Midterm Multiple Choice Flashcards
When Detecting fraud it is important that fraud investigators:
a. Remain objective and neutral
b. Assume Guilt
c. Assume innocence
d. None of the above
a
Data-Driven fraud detection:
a. determines the cost of fraud
b. identifies possible fraud suspects
c. Looks for errors in databases
d. All of the above
c
Once a buyer starts accepting kickbacks from a supplier:
a. prices often increase
b. purchases from other vendors decrease
c. The supplier usually takes control of the purchasing relationship
d. All of the above
d
The most obvious disadvantage of the data-driven approach is:
a. Databases are very large and often cannot be analyzed using analysis packages
b. High Cost
c. The decrease in employee morale
d. None of the above
b
Benford’s Law:
a. Is usually unsuccessful as a fraud detection tool
b. Predicts that the first digit of random number sets will begin with a 1 more often than a 2, a 2 more often than a 3 and so on
c. Applies to personal ID numbers
d. All of the above
b
A detection method that focuses on the kinds of frauds that can occur and then uses technology to determine whether those fraud actually exist is called:
a. Fishing fraud detection
b. Data Mining
c. Data-driven fraud detection
d. Benford’s Law
c
When deciding which detection method to use, it is important to:
a. Determine the advantages of each approach
b. Identify the costs involved
c. Determine which method will meet the client’s objectives.
d. All the above
d
Fraud is best detected through financial statements by focusing on:
a. Unexplained changes in financial statement balances
b. Consistencies
c. Intuition
d. Management’s behavior when financial statements are released
a
The most effective way to convert balance sheets and income statements from position and period statements to change statements is to:
a. Compare balances in the statements from one period to the next
b. Calculate key ratios and compare them from period to period
c. Perform horizontal and vertical analyses
d. All of the above
c
Profit margin, return on assets, and return on equity are all examples of:
a. Vertical Analysis
b. Key Financial statement ratios
c. Horizontal analysis
d. None of the above
b
When vertical analysis is performed:
a. Ratios are used to detect fraud
b. Changes in significant balance totals are examined
c. Financial statement balances are converted to percentages
d. Total revenues are compared to total expenses
c
Horizontal analysis is different from vertical analysis in that:
a. There is no difference between horizontal and vertical analysis
b. Horizontal analysis calculates the percentage change in balance sheet and income statement numbers from one period to the next, while vertical analysis converts balances in a single period to percentages
c. Horizontal analysis converts balances from a single period to percentages, while vertical analysis calculates the percentage change in balance sheet and income statement from one period to the next.
d. Key ratios are compared from one period to the next.
b
Which of the following is an advantage of using data analysis software to detect fraud?
a. It is a static approach, and results cannot be recombined in different ways
b. Data analysis software can only be used to analyze small data sets
c. Data analysis software can analyze entire populations rather than just samples
d. Significant numbers of hits can occur, requiring iterative refinement of analyses
c
Benford’s Law is:
a. The most expensive of all the digital analysis methods to implement and use
b. The most effective way to identify actual frauds
c. A method that uses vertical financial statement analysis
d. An effective way to identify errors in data sets
d
If a search reveals that an employee or vendor have the same telephone number, this may indicate that:
a. Vendors are overcharging for goods purchased
b. Employees may be establishing dummy vendors
c. Contractors are billing at the wrong rates
d. A Vendor is receiving kickbacks or other favors
b
When conducting financial statement analysis, which ratio will be the most useful in determining whether a company has erroneously inflated accounts receivable?
a. Current Ratio
b. Profit Margin
c. Accounts receivable turnover
d. Debt Percentage
c
When trying to identify outliers, what is one of the best statistical approaches?
a. A pie graph indicating the relative amounts
b. Stratification of cases by value
c. Time-trending using the high-low slope method
d. The Z score calculation
d
An advantage of using ODBC to import data into a data warehouse is that:
a. ODBC doesn’t require the use of corporate database servers
b. ODBC compresses data when stored on a CD or DVD
c. ODBC automatically retrieves column names and types from the database
d. ODBC keeps the investigator from dealing with the difficult SQL language
c
The Is Algorithm:
a. Uses consonants but ignores vowels
b. creates a numerical score representing how a word sounds
c. Is useful when fuzzy matching values
d. All of the above
d
Which of the following is not a category used in the fraud triangle plus inquiry paradigm?
a. theft investigative techniques
b. concealment investigative techniques
c. Action investigative techniques
d. Conversion Investigative techniques
c
When beginning and investigation, it is important that fraud examiners use techniques that will:
a. not arouse suspicion
b. identify the perpetrator
c. determine the amount of fraud
d. Identify when the fraud occurred
a
When conducting interviews during an investigation, which of the following words should usually be avoided?
a. Audit
b. Inquiry
c. Investigation
d. Record examination
c
When beginning a fraud investigation, which of the following methods is most useful in identifying possible suspects?
a. Preparing an identification chart
b. Preparing a vulnerability chart
c. preparing a surveillance log
d. Hiring a private investigator to tail the subject
b
Invigilation
Provides evidence to help determine whether fraud is occurring
Which of the following is not a theft act investigation method?
a. Invigilation
b. Honesty testing
c. Seizing and searching computers
d. Surveillance and covert operations
b
When deciding whether or not to investigate, which of the following factors should an organization not consider?
a. Possible cost of the investigation
b. Perceived strength of the predication
c. Possible public exposure resulting because of the investigation
d. All of the above should be considered.
d
Surveillance, when properly performed, is always done:
a. Without the perpetrator’s knowledge
b. During non working hours
c. Only by law enforcement agents
d. None of the above
a
Which of the following is not included in a vulnerability chart?
a. Explanations of the fraud triangle in relation to suspects of fraud
b. Breakdowns in key internal controls that may have created fraud opportunities
c. Internal controls that a company plans to institute in the future
d. theft act investigation methods
c