensic accountant cannot prove it, a civil or criminal conviction for fraud most likely cannot be sustained.
Perceived pressure
Rationalization
Intent
Ego/entitlement
Intent
You have been hired by the prosecution to provide expert testimony in a fraud case you helped investigate. As you provide answers to key questions around the fraud examination, your testimony will be more convincing to the judge and jury if you:
Can articulate a clear opinion about the guilt of the perpetrator(s).
Have woven the answers into a coherent storyline grounded in the evidence.
Ground your answers in the elements of the fraud triangle, particularly with respect to motive.
Omit any reference to evidentiary shortcomings in your testimony.
Have woven the answers into a coherent storyline grounded in the evidence.
_____________ is an examination technique that considers periods before, during, and after a suspected fraud has occurred.
Consideration of red flags
Invigilation
Earnings management
Defalcation
Invigilation
Three types of evidence may be offered at trial: testimony, real, and ____________.
Demonstrative
Compelling
Reliable/trustworthy
Non-prejudicial
Demonstrative
In preparing to rebut defenses to cash from unknown sources, the fraud examiner should develop an evidence trail, if possible, which suggests that defenses are not feasible. Four common defenses to unknown sources of cash include the assertion that the cash was: accumulated in prior periods, obtained by gift or inheritance, obtained from loan proceeds, or a result of:
Selling some other asset (such as a painting)
Foreign held investments
Frugality
Lottery or gambling winnings
Lottery or gambling winnings
To be admitted at trial, evidence must be shown to have unique identifiers (preferable), or that the chain of evidence has been followed. This process is known as:
Verisimilitude certification
Authentication
Chain of custody audit
Invigilation
Authentication
___________________ is defined as anything perceivable by the five senses, any proof, such as testimony of witnesses, records, documents, facts, data, and tangible objects, legally presented at trial to prove a contention and to induce a belief in the minds of the jury.
Predication
Perceptibility
The Federal Rules of Evidence
Evidence
Evidence
Things such as the timing of key transactions, altered documents, concealed documents, destroyed evidence, missing documents, false statements, patterns of suspicious activity, and breaks in patterns of expected activity are examples of ___________________ that may indicate the act, concealment, or conversion in fraud.
Predication
Direct evidence
Circumstantial evidence
MICE
Circumstantial evidence
According to ACFE research, ______________________ are the most common concealment methods for all three categories: asset misappropriation, corruption, and financial reporting fraud.
Creating fraudulent documents and altering physical documents
Creating fraudulent transactions in the accounting system
Creating fraudulent electronic documents or files
Creating fraudulent audit records
Creating fraudulent documents and altering physical documents
Typically, a few _______________ are not in themselves sufficient as a basis for a fraud examination.
Red flags
Instances of missing cash or other assets
Tips with some corroborating evidence
Falsified financial reports
Red flags
You are a fraud examiner who is investigating a suspected embezzlement. As you comb through the general ledger looking for debit entries to offset credits to cash, which account of those listed below is the most commonly used in concealment in such cases?
Debits to equity
Debits to liabilities
Debits to expense accounts
Debits to revenues
Debits to expense accounts
True big data, data analytics, and data mining software doesn’t just change the presentation, but actually discovers _____________________ among the data.
Materiality
Fraud schemes
Previously unknown relationships
Patterns/breaks in patterns
Previously unknown relationships
The primary challenge related to using financial profiling methods is the _________________________________________.
Amount of legwork involved in developing sources of information
Difficulty in dealing with offshore banks and foreign laws
Identification of shell company beneficial owners
Difficulty in accessing tax returns without a court order
Amount of legwork involved in developing sources of information
Analysis of cash flows, analysis of competing hypotheses, consideration of analytical and accounting anomalies, big data and data analytics, consideration of the fraud triangle, use of graphical tools for analysis and communication, internal controls, the control environment and opportunity, interviewing for information and admissions, analysis of nonaccounting and nonfinancial numbers and metrics, financial statement and ratio analysis, consideration of red flags, and analysis of related parties are all examples of:
Direct evidence.
Methods by which evidence can be assessed for validity and reliability.
Board and management responsibilities.
Forensic accounting and fraud examination tools/techniques.
Forensic accounting and fraud examination tools/techniques.
In fraud cases, evidence of ______________ in particular, provides some of the best circumstantial evidence that the act and conversion (benefits) were intentional.
Concealment
Motive, intent, concatenate, and elude (MICE)
A bribe
Rationalization
Concealment
You are conducting a fraud examination in which a confidential informant told you that the key suspect purchased a brand new luxury vehicle with cash that was embezzled. Which kind of report should you obtain to verify this?
Large Cash Purchase Report (LCPR)
Suspicious Activity Report (SAR)
Currency Transaction Report (CTR)
IRS Form 8300
IRS Form 8300
An excellent tool to analyze evidence and develop a compelling storyline is the _______________________.
Hypothesis-Evidence Matrix
The Fraud Triangle
A correlation coefficient of .95 or greater for each variable associated with the fraud
Use of software tools such SAS or IDEA geared toward fraud analysis
Hypothesis-Evidence Matrix
There is a debate in the profession about whether tracing money to a perpetrator’s bank account is sufficient evidence of conversion, or whether the fraud examiner or forensic accountant needs to show how the ill-begotten money was used. Legal precedent indicates that tracing the money into the hands of the perpetrator or his or her bank account is____________________.
Insufficient
Sufficient
More powerful than showing how the perpetrator benefited from it
Only useful to the extent that you can show how the money was used
Sufficient