(Multiple Choice) 1. Which of the following is not a category used in the fraud triangle plus...

Question:

(Multiple Choice)
1. Which of the following is not a category used in the fraud triangle plus inquiry paradigm?
a. Theft investigative techniques.
b. Concealment investigative techniques.
c. Action investigative techniques.
d. Conversion investigative techniques.

2. When beginning an investigation, fraud examiners should use techniques that will:
a. Not arouse suspicion.
b. Identify the perpetrator.
c. Determine the amount of the fraud.
d. Identify when the fraud occurred.

3. When conducting interviews during an investigation, which of the following words should usually be avoided?
a. Audit.
b. Inquiry.
c. Investigation.
d. Record examination.

4. When beginning a fraud investigation, which of the following methods is most useful in identifying possible suspects?
a. Preparing an identification chart.
b. Preparing a vulnerability chart.
c. Preparing a surveillance log.
d. None of the above.

5. Invigilation:
a. Is most commonly associated with crimes such as robbery, murder, and property offenses.
b. Can create tremendous amounts of documentary evidence.
c. Provides evidence to help determine whether fraud is occurring.
d. All of the above are true.

6. Which of the following is not a theft investigative method?
a. Invigilation.
b. Honesty testing.
c. Seizing and searching computers.
d. Surveillance and covert operations.

7. When deciding whether or not to investigate, which of the following factors should an organization not consider?
a. Possible cost of the investigation.
b. Perceived strength of the predication.
c. Possible public exposure resulting because of the investigation.
d. All of the above should be considered.

8. Surveillance, when properly performed, is done:
a. Without the perpetrator's knowledge.
b. During nonworking hours.
c. Only by law enforcement agents.
d. None of the above.

9. Which of the following is not included in a vulnerability chart?
a. Explanations of the fraud triangle in relation to suspects of fraud.
b. Breakdowns in key internal controls that may have created fraud opportunities.
c. Internal controls that a company plans to institute in the future.
d. Theft investigation methods.

Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question

Fraud examination

ISBN: 978-0538470841

4th edition

Authors: Steve Albrecht, Chad Albrecht, Conan Albrecht, Mark zimbelma

Question Posted: