Fraud and Forensic Accounting

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Lockboxes are used for

collects payments, deposits them into the company's bank account, and send the company a remittance list. Minimizes the risk of theft and embezzlement

what does the principle of predication require

requires reasonable justification for each step in the evidence collection process

crime of using the threat of force to gain some benefit from a victim is

robbery

which of the following is a source of law in the United States? Case law, Constituational Law, Administrative Law, Statutory Law

Constitutional, Statutory, Case, and Administrative law

segregation of duties relates primarily to which of the following

Control activities

a false positive is said to occur when which of these occurs

a fraud indicator incorrectly indicates an ongoing or past fraud

one important element to include in an engagement letter is

a mediation or arbitration requirement

how is a determination of whether a segment is materially misstated made

by comparing the tolerable misstatement to the results of testing

investigation risk is...

chance of making less than than optimal decision in deciding what evidence to collect how to collect it and how to interpret it

what is the ultimate item of evidence that is admissible in court

confession

What is a term that some business processes are called

cycles

what elements must be present in a criminal matter?

damages

what happens in an arraignment

defendant brought before judge, receives copy of charges, defendant enters a plea of guilty or not guilty

what is the reason that auditors audit companies

determine whether their financial statements present the companies' financial position, results of operations, and cash flows in accordance with the accounting basis specified in the footnotes

how would you describe auditing

distinct from accounting

Fraud investigation process involves systematically gathering and reviewing evidence for the purpose of

documenting the presence or absence of fraud

what are the steps in a systematic fraud investigation

engagement process, evidence collection process, reporting process, loss recovery process

the first 10 amendments of the U.S. Constituion are the

Bill of rights

inspector general applies to ...

government agents

fraud theory is similar to a fraud schem except with respect to what

why?

best approach during interviews

withhold knowledge of evidence for strategic or tactical reasons

are corrective controls more expensive than detective controls

yes

the fraud theory approach to evidence collection

1. analyze data 2. create hypothesis regarding a possible fraud 3. test hypothesis 4. fraud theory is supported by evidence

what are specific objectives of internal controls

1. ensuring compliance with applicable laws, regulations, professional rules and contractual obligations. 2. promoting strategic, tactical and operational efficiency and effectiveness.

How many components of risk must an auditor consider

4, audit risk, inherent risk, control risk, detection risk

who has the descretion to bring charges against a suspect

District attorney and Grand jury

what is an exception to the hearsay rule

Dying declaration, state of mind, business and governmental records, excited utterance, prior inconsistent statements.

likely incidence of fraud discovered by accident in small companies?

Higher

the usual penalty in a civil case is

Monetary Damages and Equitable Releif

which of the following groups is the primary promulgator of financial auditing standards for private companies

PCAOB

which of the following organizations were created by sox

PCAOB

what are the primary rule make body that affects the auditing profession

PCAOB, Fasb, Gasb, SEC

the concept of preliminary judgment of materiality is defined in which of the following

Practice

Direct appeals of U.S. District court cases are heard by the

U.S. district court of appeals

a business process is a set of coordinated activities and tasks that...

accomplish some organization goal

segregation of duties applies to separating which three functions

accounting, authorization and custody

application controls help ensure

accuracy, integrity and security

the client changes accounting principles in the last year, what does the auditor do

add a paragraph that draws the readers attention to this change

what provides the most protection for a tipster's privacy?

anonymity

evidence is

anything that affects the truth or falsity of an assertion made in an investigation or legal proceeding

approval applies to transactions that...

are fully authorized

primary person responsible for collecting the actual evidence to be introduced in court is

attorney

suspicino f fraud probably affects what

audit procedures selected by the auditor and amount of testing

audit trail permits auditors to

balance and reconcile acounts because it is documentation and records that allow the auditor to trace back the account balances to the original sources

an objective of the review of physical and document evidence is to

become as familiar with the business processes as possible

when is the assessment of inherent risk made?

before considering the effects of internal controls

The burden of proof in a criminal case is

beyond a reasonable doubt

physical evidence is what?

broad category of collected evidence, includes documentary evidence

best way to optimize loss management system is to first do what

budget fraud risk and maximize prevention effectiveness

one assessment of acceptable audit risk is made for which of these

entire audit

hypothesis testing involves what

examination of a piece of evidence to decide whether it is consistent with the fraud theory under consideration

what describes auditors

facilitators of the movement of capital between investorsa and companies issuing stock or between lenders and borrowers

those auditing the financial statements are most concerned about which of the following

flow of transactions through the accounts

two types of transactions processing controls are

general controls and application controls

SAS no. 99 requires auditors design financial audits in such a way to have a reasonable chance to what

have a reasonable chance of detecting misstatements in the financial reports

primary control in the purchasing side of the financial cycle is

having the treasury function make payments based on documentation from other departments

what general source of data does not apply to data driven fraud detection

reconciliation figures, batch control totals, missing invoices

what does fraud detection involve

identify fraud indicators

the engagement process includes what steps

incident report, make notifications, consider legal issues, consider loss mitigation, define scope, objectives and cost, engagement letter

acceptalbe detection risk depends on what?

inherrent risk, control risk and acceptable audit risk

sas 99 requires that auditors report any evidence found that fraud may exist to what?

inventory accounts, cash accounts, financial reports

after an initial assessment...

investigate some suspected frauds

describe the licensing of CPA's

issued at state level, and must pass uniform cpa exam

what is true of having a centralized case file in fraud investigation

it is advisable because doing so can be helpful in optimizing a fraud management system

crime intentionally and permanently converting another's property to one's own.

larceny

when should the primary suspect be interviewed?

last

the turnkey approach to systems developement is

less expensive than the classical approach

risk in the context of financial information is defined as..

likelihood that a material misstatement will influence the decision of a reasonable user of the financial statements

try to catch the fraudster in the act can...

lower investigation cost and provide good evidence in court

define tolerable misstatement

maximum amount of misstatement the auditor is willing to tolerate in a segment

an incident report is important because...

may serve as probable cause needed to subpoena records

The turnkey approach of systems development is

ready made prefabricated systems that include all needed software, documentation, training materials and vendor support are used without any design or programming work

when properly implemented, internal controls

minimize loss exposures

which way do companies tend to develop their information systems

modular

what is the process where the judge can rule out ceratin evidence.

motion in liminy

when fully operating, control processes

must be continuously monitored

risks affect what

nature, timing and extent of testing

when should CFE's include an opinion of guilt in their fraud reports

never

worldcom is an example of

none of the above

good general rule is that individual fraudsters are...

not deterred by prosecution

ideal control over cash registers, there should be

one employee assigned to each cash register

what function is not compatible with managing the AR ledger?

opening the mail, approving writeoff of bad debt, depositing customer payments to the company bank account

what is fraud theory

organized set of answers to questions: who, what, when, where, how and why

which of the following types of data would be useful for social networking analysis

phone records, membership records for boards of diretors for various companies, exmployment records containing lists of past employers

what are the major types of evidence

physical evidence, documentary evidence, observational evidence, interview evidence

fraud theory approach is...

posits a hypothesis, tests the hypothesis against evidence, then accepts, modifies or discards the hypothesis as warranted by the evidence

what is fraud scheme

predefined set of answers to who what how when where

three conditions that auditors consider when making judgments on materiality

presence of fraud, consequences arising from contractional obligations, and misstatements that affect earnings trends

what is the principle of reverse proof

principle that requires investigator to consider the evidence for both sides. investigator must consider and rule out all evidence that would support defense agruments

Define Auditing

process of gathering and evaluating evidence about information to determine the degree of correspondence between the information and the standards used to prepare the information

fraud reporting process can be defined as

process that involves documenting and summarizing the results of the fraud investigation

on which of these does internal control focus

processes

the classical approach to systems development, the developer

produces a custom blueprint for the desired system

what best describes how the principle of predication can affect private fraud investigators compared to law enforcement officials

provides less restraint

discovery sampling does what?

sometimes detect errors

in absence of a confession, which of the following is true about the fraud investigation?

sometimes points to a guilty person

what are the list of types of opinions expressed in audit reports

standard unqualified, unqualified with modified wording, qualified, adverse, disclaimer

primary objective in a fraud investigation is to

stop the fraud from continuing, make an example of the fraudster, punish the fraudster

what techniques would likely be most useful in determine whether a particular invoice is fraudulent?

text analysis

whose is responsible for the fraud theory in court

the attorney

fraud theory approach to fraud investigation involves using a fraud theory to structure which of the following?

the evidence collection process

GAAP dictate which of the following

the four basic transaction cycles

In many frauds, such as embezzlement, the cover-up is

the most difficult part of the fraud

define extortion

the threat of future force to gain some type of benefit from the victim

how are frauds most likely discovered in large companies

through hotlines

an attorney pursuing a court case against a fraudster generally

uses the same or different theory as the fraud investigator

an accountant opens the mail and posts check to AR, what is the best way to describe this internal control

weak

first question asked in a fraud investigation

what


Ensembles d'études connexes

Managing People and Work Exam 1 Mr. Chen

View Set

VHLCENTRAL FRE 111: 3 - ComplétezFill in the blanks Activity InstructionsFill in the blanks with the missing numbers to complete each equation. Write out the numbers in words and follow the model.

View Set

Sherpath: Informatics in Nursing Practice

View Set

Assignment 8 - Optimizing Risk for Strategic Advantage

View Set