Fraud examination midterm
According to the ACFE's 2016 Report to the Nations on Occupational Fraud and Abuse, what kind of fraud scheme resulted in the greatest percentage of cases? A. Billing b. Check tampering c. Expense reimbursements d. Skimming
a
The intentional, deliberate misstatement, or omission of material facts or accounting data that is misleading and, when considered with all the information made available, that would cause the reader to change or alter his or her judgment or decision is defined by the Association of Certified Fraud Examiners as: A. Financial statement fraud b. Financial statement misstatement c. Financial statement concealment d. Financial statement re-statement
a
Crowe expanded the fraud triangle into a pentagon by adding ______________ and ___________. A. Compensation equity and cultural norms b. Arrogance and competence c. Myers-Briggs Personality Types and educational attainment d. Internal control environment and organizational pressure
b
Generally, evidence is admissible in court if it is relevant, its probative value out- weighs any prejudicial effects, and: A. It is trustworthy, meaning that it is presented by credible witnesses. b. It is trustworthy, meaning that it is subject to examination and cross-examination. c. It is trustworthy, meaning that it is fact based rather than opinion. d. It is trustworthy, meaning that it is neutral in its impact on the jury.
b
In most occupational fraud cases, it is ___________ that there will be direct evidence of the crime. A. Likely b. Unlikely c. Certain d. Impossible
b
One of the best ways to ruin an investigation, fail to gain a conviction, or lose a civil case, is to: A. Take disparate pieces of financial and non-financial data to tell a story of who, what, when, where, how, and why b. Base investigative conclusions on logic and arguments that the defendant is a "bad person" c. Connect the dots in a case consistent with the investigator's interpretation of the evidence d. Excessively rely on evidence, especially when the plaintiff has a clear track record of ethical conduct or is an upstanding community leader
b
Money laundering, mail and wire fraud, criminal conspiracy and racketeering are examples of crimes associated with: A. The fraud triangle b. A private or civil wrong or injury, other than breach of contract, for which the law will provide a remedy in the form of an action for damages c. Organized crime d. Occupational fraud and abuse
c
One of the interesting aspects of the characteristics of fraud perpetrators is that they do not typically have ______________. A. Respect within their community b. Much knowledge of accounting standards c. A criminal background d. A college degree
c
29.3% of respondents to the 2016 ACFE survey cited a lack of ________ as the victim organizations' primary issue that contributed to the fraudster's ability to perpetrate the scheme. A. Management review b. Amoral corporate culture c. Employee fraud education d. Internal controls
d
One goal of the ACFE survey was to try to determine why organizations frequently decline to take legal action against fraudsters. In cases where no legal action was taken, the survey provided respondents with a list of commonly cited explanations and asked them to mark any that applied to their case. Which of the following was NOT one of the explanations cited by the survey's participants? a. Fear of bad publicity b. Internal discipline sufficient c. Lack of evidence d. Credibility compromise
d
Organizational crime occurs when companies, corporations, not-for-profits, government bodies, and otherwise legitimate and law-abiding organizations are: A. involved in unethical conduct b. involved in organized crime c. involved in a civil offense d. involved in a criminal offense
d
The essential characteristics of financial statement fraud are: a. The misstatement is material and intentional and the users of the financial statements are investors in publicly traded companies. b. This misstatement is material and intentional and the preparers of the financial statements have a fiduciary obligation to the organization. c. The misstatement is material and intentional and the preparers of the financial statements fail to report the misstatement to the SEC or other applicable authority. d. The misstatement is material and intentional and the users of the financial statements have been misled.
d
The interrelationship among auditing, fraud examination, and forensic accounting is dynamic and changes over time because of: a. the Internet and other technological advances b. high profile fraud cases such as Enron, Tyco, and WorldCom c. emerging research by the ACFE which casts doubts on previously existing theories of criminality d. political, social, and cultural pressures
d
The legal standard for the tort of negligence does NOT include the following element: A. Damages b. Duty c. Cause in Fact d. Intent
d
The triangle of fraud action is composed of which three elements: a. Incentive, opportunity, rationalization b. Surveillance, invigilation, documentation c. Devise a scheme, execute it, launder the proceeds d. Act, concealment, conversion
d
A critical aspect of civil litigation for the forensic accountant and fraud examiner is the understanding that: A. Both sides (plaintiff and defendant) are expected to tell their story b. Both sides (plaintiff and defendant) are expected to present only facts in court c. Both sides (plaintiff and defendant) are expected to countersue each other as a strategy d. Both sides (plaintiff and defendant) are expected to negotiate a settlement
a
A number of theories about why the vast majority of people do not commit crime have been set forth over time. Which of the following is NOT one of the reasons cited in the text? A. Social conditioning/parental upbringing b. Fear of punishment c. To act in a just and moral manner according to society's standards d. Desire for rewards
a
A workplace search is considered reasonable under two circumstances: The search must be justified at its inception because it is likely to reveal evidence of work-related misconduct, and: A. The search is necessary to further the investigation. b. The search is necessary to satisfy a court order. c. The search is necessary to preserve public order. d. The search is necessary to operational efficiency.
a
According to the ACFE's 2016 Report to the Nations on Occupational Fraud and Abuse, survey respondents were presented with a list of 17 common behavioral red flags associated with occupational fraud and asked to identify which, if any, of these warning signs had been displayed by the perpetrator before the fraud was detected. Rank the presence of the following four red flags in order of their prevalence from highest to lowest percentage of cases in which they were identified. A. Living beyond means, financial difficulties, past-employment related problems, excessive pressure from within organization b. Living beyond means, financial difficulties, wheeler-dealer attitude, unusually close association with vendor/customer c Living beyond means, financial difficulties, addiction problems, divorce/family problems d. Living beyond means, financial difficulties, social isolation, complained about inadequate pay
a
Antifraud professionals logically conclude that small organizations are particularly vulnerable to occupational fraud and abuse. The results from fraud surveys bear this out: losses in the smallest companies were comparable to or greater than those in organizations with the largest number of employees. It is suspected that this phenomenon exists for two reasons. A. Smaller businesses have fewer divisions of responsibility and there is a greater degree of trust where people know one another personally. b. Smaller businesses employ fewer highly trained business managers and employees are less supervised. c. Smaller businesses are more mission driven by nature and less inclined to formally orient new employees to their responsibilities. d. Smaller businesses employ more people with a wheeler-dealer mindset and don't solicit competitive bids as frequently.
a
As a result of the Sarbanes-Oxley Act (2002), which of the following became part of the business landscape? A. Assessment of internal controls, preservation of evidence, whistleblower protection and increased penalties for securities fraud b. Mandatory separation of duties, two-factor authentication for online transactions, and prohibition of fraudulent financial reporting c. Mandatory quarterly reporting of shell company beneficial ownership, mandatory criminal background checks on all publicly traded company officers and directors, and annual review of internal controls by the SEC d. Auditing firm competence certification, annual disclosure of conflicts of interest by the board of directors, prohibition of illegal gratuities and penalties for whistleblowers
a
Black's Law Dictionary defines a tort as: A. A private or civil wrong or injury, other than breach of contract, for which the law will provide a remedy in the form of an action for damages b. An unlawful conduct of business affairs with funds derived from illegal acts c. When two or more people intend to commit an illegal act and take some steps toward its implementation d. Non-compliance with agency, regulatory, and court requirements
a
Evidence may be testimonial, real or demonstrative, or ______________. A. Circumstantial or direct b. Probative in value c. Expert opinion-based (if admissible) d. Sealed under the Foreign Intelligence Act of 1978
a
Findings in the ACFE's 2016 Report to the Nations indicate that at least one warning sign had been displayed by the perpetrator before the fraud was detected in more than 91% of cases. In 57% of cases, two or more such red flags were seen. According to the study, the six most commonly observed behavioral red flags were: living beyond means, financial difficulties, unusually close association with a vendor or customer, a "wheeler-dealer" attitude, recent divorce or family problems, and ______________. A. Control issues or unwillingness to share duties b. Addiction problems c. Irritability, suspiciousness, or defensiveness d. Excessive pressure from within the organization
a
Forensic accounting is the application of financial principles and theories to facts or hypotheses in a legal dispute and consists of two primary functions: A. Litigation advisory services and investigative services b. Expressing an opinion of guilt or innocence in court regarding audit results and documenting the steps taken to reach that opinion c. Subjecting accounting data to a Benford Analysis and explaining the results to a judge or jury d. Providing courtroom testimony and administrative technical guidance to attorneys
a
If a company generates $12,000,000 in annual sales and has an operating margin of 5%, how many additional dollars in sales would it need to generate to make up for fraud losses of $180,000? A. $3,600,000 b. $360,000 c. $180,000 d. $1,800,000
a
In Cressey's view, there were two components of perceived opportunity necessary to commit a trust violation: ____________________ and technical skill. A. General information b. Accounting know-how c. Observed gaps in internal controls d. Knowledge of financial fraud schemes
a
In addition to the fraud triangle, typical motivations of fraud perpetrators may be identified with the acronym M.I.C.E. This stands for money, ideology, _________, and ego/entitlement. A. Coercion b. Conversion c. Collusion d. Concealment
a
In order for a confession to be valid, it must be deemed to be: A. Voluntary b. Coerced c. Factual d. Sincere
a
One of the most fundamental observations of the Cressey study was the _____________, i.e., that the conditions under which a trust violation occurs necessitate all three elements (of what was later named the fraud triangle). A. Conjuncture of events b. Timing of events c. Circumstances of events d. Sequence of events
a
One reality of what is known as the criminal justice funnel is: A. Few cases result in convictions and incarcerations b. A majority of cases result in convictions and incarcerations c. Regulatory agencies play an important role in monitoring illegal activities d. Civil and criminal cases cannot be pursued simultaneously
a
Regarding criminal prosecutions of occupational fraud and their outcomes, although the percentage of cases referred to prosecution ____________ gradually from the ACFE's 2012 to the 2016 reports, the percentage of cases that prosecutors successfully pursued ___________. A. Decreased; increased b. Increased; decreased c. Decreased; decreased d. Increased; increased
a
The three attributes of a fraud are: A. The scheme or fraud act, the concealment activity, and the conversion or benefit. b. The motive, rationalization and opportunity. c. The intent, the planning, and the execution of a fraudulent act. d. Asset misappropriations, corruption, and financial statement fraud and other fraudulent statements.
a
Under current auditing standards, the auditor is required to: A. Undertake a fraud-risk assessment but not for planning and performing auditing procedures to detect immaterial misstatements. b. Undertake a fraud-risk assessment to include planning and performing auditing procedures to detect immaterial misstatements. c. Undertake a fraud-risk assessment but not for planning and performing auditing procedures to detect immaterial misstatements unless such misstatements are caused by fraud (rather than error). d. Undertake a fraud-risk assessment to include planning and performing auditing procedures to detect immaterial misstatements whether caused by fraud or error.
a
Using non-financial data to corroborate financial information is: A. Powerful and its value cannot be overstated b. Amateurish and used primarily by inexperienced investigators c. Dangerous because it is usually misunderstood by juries d. Acceptable on an extremely limited basis
a
When considering antifraud measures within an organization, the axiom that "fraud deterrence begins in the employee's mind" most closely means that there has to be a _________________. A. Perception of detection b. Perception of punishment (if caught) c. Perception of fairness within all levels of the organization d. Perception of shared values within the organization
a
When using a hypotheses-evidence matrix to evaluate evidence in support of any particular hypothesis in a fraud case, it is crucial to understand that: A. We can never prove any hypothesis b. We can never disprove intent c. We shouldn't become distracted by the "direction" of evidence d. We shouldn't become distracted by evidence that seems to eliminate alternative hypotheses
a
While grand juries have great leeway related to issuing subpoenas, the Fourth Amendment requires reasonableness. To meet the reasonableness standard, the subpoena must be likely to generate evidence that is: A. Relevant to the issue under consideration, be particular and reasonably specific, and be limited to a reasonable time frame. b. Relevant to the issue under consideration, be particular and reasonably specific, and be limited to class B felony (or higher) investigations. c. Relevant to the issue under consideration, be particular and reasonably specific, and be based on a higher than average probability that a crime has been committed. d. Relevant to the issue under consideration, be particular and reasonably specific, and must meet the Daubert standard.
a
(76) Individual rights are grounded in four amendments to the US Constitution associated with due process. Which of the following is not one of these four amendments? a. The Fourth Amendment prohibits unreasonable searches and seizures b. The Seventh Amendment which entitles the accused the right to a speedy trial c. The Fourteenth Amendment entitles a person to due process of law and equal pro-tections under the law d. The Fifth Amendment provides that a person cannot be compelled to provide incriminating information against himself in a criminal case
b
A fiduciary is someone who: a. Swears an oath before taking office b. Acts for the benefit of another c. Betrays the trust of another d. Controls access to an organization's cash or assets
b
Although most cases in the ACFE's 2016 Report to the Nations on Occupational Fraud and Abuse involved a single perpetrator, when two or more persons conspired, the median loss was more than ____ times higher. A. Two b. Seven c. Nine d. Four
b
Civil litigation issues such as damage claims, lost wages, disability, wrongful death, assets and business valuations, costs and lost profits associated with construction delays or business interruptions, insurance claims, intellectual property infringement, environmental issues, tax claims are examples of the kinds of issues for which: A. The RICO Act was adopted b. Forensic litigation advisory services are offered by forensic accountants c. The Sarbanes-Oxley Act was adopted d. SAS99 was adopted
b
Cressey identified six categories of non-shareable financial pressures that prompted embezzlers to act. These included violation of ascribed obligations, business reversals, physical isolation, status gaining, employer-employee relationships, and ______________. A. Financial greed b. Problems resulting from personal failure c. Depression or other mental health issues d. Amoral value system
b
Cressey observed that rationalization as it applies to occupational fraud occurs _________________ the crime. A. After b. Before c. While d. Seldom
b
Prior to admissibility of evidence in court, the attorney must lay the foundation demonstrating relevance, materiality, and ____________ (reliability). A. Validity b. Competence C. Probative value D. Non-speculative
b
Professional skepticism can be broken into three attributes. Which one of the following is NOT one of those three attributes? A. A commitment to persuasive evidence b. A willingness to give others a presumption of goodwill until they prove otherwise c. A questioning mind and a critical assessment of the evidence d. A recognition that the plaintiff and/or the defendant may be masking the true underlying story
b
The Daubert standard is related to the admissibility of expert testimony (expert opin- ions). Under the Daubert standard, the trial judge makes an assessment of whether an ex- pert's scientific testimony is based on reasoning or methodology that is scientifically valid and can properly be applied to the facts at issue. Which of the following is NOT one of the considerations in determining whether the methodology is valid? A. Whether the theory or technique in question can be used and has been tested. b. Whether the theory or technique in question has been verified through a double-blind study that includes a control group. c. Whether the theory or technique has been subject to peer review and publication. d. Whether the theory or technique has attracted widespread acceptance within a rele-vant scientific community.
b
The approach to investigating fraud recommended by the text: A. Identify the specific law that was violated b. Examine relevant evidence with an eye toward demonstrating three attributes of fraud c. Defer decisions that are suited to an attorney's expertise d. Provide reasonable evidence in support of any opinion of guilt
b
The chain of custody protects against the _____________ of evidence as a result of investigators losing control of it. A. Shredding b. Possible corruption c. Leaking d. Unauthorized distribution
b
The term white-collar crime was coined by _____________ in 1939, when he provided the following definition: crime in the upper, white-collar class, which is composed of respectable or at least respected, business and professional men. A. Steve Albrecht b. Edwin H. Sutherland c. Joseph T. Wells d. Donald R. Cressey
b
The triangle of fraud action is sometimes referred to as ____ a. the fraud triangle b. the elements of fraud c. the fraud diamond d. Crowe's fraud pentagon
b
While Dr. Steve Albrecht's research findings on fraud perpetrator characteristics were very similar to the non-shareable problems and rationalizations identified by Cressey, Albrecht introduced the ____________________ into the actions of the fraudsters. A. The role of compensation b. The role of the organization c. The role of social isolation d. The role of (an unfair) performance evaluation system
b
You are testifying in a criminal trial where the CFO of a publicly traded company is accused of embezzling $2.7 million. Which of the following would be considered facts at issue? A. A Panama Papers leak showing the existence of an offshore shell company account with the CFO listed as the beneficial owner. b. Whether or not the CFO stole the money. c. An email from the CFO directing the Head of Accounting to disregard the absence of invoices for purchases of "business consulting services" authorized by the CFO. d. Documentation of special purpose entities created and controlled by the CFO that do not appear on the company's balance sheet.
b
_______________ is the totality of circumstances that lead a reasonable, professionally trained, and prudent individual to believe that a fraud has occurred, is occurring, and/or will occur. All fraud examinations must be based on it. A. Postulation b. Predication c. Proposition d. Premise
b
A common complaint among those who investigate fraud is that organizations and law enforcement ___________________________________________. A. Fail to understand the many ways in which fraud and other white-collar fraud can be perpetrated b. Do not keep pace with the growing sophistication of fraud and other white-collar offenses C. Do not do enough to punish fraud and other white-collar offenses d. Are overwhelmed with other concerns to the extent that fraud and other white-collar offenses are regarded as inconsequential in the grand scheme of things.
c
According to the ACFE's 2016 Report to the Nations on Occupational Fraud and Abuse, median fraud losses are the highest in cases of: A. Asset misappropriation b. Corruption c. Financial reporting fraud d. Insider trading
c
According to the AICPA, the "Achilles Heel" of an organization's antifraud efforts is _______________ and ___________________. A. An amoral corporate culture; an arrogant CEO b. Missing internal controls; lack of management review c. Collusion; management override d. A weak board of directors; an arrogant CEO
c
Dr. Steve Albrecht substituted _______________ for rationalization in the development of the "Fraud Scale." A. Emotional distress b. Greed c. Personal integrity d. Sociopathic tendencies
c
During the course of an investigation, you will encounter "loose threads" or "red flags" such as accounting anomalies. When encountering such anomalies, the fraud professional should: A. Evaluate any personal biases that cause you to suspect fraud b. Assume that it probably indicates dishonest conduct by someone in the organization c. Pull on it and see what happens d. Recognize that its mere existence is very likely proof of fraud
c
Even relevant evidence may be excluded from judicial proceedings if it is prejudicial, confusing, or ____________. A. Contradictory b. Material c. Misleading d. Inconclusive
c
Evidence is anything legally presented at trial to ___________ and convince a jury. A. Link the facts at issue into a story b. Explain or demonstrate the facts (such as a PowerPoint presentation) c. Prove a contention d. Secure a guilty verdict
c
Findings in the ACFE's 2016 Report to the Nations suggest that organizations that lacked _______________ were more susceptible to asset misappropriation schemes. A. Employee perception of detection b. A proper tone at the top c. Internal controls d. A reporting mechanism
c
Forensic accounting and fraud examination require at least three major skill types: A. Inquisitive, persuasive, and authoritative b. Equanimity, objectivity, and a commitment to excellence c. Technical competence, investigative, and communication d. Specialization in law or accounting, experience, and ongoing professional development
c
Forensic and Valuation Services (FVS) professionals can expect that: A. Their opinion will be carefully noted in court. b. The attorney for opposing counsel to defer to the FVS professional's expert opinion on matters pertaining to forensic accounting. c. Their work will be carefully scrutinized by the opposing side and that engagements are adversarial in nature. d. Mediation, arbitration, and negotiations are directed by FVS professionals.
c
Fraud deterrence begins _______________. A. In the existence of sound internal controls b. In the organizational mission and values c. In the employee's mind d. In the beliefs of the culture at large
c
Fraud examination is the ________ of resolving allegations of fraud from tips, complaints, or accounting clues. a. Tradecraft b. Art and science c. Discipline d. Accounting technique
c
Given that occupational fraudsters do not have distinguishing outward characteristics to identify them as such, the most effective way to catch a fraudster is to: A. Set aside professional skepticism b. Rely on your own value system c. Think like one d. Accept evidence without being critical of it
c
In 2010, Jonathan Marks argued for the role of _____________ in fraud. A. Age b. Myers-Briggs Personality Types c. Arrogance (or lack of conscience) d. Garden variety greed
c
Internal fraud committed by one or more employees of an organization is more commonly referred to as: a. Fiduciary breach and embezzlement b. Insider trading and market timing c. Occupational fraud and abuse d. Check tampering and billing schemes
c
Link charts, flow charts, commodity and money flow diagrams, timelines are: A. Popular in the movies, but rarely used in the real world of fraud investigation b. Useful during the hypothesis stage of an investigation but generally not beyond it c. Important as both investigative tools and communication tools d. Generally make complicated material less understandable because they leave too much room for speculation and interpretation compared to actual data
c
Regarding interviews conducted by a nonpublic entity and the Sixth Amendment, an employee: A. Does not have a right to consult a lawyer prior to an interview but has a right to have one present during one b. Does not have a right to have a lawyer present during an interview but has a right to consult one prior C. Does not have a right to have a lawyer present or to consult one prior to the inter- view d. Has a right to have a lawyer present during an interview and to consult one prior
c
Significant research suggests that increasing _______________ may be the best way to deter employee theft. A. The threat of punishment by the employer b. The presence of internal security c. The perception of detection d. The frequency of fraud prevention education
c
Surveillance is generally legal, however, once the investigator enters the realm of electronic (audio) surveillance, the laws become more complicated. Generally federal law prevents ________________________: A. The interception and/or recording of wire, oral, or electronic communications ex- cept if it is collected by a certified fraud examiner (CFE) as part of a legitimate in- vestigation. b. The interception and/or recording of wire, oral, or electronic communications ex- cept if it is recorded in a public venue. c. The interception and/or recording of wire, oral, or electronic communications ex- cept by law enforcement officers with a warrant. d. The interception and/or recording of wire, oral, or electronic communications ex- cept if it is evidence of a class B or higher felony investigation.
c
The "felonious stealing, taking and carrying, leading, riding, or driving away with another's property, with the intent to convert it or deprive the owner thereof" is the legal definition of: a. Embezzlement b. Tort c. Larceny d. Fraud
c
The best evidence rule allows copies of documents to be presented at trial un- der: A. No circumstance whatsoever b. The rules of admissibility c. Certain circumstances d. Oath that the copy has been altered
c
The occupational fraud and abuse classification system (fraud tree) arranges organizational frauds in which three categories? a. The act, concealment, and conversion b. Existence of a fiduciary relationship, breach of duty, harm to the plaintiff or benefit to the fiduciary c. Asset misappropriation, corruption, and financial statement fraud d. Incentive, opportunity, and rationalization.
c
The overriding rule regarding searches and search warrants is that individuals have: A. A right to not self-incriminate b. An expectation of absolute privacy within their home or vehicle c. A reasonable expectation of privacy d. A right to privacy in the workplace (such as lockers, desks, etc.)
c
There are essentially three tools available to fraud examiners, regardless of the nature of the fraud examination or forensic accounting investigation. Which of the following is NOT one of these three tools? a. Skill in examining financial statement, books and records, and supporting documents b. Interviewing skills c. Preserving a crime scene from contamination d. Observation (behavior, displays of wealth, specific offenses)
c
To prove fraud, the investigator has to deal with the issue of: A. Professional skepticism b. Prior bad acts c. Intent d. Specific laws that were broken
c
Unfair pricing, unfair business practices, violation of the FCPA and tax evasion are examples of: A. Ordinary corporate behavior b. Occupational fraud and abuse c. Organizational crime d. More of a problem nationally than internationally
c
Using the fraud theory approach to investigate a case, which step should be your first in an investigation? A. Create hypotheses b. Draw conclusions c. Gather related data/evidence d. Identify a specific law or laws that may have been broken
c
Which of the following is an example of financial statement and reporting fraud? a. Failing to post audit results on the company's website b. Debt ratio is materially higher than industry standards c. Improper timing of revenue and expense recognition d. Net income for any quarterly filing is 17% or more below analyst predictions
c
Which three antifraud measures are associated with the largest reduction in median losses (though not among the most commonly implemented antifraud controls)? a. Proactive data monitoring/analysis, management review, surprise audits b. Proactive data monitoring/analysis, management review, fraud training for employees c. Proactive data monitoring/analysis, management review, hotline d. Proactive data monitoring/analysis, management review, code of conduct
c
Who said, "White collar criminals consider your humanity as a weakness to be exploited ..."? a. Dr. Joseph T. Wells b. Sherron Watkins c. Sam E. Antar d. Andrew Fastow
c
You are a fraud examiner or forensic accountant that is about to conclude an investigation. You have gathered evidence that will allow you to compellingly connect the who, what, when, where, and why dots in court. You are also reasonably certain there is additional evidence that will support your conclusions, but you have been unable to find any. In the world of fraud investigations, moving forward without such evidence is: A. Not ethical b. Not lawful c. Not unusual d. Not in conformity with ACFE investigative standards
c
four common elements to occupational fraud and abuse schemes are first identified by ACFE in its 1996 Report to the Nation on Occupational Fraud and Abuse. Which of the following does not contain all four elements? a. the activity is clandestine, violates the employee's fiduciary duties to the organization, is committed for the purpose of direct or indirect financial benefit to the employee, may or may not result in costs to the employing organization's assets, revenues, or reserves b. the activity is clandestine, violates the employee's fiduciary duties to the organization, is committed for the purpose of direct ro indirect financial benefit to the employee, and is a violation of state and/or federal law c. the activity is clandestine, violates the employee's fiduciary duties to the organization, is committed for the purpose of direct or indirect financial benefit to the employee, and costs the employing organizatio
c
A search warrant has several advantages over a subpoena. Which of the following is NOT one of the advantages described in the text? A. A warrant allows the holder of the warrant, not the target of the defense counsel, to decide which documents are relevant and must be produced. b. A warrant avoids, but does not eliminate, the possibility of the destruction of evi- dence. c. A warrant gives the investigator the ability to interview key witnesses while the search is being conducted. d. A warrant gives the investigator the ability to seize any unlawful item that may be discovered in the search if it is part of a class B (or higher) felony.
d
An unauthorized assumption and exercise of the right of ownership over goods or personal chattels belonging to another, to the alteration of their condition or the exclusion of the owner's rights is the definition of: A. Collusion b. Concealment c. Capital misappropriation d. Conversion
d
Demonstrative evidence may include photographs, charts, diagrams, drawings, scale models, but because it is not real evidence it must not ___________ and it must not mate- rially alter any significant aspect of the facts at issue. A. Have been outside the chain of custody b. Be speculative or conjectural c. Raise doubts in the mind of the jury d. Create prejudice
d
Documentary evidence is at the heart of most fraud and forensic accounting investi- gations. Five considerations must be given to any piece of documentary evidence: The document must not have been forged, original documents are preferred, the document must not be hearsay or objectionable, the document needs to be authenticated, and the document must be _____________. A. Illustrative (or summative) b. Probative in value c. Unbiased d. Reliable
d
Donald R. Cressey (1919-1987) used his doctoral dissertation to study embezzlers, whom he called "trust violators." Upon completion of his research, he developed what still remains as the classical model for the occupational offender. In 1991, Dr. Steve Albrecht organized Cressey's three conditions into a tool that has become known as the "fraud triangle." Which answer below constitutes the three legs of the fraud triangle? A. Perceived opportunity, perceived motive, and intellectualization B. Perceived pressure, perceived isolation, and rationalization C. Perceived motive, perceived opportunity, and minimization d. Perceived pressure, perceived opportunity, and rationalization
d
Edwin H. Sutherland (1883-1850), a criminologist, coined the term white-collar crime in 1939 and later developed the theory of _____________________ whose basic tenet is that crime is learned. A. Constructivist association b. Fraud triangle association c. Attributional association d. Differential association
d
In a 2004 CPA Journal article, Wolfe and Hermanson argue that the fraud triangle could be enhanced to improve both fraud prevention and detection by considering a fourth element, ________________. A. Internal control environment B. Myers-Briggs Personality Types C. The role of arrogance d. Individual capability
d
In contrast to the fraud triangle which US courts have deemed to be more of a theoretical concept rather than a set of measurable standards or a specific, practical methodology for arguing that fraud occurred, the triangle of fraud action can be used in developing prosecutorial evidence. In particular, the element of ________________ provides a compelling argument that the act was intentional. A. The Act b. Conversion c. Opportunity d. Concealment
d
In the contexts of searches, the expression "fruit from the forbidden tree" means: A. Any information derived from confidential informants cannot be introduced if the CI has a felony record. b. Any information from evidence that was in "plain view" of law enforcement cannot be introduced. c. Any information derived from voluntary consent to search cannot be introduced. d. Any information derived from illegal evidence cannot be introduced
d
In the fraud perpetrator profile presented in the text, which set of characteristics summarizes the typical fraud perpetrator? A. Male, middle-aged to retired, with the company for five or more years, never charged or convicted of a criminal offense, well educated, accountant, upper management, or executive, generally acts in collusion with others b. Male, middle-aged to retired, with the company for five or more years, previously charged or convicted of a criminal offense, well educated, accountant, upper management, or executive, acts in alone c. Male, middle-aged to retired, with the company for five or more years, never charged or convicted of a criminal offense, well educated, line employee or lower management, or executive, acts in collusion with others d. Male, middle-aged to retired, with the company for five or more years, never charged or convicted of a criminal offense, well education, accountant, upper ma
d
The term occupational fraud and abuse is defined as: a. The use of one's occupation for status enrichment through misuse or misapplication of the employing organization's resources or assets. b. The use of one's occupation for personal enrichment through the unintentional misuse or misapplication of the employing organization's resources or assets. c. The use of one's occupation for personal enrichment through the deliberate misuse or misapplication of a different organization's resources or assets. d. The use of one's occupation for personal enrichment through the deliberate misuse or misapplication of the employing organization's resources or assets
d
When it comes to fraud loss amounts in organizations, the data shows that there is a direct correlation between ________ loss and ________. A. Average; perpetrator's intelligence b. Average; perpetrator's position c. Median; perpetrator's intelligence d. Median; perpetrator's position
d
Which of the following is NOT one of the four essential elements of fraud under common law? a. A material false statement b. Reliance on the false statement by the victim c. Knowledge that the statement was false when it was spoken d. Use of email, wire, or telephone with a criminal intent to deceive
d
Which of the following is NOT typical of forensic and litigation advisory services? a. Cost and lost profits associated with construction delays. b. Divorce and matrimonial issues. c. Environmental issues. d. Stating an expert opinion about the guilt or innocence of a plaintiff or defendant in a court of law.
d