Fraud Evidence and Investigation Flashcards
Which of the following methods is acceptable to handle computer equipment seized in a computer crime investigation?
Subjecting the magnetic media to forensic testing.
Laying the magnetic media on top of electronic equipment.
Exposing the magnetic media to radio waves.
Leaving the magnetic media in the trunk of a vehicle containing a radio unit.
Subjecting the magnetic media to forensic testing.
Which of the following investigative tools ismosteffective when large volumes of evidence need to be analyzed? Computer. Questionnaires. Forensic analysis. Interviews.
Computer.
The concept of admissibility of evidence does not include which of the following? Relevance. Competence. Materiality. Sufficiency.
Sufficiency.
Data diddling can be prevented by all of the following except: Access controls. Integrity checking. Program change controls. Rapid correction of data.
Rapid correction of data.
In a computer-related crime investigation, computer evidence is: Difficult and erasable. Volatile and invisible. Electronic and inadmissible. Apparent and magnetic.
Volatile and invisible.
The final stage of reporting results of computer evidence life cycle is: Receive. Examine. Report. Return.
Return.
Identify the computer-related crime and fraud method that involves obtaining information that may be left in or around a computer system after the execution of a job. Piggybacking. Data diddling. Scavenging. Salami technique.
Scavenging.
Once evidence is seized, a law enforcement officer should follow which of the following? Chain of control. Chain of command. Chain of custody. Chain of communications.
Chain of custody.
If a computer or peripheral equipment involved in a computer crime isnotcovered by a search warrant, what should the investigator do?
Analyze the equipment or its contents, and record it.
Leave it alone until a warrant can be obtained.
Seize it before someone takes it away.
Store it in a locked cabinet in a secure warehouse.
Leave it alone until a warrant can be obtained.
Are an investigator?s handwritten notes considered valid evidence in court of law? No. Yes. Maybe. Depends.
Yes.
The most objective and relevant evidence in a computer environment involving fraud is. Physical examination. Computer logs. Physical observation. Inquiries of people.
Computer logs.
What determines if a computer crime has been committed?
When the crime is reported.
When the investigation is completed.
When a computer expert has completed his or her work.
When the allegation has been substantiated.
When the allegation has been substantiated.
Most of the evidence submitted in a computer crime case is: Secondary evidence. Documentary evidence. Admissible evidence. Legal evidence.
Documentary evidence.
What is a data diddling technique?
I.Changing data before input to a computer system.
II.Changing data during input to a computer system.
III.Changing data during output from a computer system.
IV.All options.
IV.
An internal auditor suspects fraud. Which of the following sample plans should be used if the purpose is to select a sample with a given probability of containing at least one example of the irregularity? Probability proportional to size. Attributes. Stop and go. Discovery.
Discovery.
Because of control weaknesses, it is possible that the individual managers of 122 restaurants could have placed fictitious employees on the payroll. Each restaurant employs between 25 and 30 people. To efficiently determine whether this fraud exists at less than a 1% level, the auditor should use: Discovery sampling. Judgment sampling. Directed sampling. Attributes sampling.
Discovery sampling.