• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/181

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

181 Cards in this Set

  • Front
  • Back

T/F Data-driven analysis uses the company's database to search for normal relationships between numbers.

False
T/F Digital analysis using Benford's law can be performed on databases of any size.
True
T/F ODBC is the best approach to import because it achieves a direct, rich connection to the source database.
True
T/F Vertical analysis is a more direct method than horizontal analysis in focusing on changes in financial statements from one period to another.
False
T/F Balance sheets must be converted to change statements before they can be used in detecting fraud.
True
T/F Vertical analysis is a useful detection technique because percentages are easily understood.
True
T/F Understanding the kinds of frauds that can occur is not important when using a data-driven detection method.
False
T/F Data-driven fraud detection can pay large dividends and is an effective way to reduce the cost of fraud in any organization.
True
T/F According to Benford's law, the first digit of natural sets of numbers will begin with a 9 more often than with an 8.
False
An advantage of ODBC to import data into a data warehouse is that:
a) ODBC doesn't require the use of corporate database servers.
b) ODBC compresses data when stored on a CD or DVD.
c) ODBC automatically retrieves column names and types from the database.
d) ODBC keeps the investigator from dealing with the difficult SQL language.
c) ODBC automatically retrieves column names and types from the database.
The Soundex algorithm:
a) Uses consonants but ignores vowels.
b) Creates a numerical score representing how a word sounds.
c) Is useful when fuzzy matching values.
d) All of the above.
d) All of the above.
T/F The z-score calculation is the best way to stratify data.
False
When trying to identify outliers, what is one of the best statistical approaches?
a) A pie graph indicating the relative amounts.
b) Stratification of cases by value.
c) Time trending using the high-low slope method.
d) The z-score calculation.
d) The z-score calculation.
T/F Unusual patterns always indicate the existence of fraud.
False
T/F Unexplained changes are common in financial statements.
False
T/F When using Benford's law, potential suspects are less likely to know you are trying to detect fraud than if you use more direct detection techniques.
True
If a search reveals that an employee and a vendor have the same telephone number, this result may indicate that:
a) Vendors are overcharging for goods purchased.
b) Employees may be establishing dummy vendors.
c) Contractors are billing at the wrong rates.
d) A vendor is receiving kickbacks or other favors.
b) Employees may be establishing dummy vendors.
Benford's Law is:
a) The most expensive of all the digital analysis methods to implement and use.
b) The most effective way to identify actual frauds.
c) A method that uses vertical financial statement analysis.
d) An effective way to identify anomalies in data sets.
d) An effective way to identify anomalies in data sets.
When vertical analysis is performed:
a) Ratios are used to detect fraud.
b) Changes in significant balance totals are examined.
c) Financial statement balances are converted to percentages.
d) Total revenues are compared to total expenses.
c) Financial statement balances are converted to percentages.
T/F A single symptom (red flag) is almost always enough information to identify the type of fraud scheme occurring.
False
A detection method that focuses on the kinds of frauds that can occur and then uses technology to determine whether those frauds actually exist is called:

a) Fishing fraud detection.
b) Data mining.
c) Data-driven fraud detection.
d) Benford's law.
c) Data-driven fraud detection.
Horizontal analysis is different from vertical analysis in that:

a) There is no difference between horizontal and vertical analysis.
b) Horizontal analysis calculates the percentage change in balance sheet and income statement numbers from one period to the next, while vertical analysis converts balances in a single period to percentages.
c) Horizontal analysis converts balances in a single period to percentages, while vertical analysis calculates the percentage change in balance sheet and income statement numbers from one period to the next.
d) Key ratios are compared from one period to the next.
b) Horizontal analysis calculates the percentage change in balance sheet and income statement numbers from one period to the next, while vertical analysis converts balances in a single period to percentages.
Profit margin, return on assets, and return on equity are all examples of:

a) Vertical analysis.
b) Key financial statement ratios.
c) Horizontal analysis.
d) None of the above.
b) Key financial statement ratios.
Which of the following is an advantage of using data analysis software to detect fraud?
a) It is a static approach, and results cannot be recombined in different ways.
b) Data analysis software can only be used to analyze small data sets.
c) Data analysis software can analyze entire populations rather than just samples.
d) Significant numbers of hits can occurr, requiring iterative refinement of analyses.
c) Data analysis software can analyze entire populations rather than just samples.
When detecting fraud, it is important that fraud investigators:

a) Remain objective and neutral.
b) Assume guilt.
c) Assume innocence.
d) None of the above.
a) Remain objective and neutral.
Fraud is best detected through financial statements by focusing on:
a) Unexplained changes in financial statement balances.
b) Consistencies.
c) Intuition.
d) Management's behavior when financial statements are released.
a) Unexplained changes in financial statement balances.
Once a buyer starts accepting kickbacks from a supplier:

a) Prices often increase.
b) Purchases from other vendors often decrease.
c) The supplier usually takes control of the purchasing relationship.
d) All of the above.
d) All of the above.
When deciding which detection method to use, it is important to:

a) Determine the advantages and disadvantages of each approach.
b) Identify the costs involved.
c) Determine which method will meet the client's objectives.
d) All of the above.
d) All of the above.
T/F Surveillance logs should always be drafted before an investigation begins.
False
T/F Invigilation is a theft act investigative technique that involves close supervision of suspects during an examination period.
True
T/F Surveillance is a theft investigation technique that relies on the examination of documents.
False
T/F During invigilation, no controls are imposed on any activities.
False
Surveillance logs should include all of the following except:
a) Time the observation began and ended.
b) Cost of the surveillance equipment used.
c) Movements and activities of the suspect.
d) Distance the observation was from the scene.
b) Cost of the surveillance equipment used.
Surveillance, when properly performed, is done:
a) Without the perpetrator's knowledge.
b) During nonworking hours.
c) Only by law enforcement agents.
d) None of the above.
a) Without the perpetrator's knowledge.
T/F Investigation of fraud should only place when predication has first been established.
True
When beginning an investigation, fraud examiners should use techniques that will:
a) Not arouse suspicion.
b) Identify the perpetrator.
c) Determine the amount of fraud.
d) Identify when the fraud occurred.
a) Not arouse suspicion.
T/F The fraud triangle plus inquiry paradigm is an effective way to understand the various types of investigative methods.
True
A snapshot of active memory should be done:
a) Before seizure of the computer.
b) After seizure of the computer but before turning off the computer.
c) After turning off the computer but before calculation of the checksum number.
d) After calculation of the checksum number but before searching.
b) After seizure of the computer but before turning off the computer.
T/F If possible, when using theft act investigation methods, interviewing the prime suspects should happen last.
True
T/F Tailing includes the use of video, email, wire-tapping, and access to PCs.
False
Who should be consulted before any form of surveillance takes place?
a) Public Investors and the company's board of directors.
b) State attorney general.
c) Legal counsel and human resources.
d) All company executives.
c) Legal counsel and human resources.
T/F Electronic surveillance is often of limited value in the investigation of employee fraud because of concerns regarding employees' privacy rights.
True
T/F Seizing and searching computers is illegal because it infringes on the rights guaranteed by the Fourth Amendment to the Constitution.
False
T/F In determining which investigative method to use, it is most important that investigators focus on the costs of each possible method.
False
A vulnerability chart:
a) Forces investigators to explicitly consider all aspects of a fraud.
b) Shows the history of fraud in a company.
c) Identifies weaknesses in every aspect of a company's internal control.
d) Gives a detailed record of all the movements and activities of the suspect.
a) Forces investigators to explicitly consider all aspects of a fraud.
T/F The SHA-1 checksum method is more advanced and is considered more robust than the MD5 method.
True
Fixed-point, or stationary, observations can be conducted by:
a) Certified Fraud Examiners.
b) Company personnel.
c) Private investigators.
d) Anyone.
d) Anyone.
Which of the following is not included in a vulnerability chart?
a) Explanations of the fraud triangle in relation to suspects of fraud.
b) Breakdowns in key internal controls that may have created fraud opportunities.
c) Internal controls that a company plans to institute in the future.
d) Theft investigation methods.
c) Internal controls that a company plans to institute in the future.
When beginning a fraud investigation, which of the following methods is most useful in identifying possible suspects?
a) Preparing an identification chart.
b) Preparing a vulnerability chart.
c) Preparing a surveillance log.
d) None of the above.
b) Preparing a vulnerability chart.
T/F Not only are undercover operations both legal and valid, but they are also inexpensive.
False
T/F One advantage of using a vulnerability chart is that it forces investigators to consider all aspects of a fraud.
True
T/F To get an accurate reading, it is generally agreed that the invigilation period should be at least four days in length.
False
T/F Mobile observation is usually much more risky than stationary surveillance.
True
Which theft investigative method is most limited in value during employee fraud investigations because of concerns regarding employees' privacy at work?
a) Electronic surveillance.
b) Invigilation.
c) Forensic accounting.
d) Interviewing and interrogation.
a) Electronic surveillance.
Wiretapping, a form of electronic surveillance, can be used by:
a) Internal auditors.
b) Company controllers.
c) CPAs.
d) All of the above.
e) None of the above.
e) None of the above.
Which of the following is not a category used in the fraud triangle plus inquiry paradigm?
a) Theft investigative techniques.
b) Concealment investigative techniques.
c) Action investigative techniques.
d) Conversion investigative techniques.
c) Action investigative techniques.
Invigilation:
a) Is most commonly associated with crimes such as robbery, murder, and property offenses.
b) Can create tremendous amounts of documentary evidence.
c) Provides evidence to help determine whether fraud is occurring.
d) All of the above are true.
c) Provides evidence to help determine whether fraud is occurring.
When deciding whether or not to investigate, which of the following factors should an organization not consider?
a) Possible cost of the investigation.
b) Perceived strength of the predication.
c) Possible public exposure resulting because of the investigation.
d) All of the above should be considered.
d) All of the above should be considered.
When seizing computers, a calculation (also called a hash) that ensures you have an exact clone and have not changed data is called a(n):
a) NIST number.
b) ODBC connection.
c) Internet packet calculation.
d) CRC checksum number.
d) CRC checksum number.
T/F It is impossible to retrieve the data from a file that has been deleted on a computer.
False
When conducting interviews during an investigation, which of the following words should usually be avoided?
a) Audit.
b) Inquiry.
c) Investigation.
d) Record examination.
c) Investigation.
Which of the following is not a theft investigative method?
a) Invigilation.
b) Honesty testing.
c) Seizing and searching computers.
d) Surveillance and covert operations.
b) Honesty testing.
T/F Bates numbers are identifying numbers used by attorneys involved in litigation to track all documents.
True
Chain of custody refers to:
a) Marking on a document so it can be identified later.
b) A record of when a document is received and what has happened to it since its receipt.
c) Databases used in trials to assist lawyers.
d) The way in which courts are organized.
b) A record of when a document is received and what has happened to it since its receipt.
Discovery sampling:
a) Is a type of variables sampling.
b) Is one of the more difficult statistical smpling methods to understand.
c) Is never used in conducting a fraud examination.
d) Deals with the probability of discovering at least one error in a given sample size if the population error is a certian percentage.
d) Deals with the probability of discovering at least one error in a given sample size if the population error is a certian percentage.
T/F Concealment is the covering of tracks, obscuring of evidence, and removal of red flags to hide a perpetrator's fraud.
True
T/F Using a computer to access records (data mining) can be a very effective approach for determining if fraud exists because the auditor can look at entire populations.
True
What can a fraud examiner conclude if one or more instances of fraud are found in a sample taken from a population?
a) There is a slight risk that fraud exists in the population.
b) The population contains fraud.
c) The sample may not have been randomly selected, and thus no conclusions can be drawn.
D) The sample is most likely not representative of the population as a whole.
b) The population contains fraud.
T/F Concealment investigative methods sometimes involve the study of documents that have been manipulated.
True
T/F Evidence should be uniquely marked so it can be easily identified later.
True
T/F Programs like i2's Analyst's Notebook and Xanalys Link Explorer perform link analysis.
True
T/F Random number tables are ineffective and should not be used when selecting random samples from a population.
False
T/F Traditional chain of custody evidence procedures are not appropriate when used with electronic evidence.
False
T/F There is no difference between forensic document experts and graphologists.
False
T/F As long as a sample is selected randomly, it will always be representative of the population as a whole.
False
T/F A canceled check typically shows the account number of the maker, the teller who processed the check, and the sequence number of the transaction.
True
Which of the following is usually the best way to obtain documentary evidence?
a) Computer-based queries of full-population accounting and other databases.
b) A statistically sound sampling approach like discovery sampling.
c) Chance, accident, or tip discovery.
d) None of the above are effective methods of discovering evidence.
a) Computer-based queries of full-population accounting and other databases.
How are most frauds concealed?
a) By shredding source documents.
b) By converting to a paperless office without paper transactions.
c) By creating fictitious documents or altering source documents.
d) By firing employees who will not go along with the fraud.
c) By creating fictitious documents or altering source documents.
Programs like CaseMap, CaseCentral, ZANTAZ, Ringtail, and DatiCon are examples of:
a) Software that implements discovery sampling techniques.
b) Link analysis software.
c) Software packages used to index and store evidence.
d) Forensic software used to investigate hard drives and other digital devices.
c) Software packages used to index and store evidence.
T/F The best way to obtain documentary evidence in a computer database is to use discovery sampling to find the appropriate records.
False
What can a fraud examiner conclude if his or her tests confirm that no instances of fraud are present in a sample taken from a population?
a) There is virtually no risk that fraud exists in the population.
b) The population contains no fraud.
c) Only that no fraud is present in that particular sample.
d) The sample is most likely not representative of the population as a whole.
c) Only that no fraud is present in that particular sample.
T/F Photocopies are always preferable to original documents as evidence.
False
T/F Discovery sampling is probably the most difficult of all statistical sampling variations to understand.
False
T/F Even if photocopies of original documents are allowed to be introduced as evidence in a court of law, they are still considered secondary evidence.
True
In a fraud investigation, documents:
a) Usually contain extremely valuable information.
b) Are rarely used in court.
c) Are not reliable sources of information.
d) Are only valuable in obtaining a confession.
a) Usually contain extremely valuable information.
Marking documentary evidence is important to ensure that:
a) Documents are legal.
b) Databases can be created with valuable information.
c) Documents can be identified later.
d) Marking documentary evidence is not important.
c) Documents can be identified later.
Documentary evidence such as private tax returns can usually be obtained only by:
a) Subpoena.
b) Search warrant.
c) Voluntary consent.
d) All of the above.
d) All of the above.
Which of the following is not a benefit of statistical sampling?
a) It allows auditors to be certain that fraud does not exist in a population.
b) It is helpful when populations are large.
c) It allows quantification of risk.
d) It allows inference about a population.
a) It allows auditors to be certain that fraud does not exist in a population.
Which of the following is true of graphologists?
a) They can only perform their work in laboratory settings.
b) They perform the same type of work as forensic document experts.
c) They study handwriting as a way to interpret and identify personalities.
d) They are required to be members of the ABFDE organization.
c) They study handwriting as a way to interpret and identify personalities.
Which of the following is not true regarding document experts?
a) They can usually determine whether a document was written by the person whose signature the document bears.
b) They can usually determine whether a document has been forged.
c) They can usually determine whether the date the document bears is the date the document was written.
d) All of the above are true statements.
d) All of the above are true statements.
Which of the following methods of gathering documents is based primarily on luck?
a) Documents discovered during audits.
b) Hard-to-get private documents that are subpoenaed.
c) Documents discovered through searching public sources.
d) Documents provided by tipsters.
d) Documents provided by tipsters.
T/F Several publicly available databases provide information that can be helpful in investigations.
True
T/F When people convert stolen cash by entering into financial transactions, such as buying assets, they usually leave tracks that investigators can follow.
True
A database of criminal records maintained by the FBI is:
a) The CIA.
b) The III.
c) The NCIC.
d) Both a and c.
e) Both b and c.
e) Both b and c.
How useful are local and country records in fraud investigations?
a) Very useful
b) Not useful
c) Somewhat useful
d) Aren't allowed in the investigation of fraud
a) Very useful
T/F One common investigation procedure determines how perpetrators convert or spend their time.
False
T/F Before financial institutions can sell or disclose confidential customer information, they must provide customers with the opportunity to "opt out" from information sharing.
True
Which of the following laws regulates activities of credit, insurance, and employment investigations?
a) Fair Investigation Act of 1980
b) Fair Credit Reporting Act of 1971 and Fair and Accurate Credit Transactions Act of 2003.
c) Credit, Insurance, and Employment Investigation Act
d) There is no governing law
b) Fair Credit Reporting Act of 1971 and Fair and Accurate Credit Transactions Act of 2003.
T/F An increase in a person's net worth plus living expenses equals the person's total income.
True
T/F Conversion is the third element of the fraud (investigation) triangle.
True
T/F The net worth method cannot help in determining the extent of stolen funds.
False
T/F Private financial institutions can usually sell confidential customer information.
True
Known income subtracted from total income gives a reasonable estimate of:
a) Unknown funds
b) Liabilities
c) Living expenses
d) Net worth
a) Unknown funds
Each of these agencies is correctly matched with the type of information the agency provides except:
a) Department of Justice: Maintains records relating to the detection, prosecution, and rehabilitation of offenders.
b) The Secret Service: Deals with counterfeiting, theft of government checks, interstate credit card violations, and some computer crimes.
c) State Attorney General: Maintains birth records and information about people's social security numbers.
d) Central Intelligence Agency: Investigates security matters outside the United States.
e) Department of Business Regulation: Maintains licensing information about various professionals.
c) State Attorney General: Maintains birth records and information about people's social security numbers.
T/F It is always necessary to involve a federal law enforcement agent when accessing federal databases.
False
Who among the following are usually some of the best and most helpful federal fraud investigators?
a) Officers of the Secret Service
b) Employees of the Bureau of Prisons
c) Officers of the Department of Vital Statistics
d) Postal Inspectors
d) Postal Inspectors
T/F Private credit records are maintained on both individuals and organizations by various credit reporting companies.
True
T/F The Gramm-Leach-Bliley Act of 1999 made it more difficult for officials and private citizens to access information from financial institutions.
False
Each of these statements is true about the net worth method for determining embezzled amounts except:
a) The net worth method generally understates amounts stolen.
b) Much of the information necessary for determining an individual's assets, liabilities, living expenses, and income is available through public searches.
c) Courts are generally suspicious of dollar amounts determined by the net worth method because courts realize that the net worth method can provide only approximations of the amount stolen.
d) The net worth method is useful for obtaining confessions from suspects during interviews or interrogations.
c) Courts are generally suspicious of dollar amounts determined by the net worth method because courts realize that the net worth method can provide only approximations of the amount stolen.
Which of the following organizations maintain public information that can be accessed in record searches?
a) Local agencies
b) State agencies
c) Federal agencies
d) All of the above
d) All of the above
Which of the following is a possible use of conversion-based investigation techniques?
a) Searching public records to trace purchases of assets and payments of liabilities.
b) Attempting to locate previous spouses' bank account records.
c) Locating significant amounts of money held by related parties.
d) All of the above.
d) All of the above.
T/F The Secretary of State maintains many types of records relating to business and Uniform Commercial Code filings.
True
T/F Perpetrators usually save what they steal.
False
T/F Investigations of perpetrators' net worth and lifestyles help investigators know what class of society the perpetrators are from.
False
The net worth method is a calculation based on a person's:
a) Assets, liabilities, equity, and living expenses.
b) Assets, liabilities, equity, and income.
c) Assets, liabilities, income, and living expenses.
d) Assets, income, and living expenses.
c) Assets, liabilities, income, and living expenses.
T/F The net worth method is rarely, if ever, helpful in actual fraud investigations.
False
Conversion investigations focus on how suspects:
a) Had opportunities to steal.
b) Had motives to commit fraud.
c) Spent stolen money.
d) Committed the actual theft.
c) Spent stolen money.
Evidence gathered from public records can be useful in:
a) Identifying with the suspect.
b) Obtaining a confession.
c) Making the suspect feel at ease.
d) None of the above.
b) Obtaining a confession.
Although most perpetrators begin their thefts because of a perceived critical need, they usually continue to embezzle in order to:
a) Beat the system.
b) Fulfill an inner desire to commit fraud.
c) Improve their lifestyle.
d) Achieve a higher self-esteem.
c) Improve their lifestyle.
The net worth method of analyzing financial information can help to determine:
a) The suspect's feelings about the organization.
b) Possible perpetrators of the fraud.
c) The suspect's personality characteristics.
d) The amount of embezzled funds.
d) The amount of embezzled funds.
Which source could be used to access valuable financial information in a fraud investigation?
a) Financial institutions
b) Internet sites
c) The former spouse of a suspected fraud perpetrator
d) Trash
e) All of the above
e) All of the above
T/F Counties and other local agencies that contain records are usually not useful in fraud investigations.
False
T/F For various reasons, the net worth method tends to be a conservative estimate of amounts stolen.
True
The net worth method is effective:
a) As evidence in court.
b) To help obtain a confession.
c) To conduct an interview of suspects.
d) All of the above.
d) All of the above.
The formula to calculate funds from unknown sources is:
a) Assets - Liabilities - Prior Year's Net Worth + Living Expenses - Funds from Known Sources
b) Assets - Liabilities - Prior Year's Net Worth - Living Expenses - Funds from Unknown Sources
c) Assets - Liabilities - Prior Year's Net Worth + Living Expenses + Funds from Unknown Sources
d) Assets - Liabilities - Prior Year's Net Worth - Living Expenses + Funds from Unknown Sources
a) Assets - Liabilities - Prior Year's Net Worth + Living Expenses - Funds from Known Sources
Most conversion investigations involve searching public records and other sources to trace:
a) Purchases of assets.
b) Payments of liabilities.
c) Changes in lifestyle.
d) Net worth.
e) All of the above.
e) All of the above.
Under the net worth method, a person who has an increase in net worth of $100,000, known expenses of $80,000, and a salary of $60,000, would have unknown income of:
a) $0
b) $110,000
c) $120,000
d) $140,000
c) $120,000
T/F Federal agencies provide better records than state or county agencies for conversion investigations.
False
The Gramm-Leach-Bliley Act allows:

a) Banks to sell customer information.
b) Financial institutions to share information.
c) Customers to "opt out" and ask that their information not be shared.
d) All of the above.
d) All of the above.
T/F With respect to investigations of theft and concealment, the CFE would generally prefer an eye witness to documentary evidence.
False
T/F The most important thing about admissibility is relevance.
True
T/F U.S. Postal Inspectors may monitor and record the outside of a suspect's incoming and outgoing mail. This is termed a mail cover.
True
T/F The chain of custody applies to evidence obtained voluntarily and through search warrants.
True
T/F Photocopies are always preferable to original documents as evidence.
False
T/F Increasingly evidence is in digital form and rules of evidence are evolving to accommodate this change. A company's computerized accounting records are generally admissible if they were kept in the normal course of business and can be authenticated (i.e., shown that they have not been tampered with).
True
T/F Even if photocopies of original documents are allowed to be introduced as evidence in a court of law, they are still considered secondary evidence.
True
This privilege may only be waived by the prosecutor/government.
a) Attorney / Client
b) Law Enforcement Officer / Informant
c) Husband / Wife
d) Priest / Penitent
e) Accountant / Client
b) Law Enforcement Officer / Informant
T/F Statements made by the witnesses about what defendants said are hearsay and therefore not admissible.
False
T/F The hearsay rule is extremely rigid with very few exceptions.
False
T/F Character evidence might be admissible in a criminal case if entered to prove motive, opportunity, or ability.
True
T/F Evidence that proves or disproves facts by inference is called circumstantial evidence.
True
T/F The attorney-client privilege ensures that an employee's conversations with corporate counsel will remain confidential.
False
Privilege tends to reside with the defendant. In which of the following cases does the privilege rest not with the defendant but with the government / state?
a) Clergy - penitent
b) Physician - patient
c) Law enforcement officer - informant
d) Accountant - client
c) Law enforcement officer - informant
Which one of the following types of evidence includes flowcharts and diagrams that are produced as visual aids to help the judge and jury understand the fraud scheme?
a) Real
b) Testimonial
c) Circumstantial
d) Demonstrative
d) Demonstrative
T/F Original copies of documents should be carefully preserved for court. Photocopies should be used during interviews and elsewhere in the investigation.
True
T/F Character evidence is generally less useful in a civil case than in a criminal case.
True
What type of evidence is surveillance?
Personal observation
What type of evidence is tire marks?
Physical
What type of evidence are interviews?
Testimonial
What type of evidence is a computer hard drive?
Physical
What type of evidence is a financial statement analysis?
Documentary
What type of evidence is invigilation?
Personal observation
What type of evidence is a paper report?
Documentary
What type of evidence are identification numbers on vehicles?
Physical
What type of evidence is an audit of financial statements?
Documentary
What type of evidence are check stubs?
Documentary
What type of evidence are fingerprints?
Physical
What type of evidence is forensic analysis of a computer hard drive?
Physical
Chain of custody issues can result in relevant evidence being deemed inadmissible, or the weight of admissible evidence being diminished. All of the following could create chain of custody issues except:
a) A photocopy if produced because the original is filed at the county courthouse.
b) A computer was seized from the defendant but was taken home over the week by a court clerk.
c) A handwriting expert testifies that certain writings on a document appear to have been made after the document was seized for the investigation.
d) A photocopy of a document is produced because the fraud examiner mistakenly shredded the original.
a) A photocopy if produced because the original is filed at the county courthouse.
The critical item in determining admissibility is _____________; the weight attached to admissible evidence depends upon its _____________.
a) Competence; Relevance
b) Relevance; Prejudice
c) Competence; Prejudice
d) Relevance; Competence
d) Relevance; Competence
My trash would be safe (in the sense that anything obtained from it would not be admissible in court) in all of the following places except:
a) Sitting on my porch just outside my kitchen door
b) Sitting on the street side of the sidewalk in front of my house.
c) Sitting in my basement inside my house.
d) Sitting inside my unattached two-car garage.
b) Sitting on the street side of the sidewalk in front of my house.
Testimony that merely repeats what some other person has said is known as:

a) Prejudicial testimony
b) Third-hand testimony
c) Hearsay testimony
d) Correct answer not provided.
c) Hearsay testimony
Which of the following standards of proof is required to obtain a search warrant for financial records in a criminal trial?
a) Beyond a reasonable doubt
b) Probable cause
c) Preponderance of evidence
d) Clear and convincing evidence
b) Probable cause
When is a photocopy not acceptable as evidence in a court of law?
a) When the original document has been lost or destroyed without the intent or fault of the party seeking to introduce the copied document as secondary evidence.
b) When the original has been lost by the fraud examiner.
c) When the document or record is in the custody of a public officer.
d) When the original documents are too voluminous to permit careful examination.
b) When the original has been lost by the fraud examiner.
The process of marking, identifying, and preserving evidence is called the:
a) Preservation rule
b) Evidentiary rule
c) Voire Doi rule
d) Chain of custody
d) Chain of custody
Which of the following represents the highest standard of proof?
a) Preponderance of evidence
b) Suspicious situation
c) Probable cause
d) Judicial notice
a) Preponderance of evidence
Well known facts, such as how many feet there are in a mile, are readily accepted into evidence based upon what concept?
a) Hearsay exceptions
b) Clear and convincing evidence
c) Judicial notice
d) Chain of custody
c) Judicial notice
Anything that is perceptible by the five senses legally presented at trial to prove a contention and induce a belief in the mind of the jury is called:

a) Testimony
b) Point of Law
c) Evidence
d) Correct answer not provided.
c) Evidence
Which of the following is not generally a useful way to impeach the credibility, or competence, of witness testimony?
a) Witness has been divorced.
b) Witness has made prior inconsistent statements.
c) Witness has entered a plea agreement with prosecutors in exchange for his or her testimony in this case (i.e., self-interest).
d) Witness has been convicted of a felony.
a) Witness has been divorced.
All of the following are exceptions to the general hearsay rule except:
a) Business and government records duly authenticated and kept in the normal course of day-to-day operations.
b) Witness Bob recounts his ex-girlfriend Mary told him that the defendant was making false journal entries to conceal a fraud.
c) A defendant claims she received a loan from the company but there is no record in the company books of the loan being recorded.
d) A defendant's loan application claimed three times as much monthly income as she is now asserting to be her monthly income.
b) Witness Bob recounts his ex-girlfriend Mary told him that the defendant was making false journal entries to conceal a fraud.
Relevant evidence could nonetheless be ruled inadmissible if the judge determines it is:

a) unduly prejudicial (e.g., if the jury knows the defendant has a history of child abuse, they may not be able to fairly determine guilt or innocence in an unrelated embezzlement case).
b) confusing or misleading to a lay jury.
c) repetitive in the sense that the same element has already been demonstrated with previously admitted evidence.
d) all of the above could be cited by a judge to rule relevant evidence nonetheless inadmissible.
d) all of the above could be cited by a judge to rule relevant evidence nonetheless inadmissible.
Which one of the following would be privileged under the husband - wife privilege?
a) Communications between the two parties before they were married.
b) What the nondefendant spouse saw the defendant spouse do while they were married.
c) What the nondefendant spouse communicated to the defendant spouse in front of a group of friends at a party one night.
d) Confidential communications between the couple while they were married.
d) Confidential communications between the couple while they were married.
All of the following are legal classifications of evidence except:

a) Probable Cause
b) Real
c) Testimonial
d) Documentary
a) Probable Cause
The legal term that refers to the area where I can have a reasonable expectation of privacy for my trash.
a) Judicial notice
b) Curtilage
c) Smith and Wesson
d) Tenant privilege
b) Curtilage
Evidence having any tendency to make the existence of any fact that is of consequence to the determination of the action more probable or less probable that it would be without the evidence is called:

a) Relevant evidence.
b) Material evidence.
c) Direct evidence.
d) Correct answer not provided.
a) Relevant evidence.
A statement, other than that made by the declarant while testifying at trial or hearing, offered in evidence to prove the truth of the matter asserted is called _________.

a) Circumstantial evidence.
b) Hearsay evidence.
c) Indirect evidence.
d) Correct answer is not provided.
b) Hearsay evidence.
Which one of the following privileges is not recognized in federal courts?
a) Attorney - client privilege
b) Accountant - client privilege
c) Clergy - penitent privilege
d) Spousal privilege
b) Accountant - client privilege
Benford's law:

a) Is usually unsuccessful as a fraud detection tool.
b) Predicts that the first digit of random number sets will begin with a 1 more often than a 2, a 2 more often than a 3, and so on.
c) Applies to personal ID numbers.
d) All of the above.
b) Predicts that the first digit of random number sets will begin with a 1 more often than a 2, a 2 more often than a 3, and so on.
When conducting financial statement analysis, which ratio will be the most useful in determining whether a company has erroneously inflated accounts receivable?
a) Current ratio
b) Profit margin
c) Accounts receivable turnover
d) Debt percentage
c) Accounts receivable turnover
Data-driven fraud detection:


a) Determines the cost of fraud.
b) Identifies possible fraud suspects.
c) Looks for anomalies in databases.
d) All of the above.
c) Looks for anomalies in databases.
The most obvious disadvantage of the data-driven approach is:

a) Databases are very large and often can not be analyzed using analysis packages like ACL, IDEA, or Picalo.
b) High cost.
c) The decrease in employee morale.
d) None of the above.
d) None of the above.