Questions from Fraud Examination


Q: Not only are undercover operations both legal and valid, but also

Not only are undercover operations both legal and valid, but also inexpensive.

See Answer

Q: Investigation should only take place when predication of fraud has first been

Investigation should only take place when predication of fraud has first been established.

See Answer

Q: Concealment is the covering of tracks, obscuring of evidence, and

Concealment is the covering of tracks, obscuring of evidence, and removal of red nags to hide a perpetrator's fraud.

See Answer

Q: Even if photocopies of original documents are allowed to be introduced as

Even if photocopies of original documents are allowed to be introduced as evidence in a court of law, they are still considered secondary evidence.

See Answer

Q: A canceled check typically shows the account number of the person who

A canceled check typically shows the account number of the person who presented the check, the teller who processed the check, and the sequence number of the transaction.

See Answer

Q: Random number tables are ineffective and should not be used when selecting

Random number tables are ineffective and should not be used when selecting random samples from a population.

See Answer

Q: Using a computer to access records (data mining) can be

Using a computer to access records (data mining) can be a very effective approach for determining if fraud exists because the auditor can look at entire populations.

See Answer

Q: Private financial institutions can usually sell confidential customer information.

Private financial institutions can usually sell confidential customer information.

See Answer

Q: Bates numbers are identifying numbers used by attorneys involved in litigation to

Bates numbers are identifying numbers used by attorneys involved in litigation to track all documents.

See Answer

Q: Programs like IBM's i2 Analyst's Notebook and Xanalys Link Explorer perform link

Programs like IBM's i2 Analyst's Notebook and Xanalys Link Explorer perform link analysis.

See Answer