Fraud Final (updated) ch 1-6 & 10-13

¡Supera tus tareas y exámenes ahora con Quizwiz!

Quick Ratio

(Current Assets - Inventory - Prepaids) / Current Liabilities

Identify the formula used to calculate z-score. a. (Mean − Value)/Standard Deviation b. (Mean − Value)/(Mean + Value) c. (Value − Mean)/Standard Deviation d. (Value − Mean)/Median

(Value − Mean)/Standard Deviation

The single most critical element for a fraud to be successful is opportunity. a. True b. False

False

Greed, living beyond one's means, and high bills all describe what type of fraud-related pressure? a. Financial b. Peer c. Environmental d. Work-related

Financial

According to the study mentioned in the text, which of the following is true about fraud perpetrators compared to property offenders? a. Fraud perpetrators are more likely to be caught than property offenders. b. Fraud perpetrators are more educated than property offenders. c. Fraud perpetrators are more likely to be men than property offenders. d. Fraud perpetrators are much younger than property offenders.

Fraud perpetrators are more educated than property offenders.

Which of the following key activities related to fraud is the most important and cost-effective way to reduce losses from fraud? a. Follow-up legal action b. Early fraud detection c. Fraud investigation d. Fraud prevention

Fraud prevention

Which method will result in the biggest savings? a. Fraud prevention—including EAP plans b. Fraud detection—including audit proactively, monitoring c. Investigation—including criminal prosecution d. Promotion—including raising rank or position

Fraud prevention—including EAP plans

Which of the following is an example of a whistle-blowing system? a. Bulletin board service b. Supervisor intervention c. Removing middle management layer d. Fraud reporting hotline

Fraud reporting hotline

Which of the following is the most important step in data analysis? a. Gathering the right data in the right format in the right time period b. Understanding the available data c. Learning the basics of table structure and field types d. Learning the basics of key relationships and query syntax

Gathering the right data in the right format in the right time period

GP Ratio=

Gross profit/net sales where GP is gross sales-sales returns-cogs and net sales is gross sales-sales returns

Which of the following is NOT a primary way fraud can be detected early? a. By accident b. Finding anomalies in the financial records c. Someone reports suspicious activity d. Watching those employees whose honesty test results were suspicious

Watching those employees whose honesty test results were suspicious

Which of the following is a component of the evidence square? a. Rationalization b. Perceived pressure c. Personal observation d. Perceived opportunity

personal observation

According to Benford's Law, the first digit of random data sets will most often begin with which number? a.7 b.1 c.3 d.4

1

From the select balance sheet items below, calculate the quick ratio. Item Amount Item Amount Cash. $20,000 Accounts payable $11,000 Notes receivable 15,000 Wages payable 5,000 Stock. 5,000 Retained earnings 20,000 Inventory 6,000. Notes payable. 8,000 a. 0.83 b. 1.25 c. 1.63 d. 1.08

1.25

While using n-grams, a match percentage of ________ or ________ generally indicates very similar values. a. 10 percent, smaller b. 20 percent, greater c. 5 percent, smaller d. 40 percent, greater

20 percent, greater

Approximately ____ of all frauds are committed by an individual acting alone. The remaining ____ involve collusion and often involve the ____ thefts. a. 63%, 37%, smallest b. 71%, 29%, largest c. 47%, 53%, smallest d. 18%, 82%, largest

71%, 29%, largest

Fraud is considered to be: a. A problem under control. b. A mild problem that most businesses need not worry about. c. A problem that affects very few individuals. d. A serious problem that continues to grow.

A serious problem that continues to grow.

_____ has been adopted by most major accounting firms and is a powerful platform for data analysis. a. ACL Audit Analytics b. CaseWare's IDEA c. Microsoft Office + Active Data d. SAS

ACL Audit Analytics

Which of the following statements is NOT true? a. Accounting errors are usually spread evenly throughout a data set. b. Traditional auditing methods are more suited to finding errors than fraud. c. Accounting anomalies indicate fraud has occurred or is occurring. d. Fraud investigation involves determining who committed the fraud, the schemes used, and how much money or assets were taken.

Accounting anomalies indicate fraud has occurred or is occurring.

Recording an expense to conceal fraud involves making a fictitious journal entry. A faulty journal entry is an example of which fraud symptom? a. Accounting anomaly b. Internal control weakness c. Unusual behavior d. Analytical anomaly

Accounting anomaly

For enhanced data analysis, which of the following is a good option for users who want a familiar interface and a less expensive alternative to ACL and IDEA? a. ActiveData b. Pearl c. DataSource d. Excel

ActiveData

_____ are a two-dimensional view with cases in one dimension and the calculations in the other. a. N-grams b. Z-scores c. Pivot tables d. Soundex algorithms

Pivot tables

There are three simple procedures that small business owners should do on a timely basis to prevent fraud when they can't afford sufficient employees to guarantee effective segregation of duties. Which of the following is NOT one among them? a. Pay everything by check so that there is a record. b. Always open the bank statement and reconcile it themselves. c. Allow one key employee to operate the bank account personally. d. Sign every check themselves and not delegate the signing to anyone else.

Allow one key employee to operate the bank account personally.

What does the following journal entry indicate? Legal Expense..................2,900 Cash...............................2,900 a. $2,900 cash is due to an attorney. b. A sum of $2,900 was received from an attorney in advance. c. $2,900 cash is due from an attorney. d. An attorney was paid $2,900 in cash.

An attorney was paid $2,900 in cash.

_____ fraud symptoms are procedures or relationships that are unusual or that do not make sense. a. Analytical b. Accounting c. Internal control d. Environmental

Analytical

An auditor noticed that Company B had an exorbitant increase in sales and drastic decreases in its inventory and accounts receivables. This statement symbolizes which fraud symptom? a. Accounting anomaly b. Internal control weakness c. Analytical anomaly d. Unusual behavior

Analytical anomaly

A mathematical algorithm that predicts the percentage of the time each digit will appear in a sequence of numbers is: a. inductive fraud detection. b. deductive fraud detection. c. Benford's Law. d. horizontal analysis.

Benford's Law

A company used computer auditing techniques to compare employees' telephone numbers with vendors' telephone numbers. This is an example of which step in a proactive fraud auditing? a. Identifying fraud risk exposures b. Identifying the fraud symptoms of each exposure c. Building audit programs to proactively look for symptoms and exposures d. Investigate fraud symptoms identified

Building audit programs to proactively look for symptoms and exposures

Kickbacks from vendors to buyers might generate which one of the following symptoms? a. Buyer not relating well to other buyers and vendors b. Decreasing purchases from favored vendor c. Increasing purchases from other vendors d. Decreasing prices and increasing quality

Buyer not relating well to other buyers and vendors

How does a smart embezzler manipulate accounting records to conceal fraud? a. By increasing assets b. By manipulating stock accounts c. By manipulating dividends d. By increasing expenses

By increasing expenses

Some researchers have added a fourth element to the fraud triangle making it a fraud diamond. What is that element? a. Propensity toward illegal acts b. Lack of self-respect c. Greed d. Capability

Capability

__________ is the ability of the fraud perpetrator to make an individual perceive punishment if he or she does not participate in the fraud. a. Expert power b. Coercive power c. Legitimate power d. Reward power

Coercive power

According to the study mentioned in the text, people who commit fraud are most similar to which of the following groups? a. Property offenders b. College students c. Convicted felons d. Animal lovers

College students

Which of the following is least effective while searching for anomalies? a. Comparing account balances in the statements from one period to the next. b. Calculating key ratios and comparing them from one period to the next. c. Performing horizontal analysis. d. Performing vertical analysis.

Comparing account balances in the statements from one period to the next.

Modeling and labeling are subcomponents of which fraud-related element of an organization? a. Control environment b. Accounting system c. Audit procedures d. Review procedures

Control environment

Which of the following describes the overall tone of the organization that management establishes through its modeling and labeling, organization, communication, and other activities? a. Detection framework b. Risk mitigation channel c. Support network d. Control environment

Control environment

____ focuses more on creating a culture of openness than eliminating opportunities. a. Proactive auditing b. Installing good internal controls c. Monitoring employees d. Creating a positive work environment

Creating a positive work environment

Which of the following is an analytical symptom of kickbacks? a. Decreasing purchases from other vendors b. Charging normal price for goods supplied c. Providing better-quality goods d. Smaller purchase quantities and more frequent orders

Decreasing purchases from other vendors

Document symptoms to some extent can signal that embezzlement is taking place. Which among the following usually does NOT point to some problem with the source documents? a. Photocopied documents b. Different names or addresses of payees or customers c. Excessive voids or credits d. Increased past-due accounts

Different names or addresses of payees or customers

Which of the following proactive fraud detection methods use Benford's Law to detect fraud? a. Vertical analysis b. Digital analysis c. Real-time analysis d. Time trend analysis

Digital analysis

Audits, public record searches, and net worth calculations are used to gather what type of evidence in fraud investigation? a. Testimonial b. Forensic c. Documentary d. Observational

Documentary

Stuart, a CFE, is investigating a possible management fraud. He found an email on an employee's computer to use as evidence in the case. Under which category of evidence would an email message fall? a. Testimonial evidence b. Documentary evidence c. Physical evidence d. Personal observation

Documentary evidence

What is the overall term for the investigative technique that includes gathering evidence through data mining, audits, computer searches, net worth calculations, and financial statement analysis? a. Documentary evidence b. Testimonial evidence c. Physical evidence d. Personal observation

Documentary evidence

Which of the following statements is true about the characteristics of real-time analysis? a. With real-time analysis in place, there is no need for continual improvement and updating of indicators. b. It is a distinct technique because it specifically analyzes each transaction for correctness rather than for fraud. c. Effective real-time analysis allows real-time modification and deletion of less-effective indicators. d. The most effective real-time analysis uses indicators that are hard-coded into the system.

Effective real-time analysis allows real-time modification and deletion of less-effective indicators.

Which level in the ethical maturity model can be summarized as a "willingness to pay the price for ethics"? a. Ethical positioning b. Ethical courage c. Personal ethical understanding d. Application of ethics to business situations

Ethical courage

Wilma participates in a fraud scheme by executing some derivative trades because she believed that a senior analyst knew more about complex derivative transactions than she did. These transactions were fraudulent in nature. Which type of power was employed to deceive Wilma? a. Expert power b. Referent power c. Coercive power d. Reward power

Expert power

A fraud may be perpetrated through an unintentional mistake. a. True b. False

False

Advances in technology have had no effect either on the size or frequency of fraud or on the detection or investigation of fraud. a. True b. False

False

All frauds that are detected by organizations are made public. a. True b. False

False

One of the most important responsibilities of an employer is the hiring and retention of employees. Which of the following situations reflects the current market scenario? a. High turnover, high loyalty b. High turnover, low loyalty c. Low turnover, high loyalty d. Low turnover, low loyalty

High turnover, low loyalty

Which of the following should be emphasized in an employee reporting program? I. Fraud, waste, and abuse occur in few companies. II. The company actively encourages employees with information to come forward. III. The name of the employee reporting the fraud must be known. IV. The report need not be made to one's immediate supervisor. a. II and III. b. I, II, III, and IV c. I, II, and IV d. II and IV

II and IV

A good fraud auditing involves four steps. Which of the following is the correct sequence? a. Identifying fraud risk exposures; building audit programs to proactively look for symptoms and exposures; investigating fraud symptoms identified; and identifying the fraud symptoms of each exposure. b. Identifying fraud risk exposures; identifying the fraud symptoms of each exposure; building audit programs to proactively look for symptoms and exposures; and investigating fraud symptoms identified. c. Building audit programs that proactively check for symptoms and exposures; identifying fraud risk exposures; identifying the fraud symptoms of each exposure; and investigating fraud symptoms identified. d. Identifying the fraud symptoms of each exposure; identifying fraud risk exposures; investigating fraud symptoms identified; and building audit programs to proactively look for symptoms and exposures.

Identifying fraud risk exposures; identifying the fraud symptoms of each exposure; building audit programs to proactively look for symptoms and exposures; and investigating fraud symptoms identified.

Which of the following is a highly suspicious financial statement relationship? a. Increased revenues with increased cash flows b. Increased volume with decreased cost per unit c. Increased inventory with decreased payables d. Increased inventory with increased warehousing costs

Increased inventory with decreased payables

Which of the following is a highly suspicious financial statement relationship? a. Increased revenues with decreased receivables b. Decreased production with decreased scrap c. Increased volume with increased scrap d. Decreased cost per unit with increased level of output

Increased revenues with decreased receivables

While using financial statement analysis, which ratio will be most useful in assessing the company's operational efficiency? a. Current ratio b. Quick ratio c. Cost of goods sold percentage d. Inventory turnover

Inventory Turnover

Which of the following is not true of civil litigation? a. The purpose is to compensate for harm done to another. b. It usually begins when one party files a complaint. c. It must be heard by 12 jurors. d. Only "the preponderance of the evidence" is needed for the plaintiff to be successful.

It must be heard by 12 jurors.

Fraud examiners must be able to recognize signals that a journal entry may have been manufactured to conceal a fraud. Which of the following is a common journal entry fraud symptom? a. Journal entries with documentary support b. Journal entries that balance c. Adjustments to receivables or payables that are made monthly d. Journal entries made near the end of an accounting period

Journal entries made near the end of an accounting period

Allowing the clerk who checked out customer A to handle a return by that same individual without presenting the receipt would NOT be an example of which of the following weaknesses in internal controls? a. Lack of segregation of duties b. Lack of requiring proper documents and records c. Lack of independent checks d. Lack of an adequate accounting system

Lack of an adequate accounting system

Which of the following factors creates an opportunity for fraud? a. Greed b. Living beyond one's means c. Lack of an audit trail d. The organization owes it to me

Lack of an audit trail

Which of the following best describes an action that can cause a whistle-blowing system in place in the organization to fail? a. The organization requires employees to report all suspicious activity. b. The employee suspecting fraud reports directly to his/her supervisor's manager. c. Management is slow to act on reports of suspected fraud. d. An extensive code of ethics is in place and on file in order to answer employee inquiries.

Management is slow to act on reports of suspected fraud.

What is the most important element in a control environment? a. Management's communication b. Management's role and example c. The hiring process d. The internal audit department

Management's role and example

Which of the following scenarios is least conducive to fraud? a. Outstanding bills at home b. Mandatory vacation time c. Economic downturns d. Moral decay in upper management

Mandatory vacation time

Which of the following is NOT a common rationalization of fraud perpetrators? a. The organization owes me. b. I'm only borrowing the money. c. No one will get hurt. d. No one will care.

No one will care.

Which of the following is not a form of vendor fraud? a. Non-shipment of goods even though payment has been made. b. Overcharging for purchased goods. c. Not paying for goods purchased. d. Shipment of inferior goods.

Not paying for goods purchased.

Which of the following statements regarding ODBC is NOT accurate? a. ODBC stands for Open Database Communications. b. ODBC is a standard method of querying data from corporate relational databases. c. ODBC is a connector between the front-end analysis and the back-end corporate database. d. ODBC is already included with most operating systems.

ODBC stands for Open Database Communications.

Generally, internal controls are implemented in a corporation to help prevent which element of the fraud triangle? a. Perceived opportunity b. Perceived pressure c. Rationalization d. Authorization

Perceived opportunity

Recent research has shown that there is an ethical maturity model (EMM) that explains why people make unethical decisions. Which of the following represents the foundation of ethics according to this model? a. Personal ethical understanding b. Ethical courage c. Ethical leadership d. Application of ethics to business situations

Personal ethical understanding

_____ refers to the circumstances, taken as a whole, that would lead a reasonable, prudent professional to believe a fraud has occurred, is occurring, or will incur. a. Audit process b. Surveillance c. Predication d. Investigation

Predication

Which of the following acts by management could discourage someone from reporting an observed act of fraud? a. Providing clear instructions of who to contact b. Providing assurance of anonymity c. Providing clear instructions on how to convey the information d. Providing a clear list of possible consequences

Providing a clear list of possible consequences

Which of the following usually motivates embezzlers to indulge in a fraudulent activity? a. Pursuit of immediate gratification b. Safeguard their future c. Cover expenses required to live d. Protection against uncertainties

Pursuit of immediate gratification

Which of the following would usually be an environment conducive to fraud? a. Low turnover b. Reactive rather than proactive management c. Supportive rather than rivalrous relationships d. Long-term business focus

Reactive rather than proactive management

Which of the following ratios can be used to assess a company's solvency? a. Current ratio b. Return on assets c. Times-interest-earned ratio d. Inventory turnover

Times-interest earned ratio

An employee decides to steal cash from his/her employer. What would be the best way to conceal such a fraud? a. Recording the stolen cash as an expense. b. Writing down accounts payable for a supplier. c. Increasing accounts receivable from a customer. d. Writing down as dividend paid to shareholders.

Recording the stolen cash as an expense.

___ is the ability of the perpetrator to relate to the potential co-conspirator. a. Expert power b. Legitimate power c. Referent power d. Reward power

Referent power

Which of the following is a step that organizations should undertake while recruiting employees? a. Conduct a covert investigation on the background of each candidate. b. Consider the candidate's word as truth to ensure a culture of trust and honesty. c. Require candidates to certify that all information on their résumé is accurate. d. Verify the candidate's race, age, and religion during the interview.

Require candidates to certify that all information on their résumé is accurate.

Which of the following actions would most likely create an opportunity for fraud? a. Requiring all documents over seven years old be shredded b. Requiring that the department manager authorize purchase orders only for purchase amounts for more than $100 c. Requiring one password code for each entire department to enter the storeroom d. Using a manual accounting system

Requiring one password code for each entire department to enter the storeroom

Identify the true statement about detecting fraud using financial statement reports. a. Performing horizontal analysis requires converting the income statement balances into percentages of gross sales. b. Vertical analysis is the most direct method of focusing on changes from period to period. c. Before performing any data-driven analysis that targets fraud and corruption in financial statements, the numbers in all three types of financial statements need to be converted to percentages. d. Small frauds may not affect the summarized financial statements significantly enough to be detected.

Small frauds may not affect the summarized financial statements significantly enough to be detected.

Which of the following appears to be common to most embezzlers who are caught? a. Long-term focus b. Investments made in low-risk instruments c. Saving what they steal d. Spending on lifestyle improvements

Spending on lifestyle improvements

Which of the following financial statements can be used to answer the question, "Where did the cash come from to pay dividends?" a. Income statement b. Balance sheet c. Statement of cash flows d. Trial balance

Statement of cash flows

Which of the following is a control problem related to segregation of duties? a. Julie writes expense checks and Mark collects cash from customers. b. Bob order office supplies and deposits the company's checks. c. Steve records receivables and writes off bad debts. d. Rebecca records journal entries and orders lunch.

Steve records receivables and writes off bad debts.

___ is the splitting of complex data sets into case-specific tables. a. Deviation b. Stratification c. Data mining d. Soundex

Stratification

Which of the following is true? a. Stratification is the splitting of data into case-specific tables. b. Stratification is an extension of summarization. c. Summarization provides detail for each grouping into tables. d. Stratification is utilized to create a z-score across data sets.

Stratification is the splitting of data into case-specific tables.

Which of the following is NOT a possible control activity? a. Having separate authorization, bookkeeping, and custody functions. b. Protecting access to important information with a password. c. Requiring two individuals to work on the same task. d. Supervisory review of each task completed by employees.

Supervisory review of each task completed by employees.

Which of the following is the largest employee group in most organizations? a. Employees who display ethical leadership b. Group of employees who will always be honest c. Group of employees who will be dishonest anytime it benefits them d. Swing group of employees who could be honest or dishonest

Swing group of employees who could be honest or dishonest

Which of the following is a true statement regarding the United States Social Security Administration (SSA)? a. The SSA publishes a monthly list of newly issued Social Security numbers. b. The SSA publishes a monthly list of Social Security numbers that are no longer in use. c. The SSA database of valid numbers can be accessed by interested parties. d. The SSA database can be used to create mailing lists.

The SSA publishes a monthly list of Social Security numbers that are no longer in use.

_______ require(s) every public company to have a code of ethics to help deter wrongdoing. a. The Glass Steagall legislation b. The Sarbanes-Oxley legislation c. The Securities Act d. Generally Accepted Auditing Standards

The Sarbanes-Oxley legislation

Which of the following is a true statement regarding the fraud scale depicted in the text? a. The greater the perceived opportunity to commit fraud, the less rationalization it takes to commit fraud. b. The more dishonest a person is, the higher the need to rationalize the fraud act. c. When the financial pressure increases, even low perceived opportunity is sufficient to commit fraud. d. As the "need" to gamble increases, rationalization to commit fraud becomes easier.

The greater the perceived opportunity to commit fraud, the less rationalization it takes to commit fraud.

What is the most likely outcome when a company demotes the perpetrator but allows him or her to go unprosecuted? a. The company will avoid bad publicity. b. The perpetrator may commit another fraud in the future. c. The perpetrator will be saved from pain and embarrassment. d. Management will send a signal that fraud will not be tolerated.

The perpetrator may commit another fraud in the future.

______ involves the actual taking of cash, inventory, information, or other assets, whereas _______ involves selling stolen assets or transferring them into cash and then spending the cash. a. Conversion, coercion b. Theft, conversion c. Coercion, theft d. Theft, coercion

Theft, conversion

Which of the following is true of most accounting errors? a. They are primarily caused by lack of training. b. They represent intentional sabotage of controls. c. They are problems caused by failures in systems, procedures, and policies. d. They represent fraud.

They are problems caused by failures in systems, procedures, and policies.

Manufacturing companies with a profit margin of 10 percent must usually generate about 10 times as much revenue as the dollar amount of the fraud in order to restore net income to its pre-fraud level. a. True b. False

True

Most experts agree that fraud-related careers will be in demand in the future. a. True b. False

True

When perpetrators are criminally convicted of fraud, they often serve jail sentences and/or pay fines. a. True b. False

True

The proactive method of fraud detection is a six-step process. Which of the following is the correct process sequence? a. Identify possible frauds that could exist; catalog possible fraud symptoms; understand the business; use technology to gather data about symptoms; automotive detection procedures; analyze results; and investigate symptoms b. Catalog possible fraud symptoms; understand the business; identify possible frauds that could exist; analyze results; use technology to gather data about symptoms; and investigate symptoms c. Understand the business; identify possible frauds that could exist; catalog possible fraud symptoms; investigate symptoms; use technology to gather data about symptoms; and analyze results d. Understand the business; identify possible frauds that could exist; catalog possible fraud symptoms; use technology to gather data about symptoms; analyze results; and investigate symptoms

Understand the business; identify possible frauds that could exist; catalog possible fraud symptoms; use technology to gather data about symptoms; analyze results; and investigate symptoms

Which approach converts financial statement numbers to percentages of total assets or total sales? a. Horizontal analysis b. Vertical analysis c. Ratio analysis d. Variance analysis

Vertical analysis

Which of the following questions should be answered when considering fraud risk and fraud prevention? a. Which types of fraud are the easiest and least costly to prevent? b. Which employees are in the best position to commit fraud? c. Which symptoms of a fraud act are most likely to be spotted? d. What are all of the types of possible fraud that can be committed?

Which employees are in the best position to commit fraud?

Which statistical approach is one of the most powerful and yet simple methods for identifying outliers? a. N-grams b. Z-score c. Time-trend analysis d. Soundex algorithm

Z-score

An employee who has the responsibilities of both writing checks and making bank deposits would have ____ to commit fraud. a. financial pressure b. a perceived opportunity c. the rationalization d. validation

a perceived opportunity

Research in moral development strongly suggests that honesty can be BEST reinforced when: a. expectations of honesty are implied. b. fraud perpetrators are given a second chance. c. appreciation is exhibited for honesty. d. a proper example is set by management.

a proper example is set by management.

Assume that the net sales for a company is $5,000, cost of goods sold is $3,000, and average inventory is $1,500. Calculate the inventory turnover ratio. a. 2 b. 0.5 c. 3.3 d. 1.3

a. 2

Which of the following is NOT one of the components of the fraud exposure rectangle? a. Accounting system controls b. Management and directors c. Financial results and operating characteristics d. Organization and its industry

a. Accounting system controls

How is the sales return percentage ratio calculated? a. By dividing sales returns by total sales b. By dividing total sales by sales returns c. By dividing sales returns by net sales d. By dividing net sales by sales returns

a. By dividing sales returns by total sales

According to study of financial statement frauds by the Committee of Sponsoring Organizations (COSO), who is the most common perpetrator of financial statement fraud? a. Chief Executive Officer b. Chief Financial Officer c. Chief Operating Officer d. Finance Controller

a. Chief Executive Officer

In addition to changes in financial statements, which of the following can indicate financial statement fraud has occurred? a. Information in the footnotes to the financial statements b. Stable dividend payout ratio c. Increased hiring of qualified employees by the company d. Addition of an independent member on the board

a. Information in the footnotes to the financial statements

Which of the following is a valid reason behind the prevalence of revenue-related financial statement fraud? a. It is easy to manipulate net income using revenues and receivables accounts. b. Revenue-related frauds are difficult to hide from detection. c. A reversing effect of the fraud automatically occurs in the subsequent period. d. Auditors generally focus more on balance sheet items than on revenue accounts.

a. It is easy to manipulate net income using revenues and receivables accounts.

Corporate financial statement fraud discovered in 2001 resulted in how many of the ten largest corporate bankruptcies in United States history? a. Seven b. Six c. Nine d. Eight

a. Seven

According to the text, why is the accounts receivable turnover ratio widely used in analyzing revenue-related fraud? a. Significant amounts of fictitious revenues and receivables will almost always affect this ratio except in rare cases. b. Adding fictitious receivables will generally decrease the number of days it takes to collect receivables. c. If the ratio generally exceeds 1, recording fictitious sales will significantly increase the ratio, making it easy to spot fraud. d. Since the ratio should ideally equal 1, any deviation from this number is easy to detect.

a. Significant amounts of fictitious revenues and receivables will almost always affect this ratio except in rare cases.

Which of the following is a typical symptom of a revenue-related fraud? a. Significant new, unknown customers b. Fall in gross profit percentage compared to the previous year c. Purchases from suppliers not approved on vendor lists d. The company having a huge customer base

a. Significant new, unknown customers

10-K forms refer to which of the following? a. The corporate reports filed with the SEC b. The tax returns filed with the IRS c. The press releases to the newswires d. The bankruptcy filing document

a. The corporate reports filed with the SEC

When a company records fictitious revenues, what is the effect on asset turnover ratio? a. The ratio increases b. The ratio decreases c. No effect d. The ratio might increase or decrease depending upon the transaction

a. The ratio increases

When do frauds occur in related-party transactions? a. When the transactions are not properly disclosed b. When assets are transferred between related parties at fair value c. When arrangements are made between two parties that create a conflict of interest in a business setting d. When the arrangement creates operating revenues

a. When the transactions are not properly disclosed

Which of the following occurs when an auditor and auditee only consider conditions that directly affect themselves but not the other party? a. Zero-order reasoning b. Deductive reasoning c. First-order reasoning d. Higher-order reasoning

a. Zero-order reasoning

Understanding a company's relationships with financial institutions and bondholders is important because: a. it can indicate the extent to which the company is leveraged. b. it can reveal whether significant short selling of the company's stock has occurred. c. it can uncover the fraudulent transactions from special purpose entities. d. it may help in raising additional funds from the financial institutions.

a. it can indicate the extent to which the company is leveraged.

Many financial statement frauds have been perpetrated because management: a. needed to report high income to support stock prices. b. wanted to decrease the total tax payable by the company. c. wanted to show artificial losses to employees. d. wanted to pay lower dividends to the shareholders.

a. needed to report high income to support stock prices.

Asset frauds are often easier to detect than other types of financial statement fraud because: a. overstated assets are always included on the balance sheet. b. of the off-book nature of asset frauds. c. asset overstatements are almost always quite significant.

a. overstated assets are always included on the balance sheet.

No mention of the contingent liability needs to be made in the financial statements, if the probability of payment is: a. remote. b. probable. c. reasonably possible. d. not plausible.

a. remote.

In liability fraud, liabilities are most often: a. understated. b. overstated. c. recorded as assets. d. recorded as expenses.

a. understated.

A "right-to-audit" clause: a. provides rights to the vendor to audit the company's books at any time. b. gives an external auditor the right to audit the company's books. c. is considered in civil court as an invasion of privacy. d. alerts vendors that the company reserves the right to audit the vendor's books at any time.

alerts vendors that the company reserves the right to audit the vendor's books at any time.

Benford's Law: a. applies to numbers that have built-in limits. b. is most effectively used with assigned numbers. c. applies best to numbers that occur naturally. d. uses ratios to detect fraud.

applies best to numbers that occur naturally.

Every fraud is comprised of all the following elements EXCEPT: a. the theft act. b. concealment. c. conversion. d. assault.

assault

Which of the following is a symptom of potential inventory fraud? a. An auditor observing a weakness in the inventory-receiving procedures b. An auditor observing an override of an internal control c. An auditor observing inadequate physical controls in the warehouse d. An auditor observing the lack of authorization required for purchases of inventory under $1,000

b. An auditor observing an override of an internal control

There has been an auditor change at Company X. Which of the following situations may NOT signal a potential fraud problem? a. Failure to pay an audit fee b. Auditee believing that the auditor's fees are too high c. Suspected fraud or other problems by the auditor d. Auditor-auditee disagreement

b. Auditee believing that the auditor's fees are too high

What are special purpose entities (SPEs)? a. Fictitious organizations formed to perpetrate a financial statement fraud b. Business interests formed solely to accomplish some specific task or tasks c. Bodies formed to establish audit reporting standards and rules d. Independent audit boards set up to ensure that financial statements are verified

b. Business interests formed solely to accomplish some specific task or tasks

Overstating ending inventory has the following effect on cost of goods sold and net income respectively. a. COGS - overstated and NI - overstated b. COGS - understated and NI - overstated c. COGS - overstated and NI - understated d. COGS - no effect and NI - understated

b. COGS - understated and NI - overstated

Which of the following is an example of examining nonfinancial data to detect fraud? a. Noting an increase in billing charges per customer b. Comparing the dates of sales to shipment dates c. Comparing line item current expenses to prior years d. Calculating the percent increase in inventory amounts

b. Comparing the dates of sales to shipment dates

Which of the following is a common inventory-related fraud scheme? a. Channel stuffing b. Cutoff problems c. Related-party transactions d. Side agreements

b. Cutoff problems

Which of the following are accounting symptoms that may indicate cash or marketable security misstatements? a. Obtaining statements directly from financial institutions as of the date you are concerned about. b. Differences between recorded amounts and amounts confirmed with banks, brokers, and other independent parties. c. Having physical possession of marketable security certificates. d. Comparing cash and marketable security balances with those of similar companies.

b. Differences between recorded amounts and amounts confirmed with banks, brokers, and other independent parties.

Which of the following is NOT true regarding "topside" journal entries used to commit financial statement fraud? a. Upper management usually records the journal entry b. Entries are recorded to subsidiary ledgers c. The journal entry may be recorded after normal business hours d. Entries often bypass the normal process for posting journal entries

b. Entries are recorded to subsidiary ledgers

Examining a company's relationships with other individuals and entities can reveal important information about financial statement fraud. Identify the piece of information that is correctly linked to its source. a. Examining relationships with financial institutions will show whether there has been significant "short selling" of the company's stock. b. Examining relationships with related parties will show whether there are unusual transactions that significantly improve the company's reported financial performance. c. Examining a company's relationships with its lawyers will show whether management is able to unduly influence the selection of accounting principles and the determination of significant estimates. d. Examining relationships with regulatory bodies will show whether the company has recently changed legal counsel.

b. Examining relationships with related parties will show whether there are unusual transactions that significantly improve the company's reported financial performance.

Identify an example of a perceived pressure that can motivate financial statement fraud. a. The ability to obfuscate the fraud behind complex transactions b. Failure to meet Wall Street's earnings expectations c. Rationalizing that all companies use aggressive accounting practices d. A weak board of directors

b. Failure to meet Wall Street's earnings expectations

Which of the following are considered the backbone of capitalism and allow investors, lenders, and regulators to measure the performance of a business? a. Government policies b. Financial statements c. Stock prices d. Credit reports

b. Financial statements

Which ratio will increase in a liability fraud? a. Accounts payable/Purchases b. Interest expense/Notes payable c. Total liabilities/Total assets d. Lease expense/Total fixed assets

b. Interest expense/Notes payable

The study done by the Committee of Sponsoring Organizations (COSO) on financial statement frauds that occurred during the period from 1987-1997 had many key findings. Which of the following is NOT among them? a. Frauds were most commonly perpetrated by improper revenue recognition, overstatement of assets, and understatement of expenses. b. Most of these firms had audit committees that met at least four times a year. c. Severe consequences were associated with companies who committed financial statement fraud. d. Most companies were experiencing net losses or were just holding break-even positions in periods prior to the fraud.

b. Most of these firms had audit committees that met at least four times a year.

Which of the following actions by the company auditor increases the potential to detect fraud? a. Comparing current procedure test results to a prior year b. Performing new procedures not conducted in prior years c. Assigning the same audit staff to the audit from year to year d. Carefully checking the audit test results

b. Performing new procedures not conducted in prior years

Which ratio will increase when accounts payable is not recorded? a. Accounts payable/Inventory b. Quick assets/Current liabilities c. Accounts payable/COGS d. Accounts payable/Total liabilities

b. Quick assets/Current liabilities

Which legislation led to the establishment of the Public Company Accounting Oversight Board? a. Private Securities Litigation Reform Act b. Sarbanes-Oxley Act c. Gramm-Leach-Bliley Act d. Glass-Steagall Act

b. Sarbanes-Oxley Act

How is a contingent liability reported if it is considered "reasonably possible?" a. The liability may or may not be recorded in the footnotes to financial statements. b. The contingent liability should be disclosed in the footnotes to the financial statements. c. The liability should be disclosed in the footnotes as well as on the face of the financial statements. d. No mention of the liability needs to be made in the financial statements.

b. The contingent liability should be disclosed in the footnotes to the financial statements.

What is meant by the term "topside" journal entries? a. The entries appearing in the beginning of a general ledger b. The entries that involve the overriding of internal controls c. The entries made toward the end of the accounting period d. The entries posted to subsidiary ledgers where supporting information is maintained

b. The entries that involve the overriding of internal controls

Which of the following observations concerning backdating of options is true? a. It will not result in restatement of financial statements. b. The extraordinary timing and frequency of occurrences defied statistical probability. c. There is no concrete evidence that managers gained because of this practice. d. It is an accepted means of compensating managers who perform exceedingly well.

b. The extraordinary timing and frequency of occurrences defied statistical probability.

When a company understates the cost of goods sold, what is the effect on the inventory turnover ratio? a. The ratio might increase or decrease depending upon the amount by which it is understated b. The ratio will decrease c. No effect d. The ratio will increase

b. The ratio will decrease

Analytical symptoms for unrecorded notes and mortgages payable include which of the following? a. Significant increases in recorded debt b. Unreasonable relationships between interest expense and recorded liabilities c. Recorded amounts of notes payable, mortgages payable, and other debts that appear to be too high d. Significant sales of assets with not much cash flow

b. Unreasonable relationships between interest expense and recorded liabilities

Which of the following can be used to simultaneously view the relationships between all numbers on the balance sheet or income statement? a. Horizontal analysis b. Vertical analysis c. Ratio analysis d. Trend analysis

b. Vertical analysis

Should nonfinancial indicators be used for assessing fraud risk? Why or why not? a. No. A company's financial statement data need not always be consistent with its nonfinancial measures. b. Yes. Management can more easily manipulate financial numbers but finds it harder to keep all the nonfinancial information consistent with the financial information. c. No. Nonfinancial measures are indicative of physical assets alone. d. Yes. Management attempts to commit fraud first show up in these indicators. Financial statement fraud is an attempt to cover up those attempts.

b. Yes. Management can more easily manipulate financial numbers but finds it harder to keep all the nonfinancial information consistent with the financial information.

Inventory fraud often involves overstating inventory and/or understating cost of goods sold. The result is a decrease in the: a. gross profit ratio. b. inventory turnover ratio. c. number of days sales in inventory. d. accounts receivable turnover ratio.

b. inventory turnover ratio.

While generally accepted accounting principles do allow flexibility, standards of _________, ________, and ________ must always prevail in the financial statements. a. subjectivity; integrity; validation b. objectivity; integrity; judgment c. recording; reporting; accounting d. quality; excellence; judgment

b. objectivity; integrity; judgment

In asset fraud, assets are most often: a. understated. b. overstated. c. recorded as liabilities. d. recorded as revenues.

b. overstated.

According to a study sponsored by the Committee of Sponsoring Organizations (COSO), the most common way to manipulate revenue accounts is by: a. reclassifying expenses as revenues. b. recording fictitious revenues. c. inappropriately reducing sales returns and allowances. d. prematurely recording revenue.

b. recording fictitious revenues.

If an auditor notices fraud symptoms related to inventory, one of the best ways to confirm if a fraud is occurring is to: a. ask senior management. b. search out tips and complaints from employees who may be aware that something isn't right. c. report suspicions to regulatory agencies for further investigation. d. continue searching for additional symptoms of the potential fraud.

b. search out tips and complaints from employees who may be aware that something isn't right.

Once a fraud has occurred and a preventive solution developed, the solution should: a. not be implemented because of the reactive circumstance in which it was created. b. be implemented only after testing by external auditors. c. always be implemented by default. d. be implemented only if it meets the cost-effectiveness test.

be implemented only if it meets the cost-effectiveness test.

In the past, most frauds were detected: a. by surveillance and undercover operations. b. by accident. c. by providing ways for people to report suspicions of fraud. d. by examining transaction records and documents to determine if there were anomalies that could represent fraud.

by accident

According to a study of financial statement frauds by the Committee of Sponsoring Organizations (COSO), the average fraud lasts for how many months? a. 12 months b. 18 months c. 24 months d. 30 months

c. 24 months

Company XYZ had a long-standing relationship with a leading law firm. In fact, the law firm's business with this company was one of its most profitable relationships. If the law firm decides that it no longer wants to conduct business with the company, this is: a. Indicative that the company might have a lot of customer lawsuits against it b. Not any sort of meaningful indicator of fraud activity c. A large cause for concern that financial statement fraud may be occurring d. An indication that the client has likely outgrown the law firm

c. A large cause for concern that financial statement fraud may be occurring

Which of the following is most likely an indicator of potential revenue fraud? a. A sudden increase in the sales discount percentage b. A high sales return percentage c. A rapidly increasing asset turnover ratio d. A rapidly decreasing working capital turnover ratio

c. A rapidly increasing asset turnover ratio

Which of the following is a performance evaluation method that focuses on both financial and nonfinancial indicators of performance such as customer satisfaction? a. 360-degree survey b. Critical incidents method c. Balanced scorecard d. Pareto chart

c. Balanced scorecard

Which asset is probably the most difficult to overstate under normal audit procedures? a. Fixed assets b. Marketable securities c. Cash d. Accounts receivable

c. Cash

Which of the following is a fraud scheme affecting the inventory? a. Refreshing transactions b. Side agreements c. Double counting d. Lapping

c. Double counting

Which of the following is a commonly used ratio to discover inventory-related fraud? a. Number of days' in receivable ratio b. Sales return percentage ratio c. Gross profit ratio d. Earnings per share

c. Gross profit ratio

An auditor adjusts the audit plan by introducing unexpected audit procedures in response to what the auditor believes management may be doing to conceal a fraud based on management's strategic reasoning. Which order of reasoning is occurring here? a. Low-order reasoning b. Zero-order reasoning c. Higher-order reasoning d. First-order reasoning

c. Higher-order reasoning

Which of the following is NOT an activity specifically listed in the text as prohibited by the Sarbanes-Oxley Act for an auditor of a company to perform contemporaneously? a. Appraisal or valuations services b. Actuarial services c. Income tax preparation services d. Bookkeeping services

c. Income tax preparation services

Which of the following may indicate management fraud? a. The name of a relative of a member of upper management is suggested to fill a board of directors' vacancy. b. Increases and decreases in inventory fluctuate from period to period. c. Inconsistencies exist between what management is telling the auditor and what the auditor observes. d. Several mistakes are discovered in the inventory records.

c. Inconsistencies exist between what management is telling the auditor and what the auditor observes.

What is the difficulty in using horizontal, vertical, or ratio analysis? a. The complicated calculations required to arrive at change statements b. Identifying the changes and speed of changes in the ratios, when the change is unexpected or unexplained c. Knowing when a change in account balance or relationship is significant enough to signal possible fraud d. Assessing the magnitude or significance of changes in account balances looking only at raw financial statement numbers

c. Knowing when a change in account balance or relationship is significant enough to signal possible fraud

Your firm has just acquired a new audit client. The new client is highly leveraged with borrowing from several institutions. It is planning to expand the business by obtaining additional debt finance in the near future. Based on these facts, which one of the following should be most carefully examined? a. Transactions that result in healthy revenues b. Large market capitalization c. Loans and other financing transactions between related entities d. Dividend paid out in the previous year

c. Loans and other financing transactions between related entities

Which of the following applies to a "cookie jar?" a. Understated accounts payable b. Overstated current assets c. Overstated reserves d. Recording fictitious revenues

c. Overstated reserves

Which of the following tends to be the most common method for understating cost of goods sold? a. Understating purchases b. Overstating purchase returns c. Overstating inventory

c. Overstating inventory

A CEO believes that the company should try to keep the stock price high by manipulating the financial statements to protect its shareholders. Which element of the fraud triangle is discussed here? a. Perceived opportunity b. Trauma c. Rationalization d. Perceived pressure

c. Rationalization

Which of the terms refers to the ability to anticipate a fraud perpetrator's likely method of concealing a fraud? a. Zero-order reasoning b. Deductive reasoning c. Strategic reasoning d. Low-order reasoning

c. Strategic reasoning

Your audit team, working with a newly acquired client, discovers that there has been fraudulent financial reporting for the past five years. Who is most likely to have been involved in the fraud? a. Middle management in positions of trust b. Disgruntled employees c. Top management d. The accountants in charge of preparing the financial statements

c. Top management

Which of the following is a rare situation that may arise in a privately owned company that wants to decrease the amount of income taxes paid to the government? a. Understating purchases b. Overstating net income c. Understating inventory d. Understating cost of goods sold

c. Understating inventory

Which of the following is a documentary symptom associated with revenue-related fraud? a. Unusual delays by the entity in providing revenue-related, requested information b. Weaknesses in the cutoff processes or other key accounting processes c. Unsupported or unauthorized revenue-related balances or transactions d. Unusual relationships between two revenue-related accounts

c. Unsupported or unauthorized revenue-related balances or transactions

Which of the following is an analytical symptom associated with revenue-related financial statement frauds? a. Untrue responses by management to queries about revenue-related accounts b. Missing documents in the revenue cycle c. Unusual entries made at the end of the accounting period that increase revenues d. Significant bonuses tied to meeting earnings forecasts

c. Unusual entries made at the end of the accounting period that increase revenues

In case of deferred revenue liabilities, when should revenues almost always be recorded as earned? a. When the company receives an order for delivery of the product or the performance of a service b. When the company is reasonably sure that the product can be developed and delivered c. When the service is performed or the product is shipped d. When the company receives cash for the service to be performed or the product to be delivered

c. When the service is performed or the product is shipped

Which of the following is a finding of the Treadway Commission? a. Financial statement frauds occur very often, the average fraud lasts about two years. b. The CEO perpetrates the fraud in 72% of the cases. c. While financial statement frauds occur infrequently, they are extremely costly. d. Financial statement fraud occurs mostly in companies that are listed.

c. While financial statement frauds occur infrequently, they are extremely costly.

The first step to uncovering revenue fraud is to: a. determine how each transaction could be misstated. b. evaluate the efficiency of the management. c. analyze and diagram the various transactions between an organization and its customers. d. identify scheme-specific symptoms and proactively search for more fraud.

c. analyze and diagram the various transactions between an organization and its customers.

Capitalizing costs that should be expensed: a. is a practice mostly found in large, well-established companies. b. usually has no effect on net income. c. has the effect of increasing net income by the same amount of the capitalized costs. d. is a healthy practice if they are written off shortly after the transaction takes place.

c. has the effect of increasing net income by the same amount of the capitalized costs.

Overstating of sales in the income statement leads to a: a. decrease in inventory turnover ratio. b. decrease in EPS. c. increase in gross profit ratio. d. decrease in accounts receivable ratio.

c. increase in gross profit ratio.

It is usually easier to detect inadequate disclosure fraud that involves______ disclosures than it is to detect disclosure fraud that involves _______ disclosures. a. fraudulent, irrelevant b. unintentional; intentional c. misleading; missing d. missing; fraudulent

c. misleading; missing

Frauds are more likely to occur in: a. large, historically profitable companies. b. companies with an active board of directors. c. smaller companies where one or two individuals have almost all control in decision making. d. any company, as the probability of a fraud does not change with the size of a company.

c. smaller companies where one or two individuals have almost all control in decision making.

All of the following adjustments can be used to understate accounts payable EXCEPT: a. recording purchases after year end. b. overstating purchase discounts. c. understating purchase returns. d. omitting purchases.

c. understating purchase returns.

Which area of investigative method involves searching for ways in which perpetrators have spent or used their stolen assets? a. Theft act b. Concealment c. Conversion d. Collusion

conversion

Assume that the net sales for a company is $5,000, cost of goods sold is $3,000, and average inventory is $1,500. Calculate the number of days' sales in inventory. a. 145 b. 274 c. 110 d. 183

d. 183

Which of the following is most likely an indicator of fraud involving inventory overstatement? a. A sudden increase in the inventory turnover ratio b. A sharp decrease in gross profit margin c. A sudden decrease in sales d. A sudden increase in number of days' sales in inventory

d. A sudden increase in number of days' sales in inventory

Which of the following ratios is relatively more helpful in highlighting revenue-related frauds? a. Working capital turnover ratio b. Earnings per share c. Asset turnover ratio d. Accounts receivable turnover

d. Accounts receivable turnover

Which of the following is the term for a practice where the effective dates on stock options are deliberately changed for the purpose of securing extra pay for management? a. Backtracking b. LEAP c. Arbitrage d. Backdating

d. Backdating

Which of the following terms depicts processing orders for goods that are stored by the seller, often, because the buyer is not ready or able to receive the goods at the time of the order? a. Sham sales b. Side agreements c. Consignment sales d. Bill-and-hold sales

d. Bill-and-hold sales

In this phase of the economy, most businesses appear to be highly profitable. a. Trough b. Recession c. Recovery d. Boom

d. Boom

What is the meaning of "short sell?" a. Buy shares from a brokerage firm and enter into a forward transaction to sell the shares at today's price on a future date. b. Sell the shares at today's price to an investor and enter into an option agreement to buy the shares back in the near future. c. Buy shares from one brokerage firm and sell the shares to another brokerage firm with a view to make quick money. d. Borrow shares from a brokerage and sell the shares at today's price with the intention to repay the borrowed stock they sold at some future time when the stock is trading for a lower price.

d. Borrow shares from a brokerage and sell the shares at today's price with the intention to repay the borrowed stock they sold at some future time when the stock is trading for a lower price.

Which type of fraud will not have any analytical symptoms? a. Inventory fraud b. Revenue fraud c. Liability fraud d. Disclosure fraud

d. Disclosure fraud

What is the least effective method for comparing financial statement information between companies? a. Performing ratio analysis b. Performing horizontal analysis c. Studying the statement of cash flows d. Focusing on changes in financial statement numbers

d. Focusing on changes in financial statement numbers

Which of the following is NOT a kind of question that should be asked in order to understand the exposure to management fraud? a. Is a legitimate business purpose apparent for each separate entity of the business? b. Have significant recent changes occurred in the nature of the organization? c. Are the accounting and information technology staff and organization effective? d. How many employees are there in the organization who have many years with the organization?

d. How many employees are there in the organization who have many years with the organization?

According to the study done by the Securities and Exchange Commission, in what area were the greatest number of enforcement actions taken? a. Improper use of off-balance-sheet arrangements b. Improper expense recognition c. Improper accounting for business combinations d. Improper revenue recognition

d. Improper revenue recognition

Which of the following is an example of a perceived opportunity that can lead to financial statement fraud? a. Inability to compete with other companies b. Independent audit and a strong board of directors c. Thinking that fraud is good for the company d. Inadequate internal controls

d. Inadequate internal controls

Which of the following would be least likely to indicate potential fraud activity? a. Increased borrowing at one specific bank b. Increased numbers of short sales by investors c. Increased business with related parties d. Increased customer appreciation activities

d. Increased customer appreciation activities

What is often referred to as "abusing the cutoff?" a. Inflating revenues by using implied side agreements b. Inflating revenues by selling unused assets for a promise to buy them or similar assets back at roughly the same price c. Inflating current revenues by allowing customers to return products and cancel sales in future periods d. Inflating revenues by including revenues in the current period that should be recognized in the next period

d. Inflating revenues by including revenues in the current period that should be recognized in the next period

When management fraud occurs, companies usually: a. overstate assets and net income. b. understate assets and net income. c. overstate assets and understate net income. d. understate assets and overstate net income.

overstate assets and net income.

Which types of questions should be asked about a company's relationship with financial institutions? a. Is a significant part of the company's income or revenues derived from one or two large transactions? b. Has management placed unreasonable demands on the auditor, including unreasonable time constraints? c. Has significant "short selling" of the company's stock occurred? If so, for what reasons? d. Is the organization highly leveraged through bank or other loans?

d. Is the organization highly leveraged through bank or other loans?

What is the practice in which cash receipts are misapplied to hide fictitious receivables called? a. Bill-and-hold b. Channel stuffing c. Partial shipment d. Kiting

d. Kiting

The presence of fraud symptoms should cause a fraud examiner to do which of the following? a. Refuse to complete the audit b. Report the fraud to the SEC c. Call a press conference to detail the findings d. Launch an investigation

d. Launch an investigation

Why are overstated reserves sometimes referred to as "cookie jar" reserves? a. Companies involved in mergers or acquisitions overstate their liabilities by creating "cookie jar" reserves. b. The reserve is commonly created during bad times or when routine senior management changes occur. c. Some companies may require customers to make deposits for future goods or services that can be intentionally recorded as revenue, which is like money stored in a cookie jar. d. Like money stored in a cookie jar, overstated revenues represent a stash of accounting earnings that can be used to bolster the perceived performance of the company in the future.

d. Like money stored in a cookie jar, overstated revenues represent a stash of accounting earnings that can be used to bolster the perceived performance of the company in the future.

Which of the following is a potential revenue-related fraud scheme? a. Cutoff problems b. Double counting c. Holding items on consignment d. Partial shipment

d. Partial shipment

Which of the following is defined as selling unused assets for a promise to buy them or similar assets back at roughly the same price? a. Bill-and-hold sales b. Kiting c. Channel stuffing d. Round-tripping

d. Round-tripping

Which of the following expenditures would be most suspicious if it were capitalized? a. Equipment purchases b. Computer purchases c. Prepaid expenses d. Salaries to the top management

d. Salaries to the top management

Which is a common method of providing executive compensation by allowing top management to purchase stock at a fixed share price? a. Stock splits b. Arbitrage c. Dividends d. Stock options

d. Stock options

Which of the following is a true statement regarding searching for inventory analytical symptoms? a. Examining the changes in recorded amounts from period to period provides useful information regarding potential fraud. b. Studying the statement of cash flows is not a useful means of looking for potential fraud. c. Utilizing vertical analysis for the current year is a useful means of identifying potential fraud. d. The pace of the change in the numbers can often be indicative of potential fraud.

d. The pace of the change in the numbers can often be indicative of potential fraud.

When examining whether a company has underrecorded accounts payable, all of the following ratios are helpful EXCEPT: a. Quick assets/Current liabilities b. Accounts payable/Purchases c. Accounts payable/Cost of goods sold d. Unearned revenue/Accounts payable

d. Unearned revenue/Accounts payable

All of the following observations concerning off-balance-sheet arrangements are true, EXCEPT: a. a common use is to allocate risks among third parties. b. they might include structured finance or special purpose entities. c. they are often used to engage in leasing, hedging, or research and development services. d. they are considered illegal under SEC guidelines.

d. they are considered illegal under SEC guidelines.

Most software packages have functions for generating _____ about columns of data, which include statistical summaries like control totals, mean, maximum, minimum, standard deviation, number of zero values, number of empty records, and so on. a. captions b. histograms c. headings d. descriptives

descriptives

Benford's Law can help detect fraud by: a. establishing weaknesses in the accounting control system. b. identifying accounting anomalies. c. focusing on unexplained changes. d. identifying possible attempts by fraudsters to make stolen amounts look random.

identifying possible attempts by fraudsters to make stolen amounts look random.

The red flag that is generally identified when employee and vendor telephone numbers are the same is: a. dummy vendors. b. employees purchasing goods for personal use. c. billing more than once for the same purchase. d. providing poor-quality goods.

dummy vendors

Research has shown that ______ detect most frauds. a. auditors b. customers c. vendors d. employees

employees

Horizontal analysis is performed when: a. total assets are set at 100% and all other balances are shown as a percentage of total assets. b. financial statement data are shown for two periods with the amount and percentage of change for each line item. c. there is a need to calculate and compare key ratios from period to period. d. income statement amounts are shown as a percentage of total sales.

financial statement data are shown for two periods with the amount and percentage of change for each line item.

One way to create and communicate clear expectations about what is and is not acceptable in an organization is: a. having separate, nonintegrated personnel and operating policies. b. creating an expectation of punishment. c. following a reactive management style. d. having a clearly defined code of conduct in place

having a clearly defined code of conduct in place

The theory behind _____ is that if people know their work or activities will be monitored by others, the opportunity to commit and conceal a fraud will be reduced. a. documentation b. segregation of duties c. system of authorizations d. independent checks

independent checks

Communicating expectations about honesty and integrity throughout a company includes all of the following elements EXCEPT: a. identifying appropriate values and ethics. b. fraud awareness training. c. consistent punishment for violators. d. insisting that top management model appropriate behavior.

insisting that top management model appropriate behavior.

One of the disadvantages of Benford's Law in detecting fraud is: a. potential suspects are more likely to know you are trying to detect fraud than if you didn't use such detection techniques. b. users must be thoroughly trained in its complexities to implement and use. c. that those cases with the lowest probabilities do not match Benford's Law and may need further investigation. d. it only broadly identifies the possible existence of fraud; it fails to narrow possibilities to a manageable field of promising leads.

it only broadly identifies the possible existence of fraud; it fails to narrow possibilities to a manageable field of promising leads.

All transactions related to specific accounts, such as cash or inventory, are summarized in the: a. journal. b. ledger. c. trial balance. d. balance sheet.

ledger

According to Benford's Law, 5 will be the first digit of a random number set: a. more often than 1. b. less often than 4. c. about the same as 6. d. more often than 3.

less often than 4.

Studies show that legal action against fraudsters is typically taken: a. less than 25 percent of the time. b. less than 50 percent of the time. c. more than 75 percent of the time. d. at least 50 percent of the time.

less than 50 percent of the time.

All of the following factors can be associated with high levels of fraud and detract from a positive work environment EXCEPT: a. top management that does not pay attention to behavior of employees. b. lack of recognition of job performance. c. unrealistically low pay. d. low turnover.

low turnover

An operating condition that can contribute to a higher risk of fraud is: a. management by crisis. b. high company loyalty. c. flexible rules. d. proper authorization.

management by crisis

One of the most common errors investigators make when analyzing time trends is: a. incorrect data preparation. b. focusing only on one variable, time (the x-axis if graphed). c. not monitoring the time taken. d. not standardizing for time.

not standardizing for time.

A red flag search to detect kickbacks would include: a. invoices without valid purchase order. b. employee and vendor telephone numbers are the same. c. purchase orders with zero dollar amounts by buyer. d. price increases greater than 20% for several consecutive years.

price increases greater than 20% for several consecutive years.

All of the following are part of the fraud element triangle EXCEPT: a. the theft act. b. concealment. c. conversion. d. rationalization.

rationalization

A good internal control system includes: a. open work environments. b. rigid rules. c. segregation of duties. d. following strict hiring procedures.

segregation of duties

Preventive controls include: a. independent checks. b. segregation of duties. c. documents and records. d. financial statement reviews.

segregation of duties

While methods like high-low slope, average slope, handshaking, and Box-Jenkins exist, one of the most popular techniques for summarizing the slope of a graph is: a. summarization. b. stratification. c. statistical regression. d. arithmetic progression.

statistical regression.

Specific implementations of delimited text are called TSV. What does TSV stand for? a. toxicity screening value b. time segmented volume c. tab separated values d. tactical secure voice

tab separated values

Digital analysis is: a. the art of analyzing the digits that make up number sets like invoice amounts, reported hours, and costs. b. a technique which calculates the average probability for each grouping of data. c. the searching for expected relationships between numbers. d. the use of numeric values for decision making.

the art of analyzing the digits that make up number sets like invoice amounts, reported hours, and costs.

Which of the following records data for each case in a graph and analyzes the slope? a. summarization analysis b. time trend analysis c. fuzzy matching method d. cross tables method

time trend analysis

Fraud is most commonly detected by: a. monitoring employees. b. auditors. c. discouraging collusion. d. tips and complaints.

tips and complaints

Segregation of duties, as a control procedure, is most often used: a. when the task involved is complex. b. when it is impossible for one person to complete a task. c. when appraisals are conducted. d. when cash is involved.

when cash is involved


Conjuntos de estudio relacionados

Caleb 6th grade social studies quiz Chapter 11, Lesson 3

View Set

scmt exam 2, SCMT 364 - Exam 2 - Quizzes and Problem Sets combined

View Set

FL 2-15 Chapter 4 Practice Questions

View Set

MGT/316T: Managing With A Global Mindset

View Set

BEC - Financial Management Questions

View Set

Group Life Insurance, Retirement Plans, and Social Security Disability Program

View Set

CHAPTER 49 Nursing Management Diabetes Mellitus (lewis)

View Set

Multiple Choice Section Health Final Exam

View Set

Chapter 17: Nursing Care of the Child With an Alteration in Sensory Perception/Disorder of the Eyes or Ears

View Set