Working Questions 2 Flashcards

1
Q

What are the stages in investigating theft acts in order
1 Interview Suspects
2 Interview former employers or unsuccessful vendors
3 Search public records, invigilation, or surveillance.
4 Check personal records or public records.
5 Interview other buyers, coworkers etc.

A

1 Check personal records or public records.
2 Interview former employers or unsuccessful vendors
3 Search public records, invigilation, or surveillance.
4 Interview other buyers, coworkers etc.
5 Interview Suspects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the four investigation methods?

A

Surveillance and covert operations
Invigilation
Obtaining physical evidence
Gathering electronic information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the four steps in order for ceazing electronic devices for
gathering electronic evidence?
1 Search the device manually
2 Secure the device and perform initial tasks
3 Search the device using automated procedures
4 Clone the device and calculate a CRC number

A

1 Secure the device and perform initial tasks
2 Clone the device and calculate a CRC number
3 Search the device manually
4 Search the device using automated procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 7 types of audit tests in order

1 Observations
2 Inquiries
3 Mechanical Accuracy
4 Documentation
5 Analytical tests
6 Physical Examinations
7 Confirmations

A

1 Mechanical accuracy
2 Analytical Tests
3 Documentation
4 Confirmations
5 Observations
6 Physical Examinations
7 Inquiries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do people react to a crisis (In order)
1 Anger
2 Depression
3 Denial
4 Rationalisation
5 Acceptance

A

1 Denial
2 Anger
3 Rationalization
4 Depression
5 Acceptance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the fraud scale and the relationship between the elements?

A

Perc. Pressure, Perseved Opportunity, and rationalization. Explain how each of these interact when increased or decreased.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the advantages of Data driven fraud?

A
  • Full population analysis
  • Time intensive tasks are done quickly
    *Routines are easy to impliment such as stratisfication and Summarisation
  • Repeatability- processes of fraud detection can be improved and reused
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the four different types of public records that can be searched?

A

Government Records
Private Records
Online databases
Internet searches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the five types of questions and interviewer can ask?

A

1 Introductory
2 Informational
3 Assessment
4 Closing
5 Admission seeking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the vulnerability chart?

A

It is a wholistic approach to systematic fraud detection and investigation where all the elements are coordinated and considered in detail.
-assets missing/taken
-Individual opportunities
-Concealment Possibilities
-Conversion Possibilities
-Symptoms observed
-Key internal controls compromised
-pressures on potential suspects are
considered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the three types of Honesty Testing methods? Describe each.

A

1) Pencil and paper tests
2) Graphology Tests
3) Polygraph tests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three types of fraud experienced by organisations? Describe them.

A

1 Cash and other asset theft or missappropriation that are entering the system
2 Cash and Assets on hand
3) Disbursment fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some proactive steps in order to minimise the risks of ID theft?

A

Shredding important documents
Do not call register
Opting out of pre approved credit cards
installing surveillance cameras on letterboxes
Having a PO box instead of a mail box on the street
If you do use a mail box, have a lock installed.
Always use a virus scanner on your PC.
Only provide information if you initiated contact with a genuine company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly