Exam 4 Flashcards

1
Q

Unauthorized activity, theft, or fraud carried out by a 3rd party outside the institution through fraudulent behavior.

A

External fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threatens any company for one reason: its impossible to conduct business without interacting with outsiders.

A

External fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 3 sources of external fraud?

A
  1. customers
  2. vendors
  3. unrelated third parties
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do external parties look for in companies to commit fraud?

A

Data and R&D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Easy to produce, small business does not have time and resources to scrutinize, and may include an individual who is an expert (paperhanger).

A

Counterfeit checks (Check fraud)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Victim offers something for sale on the internet, typically big ticket item, fraudster contracts victim to buy, sends counterfeit check, changes mind, then asks for refund (check was never real).

A

E-commerce check scams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or false.
Most of the world still uses a significant amount of personal checks.

A

False.
The United States is the only country.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are 3 ways to prevent and detect check fraud?

A
  1. No check policy
  2. Request ID
  3. Educate employees
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The misuse of a credit card to make purchases without authorization or counterfeiting a credit card. May include stolen card numbers.

A

Credit card fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cards made using the appropriately sized plastic with embroised account numbers and names.

A

Counterfeit cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are 3 ways to prevent and detect credit card fraud?

A
  1. Educate employees
  2. Check card signatures
  3. Ask for ID
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are 3 red flags of credit card fraud?

A
  1. Card pulled out of pocket
  2. Expensive items on new card
  3. Rushed customer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Competitors submit token bids that are too high to be accepted. Helps accomplice’s bid look good.

A

Complementary bids

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Two or more contractors conspire to alternate the business between them on a rotating basis.

A

Bid rotation (bid-pooling)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Phony bids from shell companies to create the illusion of competition.

A

Phantom bids

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are two contract performance schemes?

A
  1. Product substitution
  2. Cost mischarging
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Contractor charges the procuring entity for costs that are not allowable, unreasonable, or cannot be allocated directly to the contract.

A

Cost mischarging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are 3 ways to prevent and detect vendor fraud?

A
  1. Vendor audit (right to audit clause)
  2. Integral contractors
  3. Look for red flags
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When companies choose to interact with customer and vendors, but an unknown chooses to target the companies.

A

Third party threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Requires an understanding of the technology used in the crime, lack paper trail, usually requires internet.

A

Computer fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The use of technology to gain unauthorized access to sensitive information on a computer system.

A

Computer hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are 4 methods used to gain unauthorized access during computer hacking?

A
  1. Password cracking
  2. Social engineering
  3. Phishing
  4. Wiretapping
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Fraudsters hijack business names to execute attacks which dupe victims to providing sensitive information.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Data manipulation and data destruction is a ______.

A

Crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are 3 ways to prevent and detect computer fraud?

A
  1. Formal security
  2. Firewalls
  3. Encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are 3 reasons corporations commit espionage?

A
  1. Information and data
  2. Intelligence that provides actionable decisions
  3. Valuable structures/products
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are 4 targets of corporate spies?

A
  1. R&D
  2. Marketing
  3. Manufacturing
  4. HR
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are 3 ways to prevent and detect corporate espionage regarding documentation or ideas?

A
  1. Use locked filing cabinets
  2. Shred documents
  3. Locked waste
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The vulnerability an organization has to overcome regarding the interrelated elements that enable someone to commit fraud.

A

Fraud risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Risks that are present before management action are described as _____ risk.

A

Inherent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Risks that are present after management action are described as ______ risk.

A

Residual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are the 3 reasons to be concerned about fraud risk?

A
  1. No immunity
  2. Awareness is needed to fix
  3. Can be internal or external
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Right balance of preventive and detective controls, can greatly reduce an organizations vulnerability to fraud. (Factor that influences fraud risk)

A

Effectiveness of internal controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

It is impossible, to have a company made up of individuals whose ethics and values are fully aligned with those of the organization. (Factor that influences fraud risk)

A

Ethics and values of company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A process aimed at proactively identifying and addressing an organization vulnerabilities to internal and external fraud.

A

Fraud risk assessment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

The main proponent of the fraud risk assessment process that helps an organization recognize what makes it most vulnerable to fraud so that it can take proactive measures to reduce its exposure.

A

The Objective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What are 2 reasons organizations should conduct fraud risk assessments?

A
  1. Assess internal controls (Improve)
  2. Comply with regulations and standards (Compliance)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What are 4 things that makes a good fraud risk assessment?

A
  1. Collaboration
  2. Good knowledge
  3. Access to all levels (Organization)
  4. Right sponsor (hears good, bad, and ugly)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What are 3 considerations for developing an effective fraud risk assessment?

A
  1. Packaging it right
  2. One size does not fit all
  3. Keeping it simple
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What are 3 inquiry techniques to use for risk assessment?

A
  1. Interviews
  2. Surveys
  3. Focus groups
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What are 4 things a sponsor would agree to be worked on in a risk assessment?

A
  1. Participants
  2. Output
  3. Methods
  4. Scope
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What are 4 inherent fraud risks?

A
  1. Position
  2. Incentives
  3. Management override
  4. Performance pressures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Identifying and mapping existing _____ and _____ controls to the relevant fraud is a portion of executing fraud risk assessment.

A
  1. Preventive
  2. Detective
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Addressing the identified fraud risks involves 3 things…

A
  1. Set acceptable risk level
  2. Rank and prioritize risk
  3. Respond to residual risks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What are the 5 responses to residual fraud risks?

A
  1. Transfer (insurance)
  2. Avoid (eliminate)
  3. Mitigate (controls)
  4. Assume (low occurrence)
  5. Combination approach (transfer part and controls)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What are 4 important parts to reporting the results?

A
  1. Simple
  2. Objective, not subjective
  3. Focus on importance
  4. Actions are clear and measurable
47
Q

What are the 4 parts to making an impact?

A
  1. Dialog
  2. Look-out
  3. Responsibility
  4. Assessment alive and well
48
Q

Auditors should validate that the organization is managing the moderate-to-high fraud risks by….. 4 things.

A
  1. Evaluate controls
  2. Identify
  3. Develop reports
  4. Deliver reports
49
Q

The strategic reasonings used in conducting a fraud risk assessment requires a _____ _______ and involves _______ _______.

A
  1. Skeptical mindset
  2. Asking questions
50
Q

Why should organizations conduct fraud risk assessment? (4 things)

A
  1. Improve communication
  2. Identify vulnerability
  3. Find greatest risk (employee)
  4. Develop plans and techniques
51
Q

What are 4 reasons to conduct an investigation?

A
  1. Identify
  2. Mitigate liability
  3. Avoid discrimination
  4. Comply (laws)
52
Q

What are two things involved with planning the investigation?

A
  1. Who is involved
  2. What is the strategy
53
Q

Includes those who assist in the investigation, have genuine interest in the investigation outcome, and has a primary goal to resolve fraud allegations.

A

The investigation team

54
Q

What are 4 groups of people that are involved with the investigative team?

A
  1. CFEs
  2. Legal counsel
  3. internal auditors
  4. HR
55
Q

Anything perceivable by the five senses. Any proof that is legally presented at trial to prove a contention and induce a belief in the minds of a jury.

A

Evidence

56
Q

What are 3 ways to obtain evidence?

A
  1. Surveillance
  2. Informants
  3. Search warrants or subpoenas
57
Q

When an investigator assumes a fictitious identity, which requires a high degree of planning and skills. Legal if there is sufficient probable cause that a crime has been committed.

A

Covert operations

58
Q

Obtaining information through falsehood or deception. Not always legal. It is illegal to obtain information through falsehood.

A

Pretexting

59
Q

Secretive and continuous observance of a suspects activities.

A

Surveillance

60
Q

Sifting through suspect’s trash to obtain evidence.

A

Dumpster diving

61
Q

If evidence is held by other parties or is in uncontrolled locations, specific legal action is required before attempting to obtain it.

A

Subpoenas

62
Q

If there is probable cause to believe that certain records are being used or have been used in the commission of a crime, the law enforcement officer will prepare an affidavit for a ______ __________.

A

Search warrant

63
Q

Often the simplest means to obtain documentation. Can be given via oral or written means, allowing an investigator to obtain information or items by the innocent or perpetrator person.

A

Voluntary consent

64
Q

What is the primary goal for investigative teams?

A

To resolve fraud allegations as thoroughly and efficiently as possible

65
Q

To be admissible in court, evidence must be preserved and handled correctly. Same state at which you found it.

A

Handling evidence

66
Q

Record of when item is received or when it leaves the care, custody, or control of the fraud examiner.

A

Chain of custody

67
Q

Documents should be marked for later identification; however, never mark on original documents other than unobtrusive initials or tick marks made for identification.

A

Preserving evidence

68
Q

Segregate documents either by witness or by transaction. Make key document file.

A

Organizing evidence.

69
Q

When fraud examiners may need to search for specific information to help the investigation.

A

Sources of information

70
Q

Investigators can learn a great deal from internal documents and information at the suspect’s organization.

A

In-house sources

71
Q

Records that a governmental unit is required by law to keep or those which are necessary for a governmental unit to keep in order to discharge its duties imposed by law.

A

Public Information

72
Q

Commercial online services provide convenient access to a wide range of data in a single place.

A

Online searches

73
Q

What are the 5 steps of interviewing questions?

A
  1. Introductory
  2. Informational
  3. Assessment
  4. Cloning
  5. Admission-seeking
74
Q

Provides an introduction and establishes rapport.

A

Introductory

75
Q

What are 3 general rules for introductory?

A
  1. Interview 1 at a time
  2. Interview in privacy
  3. Ask non-sensitive questions
76
Q

Sets a legitimate basis for the questioning and explains to the subject how he fits into the inquiry.

A

Make a transitional statement

77
Q

You should attempt to phrase questions so that they can be answered “yes”. it is easier for people to reply in the affirmative than the negative.

A

Seek continuous agreement

78
Q

You do not have the right to limit the use of the information or to decide how the information will be used in the investigation.

A

Do not promise confidentiality

79
Q

You should tell the subject that any information he provides will be conveyed to the appropriate individual.

A

Negotiations

80
Q

It is not your role to provide information.

A

Not discussing the source of allegations

81
Q

When you frame the next question as a logical continuation of the facts.

A

Question sequences

82
Q

Begin by asking questions that are not likely to cause the respondent to become defensive or hostile. Also, ask one question at a time, be straightforward, and no interruptions.

A

Informational question techniques

83
Q

What 4 things to do in the methodology information phase?

A
  1. Background questions
  2. Observe
  3. Non-leading questions
  4. Be careful for sensitive questions
84
Q

An interview that has the potential to bring about strong emotional reactions in the respondent.

A

Volatile interviews

85
Q

Go over key facts to make certain that they have been understood.

A

Reconfirming facts

86
Q

Simply ask the subject whether there is anything else he would like to say.

A

Gathering additional facts

87
Q

Ask respondents whether they believe they have been treated fairly.

A

Concluding the interview

88
Q

Establishes the credibility of the respondent.

A

Assessment Questions

89
Q

Process of observing behavior before critical questions are asked.

A

Norming or calibrating

90
Q

People lie for one of two reasons….

A
  1. Receive rewards
  2. Avoid punishment
91
Q

When you want to distinguish the innocent from the culpable, obtain a valid confession and written statement to confirm.

A

Admission-seeking questions

92
Q

The accuser has reasonable suspicion or predication to believe the accused has committed an offence, and the accusation is made under conditions of privacy but ends up being wrong.

A

Accusing an innocent person

93
Q

What are the 4 steps in the admission-seeking interview?

A
  1. Accuse
  2. Observe
  3. Repeat
  4. Interrupt denials
94
Q

Fraud examinations conclude with a report of the investigation results. Usually in a formal writing.

A

Report writing

95
Q

What are the 6 format parts of a fraud examination report?

A
  1. Author/date
  2. Summary
  3. Introduction
  4. Body
  5. Results
  6. Follow up/recommendations
96
Q

Investigation reports should only ____ the _____.

A
  1. State
  2. Facts
97
Q

If a rule makes no sense to employees, they will ____ ___ ___.

A

Make their own

98
Q

In a Hollinger and Clark study, ___ out of 10 employees admitted to committing abusive conduct at some level.

A

9

99
Q

What are 3 things involved in the human factor of occupational fraud and abuse?

A
  1. Greed
  2. Wages in kind
  3. Unreasonable expectations
100
Q

What removes the root cause of the problem in terms of controls?

A

Prevention

101
Q

What modifies the behavior through perception of negative sanctions.

A

Deterrence

102
Q

Employees who perceive that they will be caught engaging in occupational fraud and abuse are less likely to commit it.

A

Perception of Detection

103
Q

What are 3 things that lead to high perceptions of detection?

A
  1. Education
  2. Surprise audit
  3. Proactive policies
104
Q

What are 3 things that lead to adequate reporting programs?

A
  1. Exact method to report
  2. No penalties for good-faith info
  3. Understanding fraud/abuse is everywhere
105
Q

What are 3 things involved with corporate sentencing guidelines?

A
  1. Uniform punishment
  2. Severe punishment
  3. Effective compliance program
106
Q

Corporations can be held criminally responsible for the acts of their employees.

A

Vicarious or imputed liability

107
Q

True or false.
The corporation will be held criminally responsible only when management had knowledge or participation in the underlying criminal events.

A

False.
The corporation will be held criminally responsible even if management had no knowledge or participation.

108
Q

What are the 3 requirements for corporate sentencing guidelines?

A
  1. Defined S&P
  2. High-level’s ensure compliance
  3. Due care
109
Q

The branch of philosophy which is the systematic study of reflective choice, of the standard of right and wrong by which a person is to be guided, and of the goods toward which it may ultimately be directed.

A

The Ethical Connection

110
Q

Concrete ethical principles that cannot be violated.

A

Imperative principle

111
Q

Each situation must be evaluated on its own.

A

Situational ethics

112
Q

Theft that is justified by the person as “Retribution inadequate pay”…

A

Wages in kind

113
Q

Regarding the essence of people, humans are…. 3 things.

A
  1. Good
  2. Evil
  3. Calculating
114
Q

When creating ethics policy, provide 3 things…

A
  1. Define bad conduct
  2. State punishment
  3. Provide reporting