Question: QUESTION 1 Match each term to its correct description - Theft Act Investigations Surveillance Vulnerability Chart - Invigilation - Computer forensics Cyclic redundancy check number

QUESTION 1 Match each term to its correct description - Theft Act Investigations Surveillance Vulnerability Chart - Invigilation - Computer forensics Cyclic redundancy check number - Concealment Investigative Methods - Theft Investigative Methods - Conversion Investigative Methods Inquiry Investigative Methods A. Document examination, audits, electronic searches, physical asset counts B. activities that directly investigate the fraud act. C. Interviews and interrogation, honesty testing D. Also called observation, it involves watching and recording the physical facts, acts, and movements, which are part of the theft act of a fraud. E. a theft act investigative technique that involves close supervision of suspects during an examination period. F. The gather of electronic evidence. G. a tool that explicitly considers all aspects of the fraud. H. Searching public records, online resources, the net worth method 1. Surveillance and covert operations, invigilating, seizing and searching computers, physical evidence. J. a calculation based on the contents of a disk or file
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
