Fraud Evidence and Investigation Flashcards

1
Q

Which of the following methods is acceptable to handle computer equipment seized in a computer crime investigation?
Subjecting the magnetic media to forensic testing.
Laying the magnetic media on top of electronic equipment.
Exposing the magnetic media to radio waves.
Leaving the magnetic media in the trunk of a vehicle containing a radio unit.

A

Subjecting the magnetic media to forensic testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following investigative tools ismosteffective when large volumes of evidence need to be analyzed?
Computer.
Questionnaires.
Forensic analysis.
Interviews.
A

Computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
The concept of admissibility of evidence does not include which of the following?
Relevance.
Competence.
Materiality.
Sufficiency.
A

Sufficiency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Data diddling can be prevented by all of the following except:
Access controls.
Integrity checking.
Program change controls.
Rapid correction of data.
A

Rapid correction of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
In a computer-related crime investigation, computer evidence is:
Difficult and erasable.
Volatile and invisible.
Electronic and inadmissible.
Apparent and magnetic.
A

Volatile and invisible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
The final stage of reporting results of computer evidence life cycle is:
Receive.
Examine.
Report.
Return.
A

Return.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Identify the computer-related crime and fraud method that involves obtaining information that may be left in or around a computer system after the execution of a job.
Piggybacking.
Data diddling.
Scavenging.
Salami technique.
A

Scavenging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Once evidence is seized, a law enforcement officer should follow which of the following?
Chain of control.
Chain of command.
Chain of custody.
Chain of communications.
A

Chain of custody.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

If a computer or peripheral equipment involved in a computer crime isnotcovered by a search warrant, what should the investigator do?
Analyze the equipment or its contents, and record it.
Leave it alone until a warrant can be obtained.
Seize it before someone takes it away.
Store it in a locked cabinet in a secure warehouse.

A

Leave it alone until a warrant can be obtained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Are an investigator?s handwritten notes considered valid evidence in court of law?
No.
Yes.
Maybe.
Depends.
A

Yes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
The most objective and relevant evidence in a computer environment involving fraud is.
Physical examination.
Computer logs.
Physical observation.
Inquiries of people.
A

Computer logs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What determines if a computer crime has been committed?
When the crime is reported.
When the investigation is completed.
When a computer expert has completed his or her work.
When the allegation has been substantiated.

A

When the allegation has been substantiated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Most of the evidence submitted in a computer crime case is:
Secondary evidence.
Documentary evidence.
Admissible evidence.
Legal evidence.
A

Documentary evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a data diddling technique?
I.Changing data before input to a computer system.
II.Changing data during input to a computer system.
III.Changing data during output from a computer system.
IV.All options.

A

IV.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
An internal auditor suspects fraud. Which of the following sample plans should be used if the purpose is to select a sample with a given probability of containing at least one example of the irregularity?
Probability proportional to size.
Attributes.
Stop and go.
Discovery.
A

Discovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Because of control weaknesses, it is possible that the individual managers of 122 restaurants could have placed fictitious employees on the payroll. Each restaurant employs between 25 and 30 people. To efficiently determine whether this fraud exists at less than a 1% level, the auditor should use:
Discovery sampling.
Judgment sampling.
Directed sampling.
Attributes sampling.
A

Discovery sampling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
Which of the following is needed to produce technical evidence in computer-related crimes?
Audit methodology.
Criminal methodology.
Forensic methodology.
System methodology.
A

Forensic methodology.

18
Q

A reliable way to detect superzapping work is by:
Noting discrepancies by those who receive reports.
Comparing current data files with previous data files.
Examining computer usage logs.
Reviewing undocumented transactions.

A

Comparing current data files with previous data files.

19
Q

An auditor applying a discovery sampling plan with a 5% risk of overreliance may conclude that there is:
A 95% probability that the actual rate of occurrence in the population is less than the critical rate if only one exception is found.
Greater than a 95% probability that the actual rate of occurrence in the population is less than the critical rate if no exceptions are found.
A 95% probability that the actual rate of occurrence in the population is less than the critical rate if no exceptions are found.
A 95% probability that the actual rate of occurrence in the population is less than the critical rate if the occurrence rate in the sample is less than the critical rate.

A

A 95% probability that the actual rate of occurrence in the population is less than the critical rate if no exceptions are found.

20
Q
Evidence is needed to do which of the following?
Charge a case.
Classify a case.
Prove a case.
Make a case.
A

Prove a case.

21
Q
What is a salami technique?
Stealing small amounts of money from bank accounts.
Using the rounding-down concept.
Taking small amounts of assets.
All options.
A

All options.

22
Q

After partially completing an internal control review of the accounts payable department, the auditor suspects that some type of fraud has occurred. To ascertain whether the fraud is present, thebestsampling approach would be to use:
Judgmental sampling to select a sample of vouchers processed by clerks identified by the department manager as acting suspiciously.
Simple random sampling to select a sample of vouchers processed by the department during the past year.
Probability-proportional-to-size sampling to select a sample of vouchers processed by the department during the past year.
Discovery sampling to select a sample of vouchers processed by the department during the past year.

A

Discovery sampling to select a sample of vouchers processed by the department during the past year.

23
Q
When large volumes of writing are presented in court, which type of evidence is inapplicable?
Flowchart evidence.
Demonstrative evidence.
Magnetic tapes evidence.
Best evidence.
A

Best evidence.

24
Q
In a computer-related crime investigation, maintenance of evidence is important for which of the following reasons?
To protect the evidence.
To collect the evidence.
To record the crime.
To avoid problems of proof.
A

To avoid problems of proof.

25
Q
The objective of which of the following team members is similar to that of the information systems security officer involved in a computer crime investigation?
District attorney.
Investigator.
Computer expert.
Internal systems auditor.
A

Internal systems auditor.

26
Q

Computer fraud is discouraged by:
Ostracizing whistleblowers.
Accepting the lack of integrity in the system.
Being willing to prosecute.
Overlooking inefficiencies in the judicial system.

A

Being willing to prosecute.

27
Q

With respect to computer security and fraud, a legal liability exists to an organization under which of the following conditions?
When estimated security costs are equal to estimated losses.
When estimated security costs are greater than estimated losses.
When estimated security costs are less than estimated losses.
When actual security costs are equal to actual losses.

A

When estimated security costs are less than estimated losses.

28
Q
From a computer security viewpoint, courts expect what amount of care from organizations?
Great care.
Extraordinary care.
Super care.
Due care.
A

Due care.

29
Q
When computers and peripheral equipment are seized in relation to a computer crime, it is an example of:
Collateral evidence.
Duplicate evidence.
Best evidence.
Physical evidence.
A

Physical evidence.

30
Q
When an auditor?s sampling objective is to obtain a measurable assurance that a sample will contain at least one occurrence of a specific critical exception existing in a population, the sampling approach to use is:
Variables.
Discovery.
Random.
Probability proportional to size.
A

Discovery.

31
Q
All of the following are proper ways to handle the computer equipment and magnetic media items involved in a computer crime investigationexcept:
Seal and store items in a cardboard box.
Seal and store items in a paper bag.
Seal and store items in a plastic bag.
Seal, store, and tag the items.
A

Seal and store items in a plastic bag.

32
Q
The chain of custody does not ask which of the following questions?
Who damaged the evidence?
Who collected the evidence?
Who controlled the evidence?
Who stored the evidence?
A

Who damaged the evidence?

33
Q

A search warrant is required:
Before identifying the number of investigators needed.
After establishing the probable cause(s).
After seizing the computer and related equipment.
Before the allegation has been substantiated.

A

After establishing the probable cause(s).

34
Q
Which of the following security techniques allows time for response by investigative authorities?
Detect.
Deny.
Delay.
Deter.
A

Delay.

35
Q
Computer fraud is increased when:
Documentation is not available.
Employee performance appraisals are not given.
Employees are not trained.
Audit trails are not available.
A

Audit trails are not available.

36
Q
Management is legally required to prepare a shipping document for all movement of hazardous materials. The document must be filed with bills of lading. Management expects 100% compliance with the procedure. Which of the following sampling approaches would bemostappropriate?
Discovery sampling.
Targeted sampling.
Attributes sampling.
Variables sampling.
A

Discovery sampling.

37
Q
Which of the following is not a criminal activity in most jurisdictions?
Writing a computer virus program.
Spreading a computer virus program.
Using a computer virus program.
Releasing a computer virus program.
A

Writing a computer virus program.

38
Q
The correct sequence of preliminary investigation is:
I.Consult with a computer expert.
II.Prepare an investigative plan.
III.Consult with a prosecutor.
IV.Substantiate the allegation.
IV, II, III, and I.
I, IV, II, and III.
III, I, II, and IV.
IV, I, II, and III.
A

IV, I, II, and III.

39
Q
In the audit of a health insurance claims processing department, a sample is taken to test for the presence of fictitious payees, although none is suspected. The most appropriate sampling plan would be:
Variables sampling.
Attributes sampling.
Discovery sampling.
Stop-and-go sampling.
A

Discovery sampling.

40
Q
The appropriate sampling plan to use to identify at least one irregularity, assuming some number of such irregularities exist in a population, and then to discontinue sampling when one irregularity is observed is:
Stop-and-go sampling.
Attributes sampling.
Variables sampling.
Discovery sampling.
A

Discovery sampling.

41
Q
A security investigator or law enforcement officer should observe which of the following during a computer crime investigation?
Chain of logs.
Chain of custody.
Chain of events.
Chain of computers.
A

Chain of custody.