Professional Documents
Culture Documents
Student: ___________________________________________________________________________
7. Which investigation technique relies on a person's senses, especially hearing and seeing?
A. Invigilation
B. Surveillance and covert operations
C. Electronic evidence
D. Obtaining physical evidence
9. What is invigilation?
A. A theft investigation technique which records the physical evidence, facts, and movements, which form part
of a fraud.
B. A theft investigation technique which involves close supervision of the suspects during the examination
period.
C. A theft investigation technique which is used when large scale fraud is likely and other methods of
investigation fail.
D. A theft investigation technique which involves confiscating and searching computers and other electronic
sources of information.
10. Undercover operations should be used only when:
A. large scale fraud is likely and other investigation methods fail.
B. controls are made so strict that opportunities to commit fraud are virtually impossible.
C. the investigation cannot be kept a secret.
D. there is a need to develop theories about what kind of fraud has occurred.
12. Subjects of covert operations are protected against unreasonable breaches of privacy under the ______ of
the constitution.
A. Fourth Amendment
B. Fifth Amendment
C. Second Amendment
D. Seventh Amendment
14. An investigator locates the scene that should be observed, anticipates the action that is most likely to occur
at the scene, and keeps detailed notes on all activities involving the suspect. Which type of surveillance is being
used here?
A. Static surveillance
B. Electronic surveillance
C. Stationary surveillance
D. Moving surveillance
17. A(n) ____ is a tool for explicitly considering all aspects of the fraud and for establishing fraud theories.
A. Vulnerability chart
B. Perceptual map
C. Surveillance log
D. Pareto chart
19. ______ means that there are symptoms or red flags that a fraud may be occurring.
A. Predication
B. Vulnerability
C. Audit
D. Presumption
20. Several factors are considered in deciding whether or not to investigate fraud. Which of the following is
NOT one of them?
A. The signal that investigation or noninvestigation will send to others in the organization.
B. Perceived cost of the investigation.
C. Exposure or amount that could have been taken.
D. Perceived strength of the predication.
E. Preparation of a surveillance log.
21. Which of the following is a form of surveillance that is usually only available to law enforcement officers?
A. Surveillance using video cameras
B. Wiretapping
C. Stationary surveillance
D. Tailing
22. _______ are theft act investigative methods that usually involve observing or listening to potential
perpetrators.
A. Audits
B. Online resources
C. Document examination
D. Surveillance and covert operations
23. For fraud to occur, usually three elements are necessary: pressure, opportunity, and _______.
A. excitement
B. guidance
C. rationalization
D. money
24. A(n) _______ is a calculation (using encryption technologies) based on the contents of a disk or file. They
are engineered so that even small changes in the source data will produce significantly different checksum
results.
A. cyclic random check number
B. cyclic redundancy check number
C. cyclic repetition check number
D. random variable check number
25. What is used in court cases to prove that data has not been adversely affected during analysis?
A. Arithmetic mean
B. Deviation measure
C. Random sampling
D. Checksums
27. _____ investigative methods are usually helpful in investigating all types of frauds, but they are most useful
after you have gathered other types of evidence and know who to interview and what questions to ask.
A. Inquiry
B. Theft
C. Concealment
D. Conversion
28. Which investigation technique usually does not work well in kickback situations?
A. Concealment
B. Theft
C. Inquiry
D. Conversion
29. A divisional manager is suspected of adding ghost employees to the payroll. Which investigative method
can most easily uncover this type of fraud?
A. Undercover operations
B. Theft
C. Concealment
D. Conversion
30. Electronic surveillance may have only limited value in the investigation of employee frauds and many other
white-collar crimes. Why?
A. Lack of adequate technology
B. Concerns regarding employees’ privacy
C. Prohibitively high cost of installation and maintenance
D. Relative ease of tampering evidence
31. Which of the following is a basic objective of surveillance, whether manual or electronic?
A. Identify victims of the fraud
B. Analyze how the money comes back in the form of assets
C. Understand the cover-up or concealment of fraud
D. Catch fraud at the theft act stage
33. Concealment investigative techniques do not work well in kickback situations. Why?
A. The parties in the transaction will be hard to trace.
B. Results of concealment investigative techniques are not admissible as evidence in courts.
C. There is usually no direct documentary evidence.
D. The risk involved in such investigations is unusually high.
34. Which of the following observations concerning physical evidence is TRUE?
A. It is not useful in fighting fraud cases.
B. It is more associated with nonfraud types of crimes.
C. It is useful in fraud cases because fraud is usually seen and has physical symptoms.
D. It does not involve electronic sources of information.
35. Identify the first step in any electronic evidence collection process.
A. Seizure of the device
B. Automated search of the device
C. Clone the device
D. Do a manual reconnaissance
36. Which step in the electronic evidence collection process is important to ensure that the original disk is kept
in its seized state?
A. Evidence mapping
B. Search
C. Seizure
D. Cloning
Chapter 7--Investigating Theft Acts Key
7. Which investigation technique relies on a person's senses, especially hearing and seeing?
A. Invigilation
B. Surveillance and covert operations
C. Electronic evidence
D. Obtaining physical evidence
9. What is invigilation?
A. A theft investigation technique which records the physical evidence, facts, and movements, which form part
of a fraud.
B. A theft investigation technique which involves close supervision of the suspects during the examination
period.
C. A theft investigation technique which is used when large scale fraud is likely and other methods of
investigation fail.
D. A theft investigation technique which involves confiscating and searching computers and other electronic
sources of information.
10. Undercover operations should be used only when:
A. large scale fraud is likely and other investigation methods fail.
B. controls are made so strict that opportunities to commit fraud are virtually impossible.
C. the investigation cannot be kept a secret.
D. there is a need to develop theories about what kind of fraud has occurred.
12. Subjects of covert operations are protected against unreasonable breaches of privacy under the ______ of
the constitution.
A. Fourth Amendment
B. Fifth Amendment
C. Second Amendment
D. Seventh Amendment
14. An investigator locates the scene that should be observed, anticipates the action that is most likely to occur
at the scene, and keeps detailed notes on all activities involving the suspect. Which type of surveillance is being
used here?
A. Static surveillance
B. Electronic surveillance
C. Stationary surveillance
D. Moving surveillance
17. A(n) ____ is a tool for explicitly considering all aspects of the fraud and for establishing fraud theories.
A. Vulnerability chart
B. Perceptual map
C. Surveillance log
D. Pareto chart
19. ______ means that there are symptoms or red flags that a fraud may be occurring.
A. Predication
B. Vulnerability
C. Audit
D. Presumption
20. Several factors are considered in deciding whether or not to investigate fraud. Which of the following is
NOT one of them?
A. The signal that investigation or noninvestigation will send to others in the organization.
B. Perceived cost of the investigation.
C. Exposure or amount that could have been taken.
D. Perceived strength of the predication.
E. Preparation of a surveillance log.
21. Which of the following is a form of surveillance that is usually only available to law enforcement officers?
A. Surveillance using video cameras
B. Wiretapping
C. Stationary surveillance
D. Tailing
22. _______ are theft act investigative methods that usually involve observing or listening to potential
perpetrators.
A. Audits
B. Online resources
C. Document examination
D. Surveillance and covert operations
23. For fraud to occur, usually three elements are necessary: pressure, opportunity, and _______.
A. excitement
B. guidance
C. rationalization
D. money
24. A(n) _______ is a calculation (using encryption technologies) based on the contents of a disk or file. They
are engineered so that even small changes in the source data will produce significantly different checksum
results.
A. cyclic random check number
B. cyclic redundancy check number
C. cyclic repetition check number
D. random variable check number
25. What is used in court cases to prove that data has not been adversely affected during analysis?
A. Arithmetic mean
B. Deviation measure
C. Random sampling
D. Checksums
27. _____ investigative methods are usually helpful in investigating all types of frauds, but they are most useful
after you have gathered other types of evidence and know who to interview and what questions to ask.
A. Inquiry
B. Theft
C. Concealment
D. Conversion
28. Which investigation technique usually does not work well in kickback situations?
A. Concealment
B. Theft
C. Inquiry
D. Conversion
29. A divisional manager is suspected of adding ghost employees to the payroll. Which investigative method
can most easily uncover this type of fraud?
A. Undercover operations
B. Theft
C. Concealment
D. Conversion
30. Electronic surveillance may have only limited value in the investigation of employee frauds and many other
white-collar crimes. Why?
A. Lack of adequate technology
B. Concerns regarding employees’ privacy
C. Prohibitively high cost of installation and maintenance
D. Relative ease of tampering evidence
31. Which of the following is a basic objective of surveillance, whether manual or electronic?
A. Identify victims of the fraud
B. Analyze how the money comes back in the form of assets
C. Understand the cover-up or concealment of fraud
D. Catch fraud at the theft act stage
33. Concealment investigative techniques do not work well in kickback situations. Why?
A. The parties in the transaction will be hard to trace.
B. Results of concealment investigative techniques are not admissible as evidence in courts.
C. There is usually no direct documentary evidence.
D. The risk involved in such investigations is unusually high.
34. Which of the following observations concerning physical evidence is TRUE?
A. It is not useful in fighting fraud cases.
B. It is more associated with nonfraud types of crimes.
C. It is useful in fraud cases because fraud is usually seen and has physical symptoms.
D. It does not involve electronic sources of information.
35. Identify the first step in any electronic evidence collection process.
A. Seizure of the device
B. Automated search of the device
C. Clone the device
D. Do a manual reconnaissance
36. Which step in the electronic evidence collection process is important to ensure that the original disk is kept
in its seized state?
A. Evidence mapping
B. Search
C. Seizure
D. Cloning