Questions from Fraud Examination


Q: The best way to obtain documentary evidence in a computer database is

The best way to obtain documentary evidence in a computer database is to use discovery sampling to find the appropriate records.

See Answer

Q: It is impossible to retrieve the data from a file that has

It is impossible to retrieve the data from a file that has been deleted on a computer.

See Answer

Q: The SHA -1 checksum method is more advanced and is considered

The SHA -1 checksum method is more advanced and is considered more robust than the MDS method.

See Answer

Q: Checks are excellent sources of physical evidence.

Checks are excellent sources of physical evidence.

See Answer

Q: Traditional chain of custody evidence procedures are not appropriate when used with

Traditional chain of custody evidence procedures are not appropriate when used with electronic evidence.

See Answer

Q: Photocopies are always preferable to original documents as evidence.

Photocopies are always preferable to original documents as evidence.

See Answer

Q: There is no difference between forensic document experts and graphologists.

There is no difference between forensic document experts and graphologists.

See Answer

Q: Evidence should be uniquely marked so it can be easily identified later

Evidence should be uniquely marked so it can be easily identified later.

See Answer

Q: The net worth method cannot help in determining the extent of stolen

The net worth method cannot help in determining the extent of stolen funds.

See Answer

Q: Concealment investigative methods sometimes involve the study of documents that have been

Concealment investigative methods sometimes involve the study of documents that have been manipulated.

See Answer