Topic 7 Concealment and Conversion Flashcards
In a fraud investigation, documents:
a. Usually contain extremely valuable information.
b. Are rarely used in court.
c. Are not reliable sources of information.
d. Are only valuable in obtaining a confession.
a)
Chain of custody refers to:
a. Marking on a document so it can be identified later.
b. A record of when a document is received and what has happened to it since its receipt.
c. Databases used in trials to assist lawyers.
d. The way in which courts are organized.
b)
Marking documentary evidence is important to ensure that:
a. Documents are legal.
b. Databases can be created with valuable information.
c. Documents can be identified later.
d. Marking documentary evidence is not important.
c)
Discovery sampling:
a. Is a type of variables sampling.
b. Is one of the more difficult statistical sampling methods to understand.
c. Is never used in conducting a fraud examination.
d. Deals with the probability of discovering at least one error in a given sample size if the population error is a certain percentage.
d)
Documentary evidence such as private tax returns can usually be obtained only by:
a. Subpoena.
b. Search warrant.
c. Voluntary consent.
d. All of the above.
d)
Which of the following is not true regarding document experts?
a. They can usually determine whether a document was written by the person whose signature the document bears.
b. They can usually determine whether a document has been forged.
c. They can usually determine whether the date the document bears is the date when the document was written.
d. All of the above are true statements.
d)
Which of the following is not a benefit of statistical sampling?
a. It allows auditors to be certain that fraud does not exist in a population.
b. It is helpful when populations are large.
c. It allows quantification of risk.
d. It allows inference about a population.
a)
Which of the following methods of gathering documents is based primarily on luck?
a. Documents discovered during audits.
b. Hard-to-get private documents that are subpoenaed.
c. Documents discovered through searching public sources.
d. Documents provided by tipsters.
d)
Which of the following is true of graphologists?
a. They can only perform their work in laboratory settings.
b. They perform the same type of work as forensic document experts.
c. They study handwriting as a way to interpret and identify personalities.
d. They are required to be members of the ABFDE organization.
c)
What can a fraud examiner conclude if one or more instances of fraud are found in a sample taken from a population?
a. There is a slight risk that fraud exists in the population.
b. The population contains fraud.
c. The sample may not have been randomly selected, and thus no conclusions can be drawn.
d. The sample is most likely not representative of the population as a whole.
b)
What can a fraud examiner conclude if his or her tests confirm that no instances of fraud are present in a sample taken from a population?
a. There is virtually no risk that fraud exists in the population.
b. The population contains no fraud.
c. Only that no fraud is present in that particular sample.
d. The sample is most likely not representative of the population as a whole.
c)
How are most frauds concealed?
a. By shredding source documents.
b. By converting to a paperless office without paper transactions.
c. By creating fictitious documents or altering source documents.
d. By firing employees who will not go along with the fraud.
c)
Which of the following is usually the best way to obtain documentary evidence?
a. Computer-based queries of full-population accounting and other databases.
b. A statistically sound sampling approach like discovery sampling.
c. Chance, accident, or tip discovery.
d. None of the above are effective methods of discovering evidence.
a)
Programs like CaseMap, CaseCentral, ZANTAZ, Ringtail, and DatiCon are examples of:
a. Software that implements discovery sampling techniques.
b. Link analysis software.
c. Software packages used to index and store evidence.
d. Forensic software used to investigate hard drives and other digital devices.
c)
Although most perpetrators begin their thefts because of a perceived critical need, they usually continue to embezzle in order to:
a. Beat the system.
b. Fulfill an inner desire to commit fraud.
c. Improve their lifestyle.
d. Achieve a higher self-esteem.
c)
Evidence gathered from public records can be useful in:
a. Identifying with the suspect.
b. Obtaining a confession.
c. Making the suspect feel at ease.
d. None of the above.
b)
The net worth method of analyzing financial information can help to determine:
a. The suspect’s feelings about the organization.
b. Possible perpetrators of the fraud.
c. The suspect’s personality characteristics.
d. The amount of embezzled funds.
d)
Which of the following organizations maintain public information that can be accessed in record searches?
a. Local agencies.
b. State agencies.
c. Federal agencies.
d. All of the above.
d)
How useful are local and county records in fraud investigations?
a. Very useful.
b. Not useful.
c. Somewhat useful.
d. Aren’t allowed in the investigation of fraud.
a)
Which of the following laws regulates activities of credit, insurance, and employment investigations?
a. Fair Investigation Act of 1980.
b. Fair Credit Reporting Act of 1971 and Fair and Accurate Credit Transactions Act of 2003.
c. Credit, Insurance, and Employment Investigation Act.
d. There is no governing law.
b)
The net worth method is effective:
a. As evidence in court.
b. To help obtain a confession.
c. To conduct an interview of suspects.
d. All of the above.
d)
Conversion investigations focus on how suspects:
a. Had opportunities to steal.
b. Had motives to commit fraud.
c. Spent stolen money.
d. Committed the actual theft.
c)
Which of the following is a possible use of conversion-based investigation techniques?
a. Searching public records to trace purchases of assets and payments of liabilities.
b. Attempting to locate previous spouses’ bank account records.
c. Locating significant amounts of money held by related parties.
d. All of the above.
d)
Most conversion investigations involve searching public records and other sources to trace:
a. Purchases of assets.
b. Payments of liabilities.
c. Changes in lifestyle.
d. Net worth.
e. All of the above.
e)
A database of criminal records maintained by the FBI is:
a. The CIA.
b. The III.
c. The NCIC.
d. Both a and c.
e. Both b and c.
e)