Topic 5 Data Driven Fraud Detection Flashcards
Fraud is best detected through financial statements by focusing on:
a. Unexplained changes in financial statement balances.
b. Consistencies.
c. Intuition.
d. Management’s behavior when financial state-ments are released.
a)
A detection method that focuses on the kinds of frauds that can occur and then uses technology to determine whether those frauds actually exist is called:
a. Fishing fraud detection.
b. Data mining.
c. Data-driven fraud detection.
d. Benford’s Law.
7
c)
When vertical analysis is performed:
a. Ratios are used to detect fraud.
b. Changes in significant balance totals are examined.
c. Financial statement balances are converted to percentages.
d. Total revenues are compared to total expenses
c)
Which of the following ratios can be used to assess a company’s solvency?
a. Current ratio
b. Return on assets’
c. Times-interest-earned ratio
d. Inventory turnover
C)
Once a buyer starts accepting kickbacks from a supplier:
a. Prices often increase.
b. Purchases from other vendors often decrease. c. The supplier usually takes control of the pur-chasing relationship.
d. All of the above.
d)
Kickbacks from vendors to buyers might
generate which one of the following
symptoms?
a. Buyer not relating well to other
buyers and vendors
b. Decreasing purchases from favored
vendorI
c. Increasing purchases from other
vendors
d. Decreasing prices and increasing quality
a)
Which of the following is the most important step in data analysis?
a. Gathering the right data in the right format in the right time period
b. Understanding the available data
c. Learning the basics of table structure and field types
d. Learning the basics of key relationships and query syntax
A)
T or F: Digital analysis using Benford’s Law can be per-formed on databases of any size.
True
T or F: When using Benford’s Law, potential suspects are less likely to know you are trying to detect fraud than if you use more direct detection techniques.
True
Which of the following is true of most accounting errors?
a. They are primarily caused by lack of training.
b. They represent intentional sabotage of controls.
c. They are problems caused by failures in systems, procedures, and policies.
d. They represent fraud.
c)
______ are at wo-dimensional view with cases in one dimension and the calculations in the other.
a. N-grams
b. Z-scores
c. Pivot tables
d. Soundex algorithms
C)
Specific implementations of delimited text are called TSV. What does TSV stand for?
a. toxicity screening value
b. time segmented volume
c. tab separated values
d. tactical secure voice
C)
If a search reveals that an employee and a vendor have the same telephone number, this result may indicate that:
a. Vendors are overcharging for goods purchased. b. Employees may be establishing dummy vendors.
c. Contractors are billing at the wrong rates.
d. A vendor is receiving kickbacks or other favors.
b)
Which of the following is similar to ACL and is ACL’s primary competitor?
a. Picalo
b. IDEA
c. MicrosoftOffice + ActiveData
d. Z-score
B)
Which of the following statements is NOT true?
a. Accounting errors are usually spread evenly throughout a data set.
b. Traditional auditing methods are more suited to finding errors than fraud.
c. Accounting anomalies indicate fraud has occurred or is occurring.
d. Fraud investigation involves determining who committed the fraud, the schemes used, and how much money or assets were taken.
c)
While using n-grams, a match percentage of ________ or ________ generally indicates very similar values.
a. 10 percent, smaller
b. 20 percent, greater
c. 5 percent, smaller
d. 40 percent, greater
b)
T or F: Data-driven analysis uses the company’s database to search for normal relationships between numbers.
False: CFE’s are looking for unusual numbers and patterns
Which of the following is an advantage of using data analysis software to detect fraud?
a. It is a static approach, and results cannot be recombined in different ways.
b. Data analysis software can only be used to analyze small data sets.
c. Data analysis software can analyze entire populations rather than just samples.
d. Significant numbers of hits can occur, requiring iterative refinement of analyses.
c)
A red flag search to detect kickbacks would include:
a. invoices without valid purchase order.
b. employee and vendor telephone numbers are the same.
c. purchase orders with zero dollar amounts by buyer.
d. price increases greater than 20% for several consecutive years
D)
The proactive method of fraud detection is a six-step process . Which of the following is the correct process
sequence?
a. Identify possible frauds that could exist; catalog possible fraud symptoms; understand the business ;use technology to gather data about symptoms; automotive detection procedures ; analyzeresults; and investigate symptoms
b. Catalog possible fraud symptoms; understand the business; identify possible frauds that could exist; analyze
results; use technology to gather data about symptoms; and investigate symptoms
c. Understand the business; identify possible frauds that could exist; catalog possible fraud symptoms; investigate
symptoms; use technology to gather data about symptoms; and analyze results
d. Understand the business; identify possible frauds that could exist; catalog possible fraud symptoms; use
technology to gather data about symptoms; analyze results; and investigate symptoms
d)
Which of the following statements is true about ODBC?
a. It allows use of the powerful SQL language for searching and filtering data.
b. It is generally slower and less robust than text files.
c.IT departments are very comfortable in giving out ODBC connections.
d. It is an application level setting rather than a system-wide setting.
A)
From the select balance sheet items
below, calculate the quick ratio.
Item Amount Item Amount
Cash $20,000 Accounts payable
$11,000
Notes receivable 15,000 Wages payable 5,000
Stock 5,000 Retained earnings 20,000
Inventory 6,000 Notes payable
8,000
a. 0.83
b. 1.25
c. 1.63
d. 1.08
B)
The most obvious disadvantage of the data-driven approach is:
a. Databases are very large and often cannot be analyzed using analysis packages like ACL, IDEA, or ActiveData.
b. High cost.
c. The decrease in employee morale.
d. None of the above.
b)
When deciding which detection method to use, it is important to:
a. Determine the advantages and disadvantages of each approach.
b. Identify the costs involved.
c. Determine which method will meet the client’s
objectives.
d. All of the above.
d)
T or F: Data-driven fraud detection can pay large dividends and is an effective way to reduce the cost of fraud in any organization.
True
For enhanced data analysis, which of
the following is a good option for users who want a familiar interface and
a less expensive alternative to ACL and IDEA?
a. ActiveData
b. Pearl
c. DataSource
d. Excel
a)
T or F: Vertical analysis is a useful detection technique because percentages are easily understood.
True
Which of the following records data for each case in a graph and analyzes the slope?
a. summarization analysis
b. time trend analysis
c. fuzzy matching method
d. cross tables method
B)
According to Benford’s Law, the first digit of random data sets will most often begin with which number?
a. 7
b. 1
c. 3
d. 4
B)
When conducting financial statement analysis, which ratio will be the most useful in determining whether a company has erroneously inflated accounts receivable?
a. Current ratio.
b. Profit margin.
c. Accounts receivable turnover.
d. Debt percentage.
c)
T or F: Unusual patterns always indicate the existence of fraud.
False: ususual patterns might be caused by non fraud factors
One of the most common errors investigators make when analyzing time trends is:
a. incorrect data preparation.
b. focusing only on one variable, time (the x -axis if graphed). V
c. not monitoring the time taken.
d. not standardizing for time.
D)