Final Exam
Graded Quiz • 30 min Quiz49 Questions Week 5
Re⥃askly Logo

Final Exam

Graded Quiz • 30 min Quiz49 Questions Week 5
Practice More Quizzes:
Quiz
12 Questions Week 1
Quiz
10 Questions Week 2
Quiz
12 Questions Week 3
Quiz
27 Questions Week 4
Quiz
49 Questions Week 5

Q:

The acronym “M.I.C.E.”, as typical motivations of fraud perpetrators, stands for:

Q:

Which of the following is an example of financial statement fraud?

Q:

One major difference between fraud and a mistake is:

Q:

Which of the following acts would be considered a fraud act (in contrast to an abuse)?

Q:

In terms of the definition of occupational fraud and abuse, who is an employee?

Q:

Fraud can be committed by:

Q:

While a fraud examiner’s objective is to determine whether fraud has occurred and who is likely responsible, the financial forensics investigator’s MAIN objective is to:

Q:

Signs of pressure that would prompt an individual to commit fraud include:

Q:

Which of the following is the most likely reason, as suggested by Cressey, that an employee tries to solve a financial problem in secret?

Q:

The Fraud Triangle consists of: pressure, opportunity, and rationalization.

Q:

As compensation of the perpetrator increases, the losses associated with the perpetrator rise. This is most likely because:

Q:

Which of the following is most accurate concerning a predator?

Q:

Signs that an individual is a predator fraudster include:

Q:

The difference between a predator fraudster and an accidental fraudster is:

Q:

Which of the following is true concerning the fraud scale developed by Albrecht?

Q:

To improve the effectiveness of the fraud triangle, Wolfe and Hermanson suggests which characteristic as an addition to the fraud triangle (making it the fraud diamond) ?

Q:

Large frauds are typically associated with all of the following EXCEPT:

Q:

Overall, management must design, implement, and maintain:

Q:

From the statements below select the most correct.

Q:

Three of the various objectives of an internal control program are:

Q:

Why is it difficult for entry-level employees to be forensic accountants?

Q:

When looking for fraud, credit card companies constantly mine data and look for transactions that are similar to historical patterns of fraud. Which of the following are examples of patterns that they use. (Mark all that apply)

Q:

Red flags, symptoms of fraud, often go unnoticed or are not vigorously pursued because:

Q:

Duplicate searches in data extraction and analysis software could be used to discover:

Q:

Which of the following best describes text analysis?

Q:

The Fraud Triangle is generally present when an accidental fraudster commits fraud. The three legs represent perceived or actual instances of concepts. Which of the following is NOT one of the legs of the Fraud Triangle?

Q:

Which of the following is/are applicable to the “Predator”, but not the “Accidental” fraudster? (Mark all that apply)

Q:

The biggest advantage investigators have when tracing the flow of illegal funds is:

Q:

Which of the following is NOT a concern to those in the battle against money laundering?

Q:

Which is generally considered the lowest threshold for ethical decision making?

Q:

With regard to Cynthia Cooper and Betty Vinson, both from WorldCom, which of the following is correct?

Q:

Which is the following is NOT a best practice for an effective whistleblower program?

Q:

With regard to Cynthia Cooper and Betty Vinson, both from WorldCom, which of the following is FALSE?

Q:

Which of the following are the three stages of money laundering?

Q:

With regard to changes pertaining to money laundering, which of the following changes is NOT a concern to those in the battle against money laundering?

Q:

Financial statement fraud consists of:

Q:

Financial statement fraud is complex because:

Q:

Which of the following best describes situations with complex frauds and financial crimes

Q:

The functions of data extraction and analysis software tools include all EXCEPT:

Q:

Which of the following is correct, when considering the phrase “Following the money”? Select all that apply.

Q:

Anomalies are:

Q:

Data can be altered by:

Q:

Common violations pertaining to occupational fraud and abuse include all of the following except:

Q:

Conversion can be shown to have occurred by:

Q:

Perpetrators of large frauds are likely to use the money for all of the following EXCEPT:

Q:

Fraud deterrence begins:

Q:

The key to successful fraud detection and investigation using digital tools and techniques requires which approach?

Q:

Upon discovering fraud, internal auditors:

Q:

When attempting to capture data that a fraudster has tried to delete from a device, such as a computer hard drive or mobile phone, the forensic expert should: (Mark all that apply)

Subscribe
Notify of
guest
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
Find Questions in This Page: "CTRL+F"