Exam 4 Flashcards

1
Q

Unauthorized activity, theft, or fraud carried out by a 3rd party outside the institution through fraudulent behavior.

A

External fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threatens any company for one reason: its impossible to conduct business without interacting with outsiders.

A

External fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 3 sources of external fraud?

A
  1. customers
  2. vendors
  3. unrelated third parties
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do external parties look for in companies to commit fraud?

A

Data and R&D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Easy to produce, small business does not have time and resources to scrutinize, and may include an individual who is an expert (paperhanger).

A

Counterfeit checks (Check fraud)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Victim offers something for sale on the internet, typically big ticket item, fraudster contracts victim to buy, sends counterfeit check, changes mind, then asks for refund (check was never real).

A

E-commerce check scams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or false.
Most of the world still uses a significant amount of personal checks.

A

False.
The United States is the only country.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are 3 ways to prevent and detect check fraud?

A
  1. No check policy
  2. Request ID
  3. Educate employees
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The misuse of a credit card to make purchases without authorization or counterfeiting a credit card. May include stolen card numbers.

A

Credit card fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cards made using the appropriately sized plastic with embroised account numbers and names.

A

Counterfeit cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are 3 ways to prevent and detect credit card fraud?

A
  1. Educate employees
  2. Check card signatures
  3. Ask for ID
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are 3 red flags of credit card fraud?

A
  1. Card pulled out of pocket
  2. Expensive items on new card
  3. Rushed customer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Competitors submit token bids that are too high to be accepted. Helps accomplice’s bid look good.

A

Complementary bids

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Two or more contractors conspire to alternate the business between them on a rotating basis.

A

Bid rotation (bid-pooling)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Phony bids from shell companies to create the illusion of competition.

A

Phantom bids

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are two contract performance schemes?

A
  1. Product substitution
  2. Cost mischarging
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Contractor charges the procuring entity for costs that are not allowable, unreasonable, or cannot be allocated directly to the contract.

A

Cost mischarging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are 3 ways to prevent and detect vendor fraud?

A
  1. Vendor audit (right to audit clause)
  2. Integral contractors
  3. Look for red flags
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When companies choose to interact with customer and vendors, but an unknown chooses to target the companies.

A

Third party threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Requires an understanding of the technology used in the crime, lack paper trail, usually requires internet.

A

Computer fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The use of technology to gain unauthorized access to sensitive information on a computer system.

A

Computer hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are 4 methods used to gain unauthorized access during computer hacking?

A
  1. Password cracking
  2. Social engineering
  3. Phishing
  4. Wiretapping
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Fraudsters hijack business names to execute attacks which dupe victims to providing sensitive information.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Data manipulation and data destruction is a ______.

A

Crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What are 3 ways to prevent and detect computer fraud?
1. Formal security 2. Firewalls 3. Encryption
26
What are 3 reasons corporations commit espionage?
1. Information and data 2. Intelligence that provides actionable decisions 3. Valuable structures/products
27
What are 4 targets of corporate spies?
1. R&D 2. Marketing 3. Manufacturing 4. HR
28
What are 3 ways to prevent and detect corporate espionage regarding documentation or ideas?
1. Use locked filing cabinets 2. Shred documents 3. Locked waste
29
The vulnerability an organization has to overcome regarding the interrelated elements that enable someone to commit fraud.
Fraud risk
30
Risks that are present before management action are described as _____ risk.
Inherent
31
Risks that are present after management action are described as ______ risk.
Residual
32
What are the 3 reasons to be concerned about fraud risk?
1. No immunity 2. Awareness is needed to fix 3. Can be internal or external
33
Right balance of preventive and detective controls, can greatly reduce an organizations vulnerability to fraud. (Factor that influences fraud risk)
Effectiveness of internal controls
34
It is impossible, to have a company made up of individuals whose ethics and values are fully aligned with those of the organization. (Factor that influences fraud risk)
Ethics and values of company
35
A process aimed at proactively identifying and addressing an organization vulnerabilities to internal and external fraud.
Fraud risk assessment.
36
The main proponent of the fraud risk assessment process that helps an organization recognize what makes it most vulnerable to fraud so that it can take proactive measures to reduce its exposure.
The Objective
37
What are 2 reasons organizations should conduct fraud risk assessments?
1. Assess internal controls (Improve) 2. Comply with regulations and standards (Compliance)
38
What are 4 things that makes a good fraud risk assessment?
1. Collaboration 2. Good knowledge 3. Access to all levels (Organization) 4. Right sponsor (hears good, bad, and ugly)
39
What are 3 considerations for developing an effective fraud risk assessment?
1. Packaging it right 2. One size does not fit all 3. Keeping it simple
40
What are 3 inquiry techniques to use for risk assessment?
1. Interviews 2. Surveys 3. Focus groups
41
What are 4 things a sponsor would agree to be worked on in a risk assessment?
1. Participants 2. Output 3. Methods 4. Scope
42
What are 4 inherent fraud risks?
1. Position 2. Incentives 3. Management override 4. Performance pressures
43
Identifying and mapping existing _____ and _____ controls to the relevant fraud is a portion of executing fraud risk assessment.
1. Preventive 2. Detective
44
Addressing the identified fraud risks involves 3 things...
1. Set acceptable risk level 2. Rank and prioritize risk 3. Respond to residual risks
45
What are the 5 responses to residual fraud risks?
1. Transfer (insurance) 2. Avoid (eliminate) 3. Mitigate (controls) 4. Assume (low occurrence) 5. Combination approach (transfer part and controls)
46
What are 4 important parts to reporting the results?
1. Simple 2. Objective, not subjective 3. Focus on importance 4. Actions are clear and measurable
47
What are the 4 parts to making an impact?
1. Dialog 2. Look-out 3. Responsibility 4. Assessment alive and well
48
Auditors should validate that the organization is managing the moderate-to-high fraud risks by..... 4 things.
1. Evaluate controls 2. Identify 3. Develop reports 4. Deliver reports
49
The strategic reasonings used in conducting a fraud risk assessment requires a _____ _______ and involves _______ _______.
1. Skeptical mindset 2. Asking questions
50
Why should organizations conduct fraud risk assessment? (4 things)
1. Improve communication 2. Identify vulnerability 3. Find greatest risk (employee) 4. Develop plans and techniques
51
What are 4 reasons to conduct an investigation?
1. Identify 2. Mitigate liability 3. Avoid discrimination 4. Comply (laws)
52
What are two things involved with planning the investigation?
1. Who is involved 2. What is the strategy
53
Includes those who assist in the investigation, have genuine interest in the investigation outcome, and has a primary goal to resolve fraud allegations.
The investigation team
54
What are 4 groups of people that are involved with the investigative team?
1. CFEs 2. Legal counsel 3. internal auditors 4. HR
55
Anything perceivable by the five senses. Any proof that is legally presented at trial to prove a contention and induce a belief in the minds of a jury.
Evidence
56
What are 3 ways to obtain evidence?
1. Surveillance 2. Informants 3. Search warrants or subpoenas
57
When an investigator assumes a fictitious identity, which requires a high degree of planning and skills. Legal if there is sufficient probable cause that a crime has been committed.
Covert operations
58
Obtaining information through falsehood or deception. Not always legal. It is illegal to obtain information through falsehood.
Pretexting
59
Secretive and continuous observance of a suspects activities.
Surveillance
60
Sifting through suspect's trash to obtain evidence.
Dumpster diving
61
If evidence is held by other parties or is in uncontrolled locations, specific legal action is required before attempting to obtain it.
Subpoenas
62
If there is probable cause to believe that certain records are being used or have been used in the commission of a crime, the law enforcement officer will prepare an affidavit for a ______ __________.
Search warrant
63
Often the simplest means to obtain documentation. Can be given via oral or written means, allowing an investigator to obtain information or items by the innocent or perpetrator person.
Voluntary consent
64
What is the primary goal for investigative teams?
To resolve fraud allegations as thoroughly and efficiently as possible
65
To be admissible in court, evidence must be preserved and handled correctly. Same state at which you found it.
Handling evidence
66
Record of when item is received or when it leaves the care, custody, or control of the fraud examiner.
Chain of custody
67
Documents should be marked for later identification; however, never mark on original documents other than unobtrusive initials or tick marks made for identification.
Preserving evidence
68
Segregate documents either by witness or by transaction. Make key document file.
Organizing evidence.
69
When fraud examiners may need to search for specific information to help the investigation.
Sources of information
70
Investigators can learn a great deal from internal documents and information at the suspect's organization.
In-house sources
71
Records that a governmental unit is required by law to keep or those which are necessary for a governmental unit to keep in order to discharge its duties imposed by law.
Public Information
72
Commercial online services provide convenient access to a wide range of data in a single place.
Online searches
73
What are the 5 steps of interviewing questions?
1. Introductory 2. Informational 3. Assessment 4. Cloning 5. Admission-seeking
74
Provides an introduction and establishes rapport.
Introductory
75
What are 3 general rules for introductory?
1. Interview 1 at a time 2. Interview in privacy 3. Ask non-sensitive questions
76
Sets a legitimate basis for the questioning and explains to the subject how he fits into the inquiry.
Make a transitional statement
77
You should attempt to phrase questions so that they can be answered "yes". it is easier for people to reply in the affirmative than the negative.
Seek continuous agreement
78
You do not have the right to limit the use of the information or to decide how the information will be used in the investigation.
Do not promise confidentiality
79
You should tell the subject that any information he provides will be conveyed to the appropriate individual.
Negotiations
80
It is not your role to provide information.
Not discussing the source of allegations
81
When you frame the next question as a logical continuation of the facts.
Question sequences
82
Begin by asking questions that are not likely to cause the respondent to become defensive or hostile. Also, ask one question at a time, be straightforward, and no interruptions.
Informational question techniques
83
What 4 things to do in the methodology information phase?
1. Background questions 2. Observe 3. Non-leading questions 4. Be careful for sensitive questions
84
An interview that has the potential to bring about strong emotional reactions in the respondent.
Volatile interviews
85
Go over key facts to make certain that they have been understood.
Reconfirming facts
86
Simply ask the subject whether there is anything else he would like to say.
Gathering additional facts
87
Ask respondents whether they believe they have been treated fairly.
Concluding the interview
88
Establishes the credibility of the respondent.
Assessment Questions
89
Process of observing behavior before critical questions are asked.
Norming or calibrating
90
People lie for one of two reasons....
1. Receive rewards 2. Avoid punishment
91
When you want to distinguish the innocent from the culpable, obtain a valid confession and written statement to confirm.
Admission-seeking questions
92
The accuser has reasonable suspicion or predication to believe the accused has committed an offence, and the accusation is made under conditions of privacy but ends up being wrong.
Accusing an innocent person
93
What are the 4 steps in the admission-seeking interview?
1. Accuse 2. Observe 3. Repeat 4. Interrupt denials
94
Fraud examinations conclude with a report of the investigation results. Usually in a formal writing.
Report writing
95
What are the 6 format parts of a fraud examination report?
1. Author/date 2. Summary 3. Introduction 4. Body 5. Results 6. Follow up/recommendations
96
Investigation reports should only ____ the _____.
1. State 2. Facts
97
If a rule makes no sense to employees, they will ____ ___ ___.
Make their own
98
In a Hollinger and Clark study, ___ out of 10 employees admitted to committing abusive conduct at some level.
9
99
What are 3 things involved in the human factor of occupational fraud and abuse?
1. Greed 2. Wages in kind 3. Unreasonable expectations
100
What removes the root cause of the problem in terms of controls?
Prevention
101
What modifies the behavior through perception of negative sanctions.
Deterrence
102
Employees who perceive that they will be caught engaging in occupational fraud and abuse are less likely to commit it.
Perception of Detection
103
What are 3 things that lead to high perceptions of detection?
1. Education 2. Surprise audit 3. Proactive policies
104
What are 3 things that lead to adequate reporting programs?
1. Exact method to report 2. No penalties for good-faith info 3. Understanding fraud/abuse is everywhere
105
What are 3 things involved with corporate sentencing guidelines?
1. Uniform punishment 2. Severe punishment 3. Effective compliance program
106
Corporations can be held criminally responsible for the acts of their employees.
Vicarious or imputed liability
107
True or false. The corporation will be held criminally responsible only when management had knowledge or participation in the underlying criminal events.
False. The corporation will be held criminally responsible even if management had no knowledge or participation.
108
What are the 3 requirements for corporate sentencing guidelines?
1. Defined S&P 2. High-level's ensure compliance 3. Due care
109
The branch of philosophy which is the systematic study of reflective choice, of the standard of right and wrong by which a person is to be guided, and of the goods toward which it may ultimately be directed.
The Ethical Connection
110
Concrete ethical principles that cannot be violated.
Imperative principle
111
Each situation must be evaluated on its own.
Situational ethics
112
Theft that is justified by the person as "Retribution inadequate pay"...
Wages in kind
113
Regarding the essence of people, humans are.... 3 things.
1. Good 2. Evil 3. Calculating
114
When creating ethics policy, provide 3 things...
1. Define bad conduct 2. State punishment 3. Provide reporting