Professional Documents
Culture Documents
2. The risk that an auditor will examine a fraudulent check and not recognize it as being fraudulent is called _________ .
a. sampling risk
b. non-sampling risk
c. systematic risk
d. systemic risk
ANSWER: b
FEEDBACK: a. Incorrect. Sampling risk is the risk that the sample is not representative of the population.
b. Correct.
c. Incorrect.
d. Incorrect.
POINTS: 1
3. During a concealment investigation, an investigator fails to recognize that an invoice had been forged. This represents
a:
a. sampling risk.
b. non-sampling risk.
c. systematic risk.
d. systemic risk.
ANSWER: b
FEEDBACK: a. Incorrect.
b. Correct.
c. Incorrect.
4. Computer searches and physical asset counts usually focus on the ________ element of the fraud triangle.
a. theft
b. concealment
c. conversion
d. inquiry
ANSWER: b
FEEDBACK: a. Incorrect.
b. Correct. They usually focus on concealment.
c. Incorrect.
d. Incorrect.
POINTS: 1
5. Methods for concealment investigation include all but which of the following?
a. Document examination
b. Searching public records
c. Audits
d. Computer searches
ANSWER: b
FEEDBACK: a. Incorrect. This is a concealment investigation technique.
b. Correct.
c. Incorrect. This is a concealment investigation technique.
d. Incorrect. This is a concealment investigation technique.
POINTS: 1
6. The three most common ways to obtain documentary evidence which are valuable but difficult to obtain are:
a. subpoena, voluntary consent, and searching public records
b. subpoena, search warrant, and voluntary consent
c. search warrant, invigilation, and surveillance
d. voluntary consent, surveillance, and invigilation
ANSWER: b
FEEDBACK: a. Incorrect. Searching public records is a conversion investigative method.
b. Correct.
c. Incorrect. Surveillance is a theft investigation technique.
d. Incorrect. Surveillance and invigilation are not methods used to gather documentary evidence.
POINTS: 1
8. Which of the following is the term for keeping a record of when a document is received and what has happened to it
since its receipt.
a. Organization of custody
b. Evidence chain
c. Coordination of custody
d. Chain of custody
ANSWER: d
FEEDBACK: a. Incorrect.
b. Incorrect.
c. Incorrect.
d. Correct.
POINTS: 1
9. Which of the following does NOT appear on a check that has been cashed?
a. Teller number
b. Date of the transaction
c. Transaction number
d. Time of the transaction
ANSWER: d
FEEDBACK: a. Incorrect.
b. Incorrect.
c. Incorrect.
d. Correct.
POINTS: 1
10. What is the term for the risk that the sample was not representative of the population.
a. Systematic risk
b. Non-sampling risk
c. Sampling risk
d. Compliance risk
ANSWER: c
FEEDBACK: a. Incorrect.
b. Incorrect.
c. Correct.
d. Incorrect.
11. Which of the following is generally considered a best practice while handling documentary evidence?
a. Copies of the document should be used during the investigation and trial and should be kept in the same file
where the original is kept.
b. Photocopies are always preferable to original documents as evidence, as the original could be tampered with.
c. Copies of the document should not be made and only the original document should be used during
investigation and trial.
d. Generally, a summary of the original document should be made for investigation and trial.
ANSWER: a
FEEDBACK: a. Correct.
b. Incorrect.
c. Incorrect.
d. Incorrect.
POINTS: 1
13. _______ are executed only by law enforcement officials and are generally used only in criminal cases.
a. Subpoenas
b. Voluntary consents
c. Search warrants
d. Interviews
ANSWER: c
FEEDBACK: a. Incorrect.
b. Incorrect.
c. Correct.
d. Incorrect.
POINTS: 1
15. Mark owns a 24-hour convenience store. Lately he has noticed that the liquor inventory purchases have gone up by
huge amounts, although sales proceeds from this category haven't increased. He suspects his two night-shift employees.
Which is the best investigative method to uncover such a fraud?
a. Electronic investigation
b. Conversion investigation
c. Inquiry investigation
d. Concealment investigation
ANSWER: d
FEEDBACK: a. Incorrect.
b. Incorrect.
c. Incorrect.
d. Correct. Mark could use concealment investigation techniques to learn how his employees are
concealing the fraud and the extent of the embezzlement.
POINTS: 1
16. Which statistical sampling allows an auditor to generalize and make inferences from the sample to the population?
a. Probability sampling
b. Random sampling
c. Discovery sampling
d. Quota sampling
ANSWER: c
FEEDBACK: a. Incorrect.
b. Incorrect.
c. Correct.
d. Incorrect.
POINTS: 1
17. What is the most common way to obtain private documents (either oral or written)?
a. subpoena
b. search warrant
c. voluntary consent
d. audit
ANSWER: c
FEEDBACK: a. Incorrect.
b. Incorrect.
Cengage Learning Testing, Powered by Cognero Page 5
Chapter 08
c. Correct.
d. Incorrect.
POINTS: 1
18. Which aspect of documentary evidence should be kept in mind to ensure that the documents can be identified later and
accessible for trial?
a. Organization of evidence
b. Coordination of evidence
c. Marking of evidence
d. Chain of custody of documents
ANSWER: c
FEEDBACK: a. Incorrect.
b. Incorrect.
c. Correct. Evidence should be uniquely marked so that it can be identified later.
d. Incorrect.
POINTS: 1
19. Which of the following is a popular program used to index and store evidence?
a. CaseCentral
b. IDEA
c. TANZAN
d. SQL
ANSWER: a
RATIONALE: Feedback
A Correct.
B Incorrect.
C Incorrect.
D Incorrect.
POINTS: 1
20. ________ is a simple, statistically based method of analyzing a subset of transactions from a larger pool.
a. Structured sampling
b. Probability sampling
c. Cluster sampling
d. Discovery sampling
ANSWER: d
RATIONALE: Feedback
A Incorrect.
B Incorrect.
C Incorrect.
D Correct.
POINTS: 1
24. The four most common examples of documentary evidence which are valuable but difficult to obtain are:
a. Web-based e-mail accounts, private bank records, tax returns, and brokerage records.
b. Sample analytical reports, photographs and videos, tax returns, and SEC filings.
c. Office e-mail accounts, private bank records, maps and diagrams, and sample analytical reports.
d. Photographs and videos, private bank records, tax returns, and brokerage records.
Cengage Learning Testing, Powered by Cognero Page 7
Chapter 08
ANSWER: a
RATIONALE: Feedback
A Correct.
B Incorrect.
C Incorrect.
D Incorrect.
POINTS: 1
25. Orders issued by a court or a grand jury to produce documents are called:
a. writs of certiorari.
b. search warrants.
c. voluntary consent.
d. subpoenas.
ANSWER: d
RATIONALE: Feedback
A Incorrect.
B Incorrect.
C Incorrect.
D Correct.
POINTS: 1
28. Once investigators enter their indicators into the centralized database, the software performs _______ to find
connections between people, places, and events.
a. regression analysis
b. search analysis
c. link analysis
d. correlation analysis
ANSWER: c
RATIONALE: Feedback
A Incorrect.
B Incorrect.
C Correct.
D Incorrect.
POINTS: 1
30. Which of the following is an alternative when original documents are too voluminous to permit careful examination?
a. A photocopy of the original document will suffice.
b. It will have to be excluded from usage as evidence.
c. A summary of its contents is acceptable.
d. There are no alternatives. The original has to be produced.
ANSWER: c
RATIONALE: Feedback
A Incorrect.
B Incorrect.
C Correct.
D Incorrect.
POINTS: 1
34. Which of the following is NOT utilized to make determinations about the document being examined?
a. forensic chemistry
b. microscopy
c. photography
d. radiology
ANSWER: d
FEEDBACK: a. Incorrect
35. Which of the following is NOT a warning sign indicating a possible problem with a document?
a. disguised or unnatural handwriting
b. authorized initialed changes
c. inconsistency or disruption in the continuity of the content
d. use of two or more different colors of ink
ANSWER: b
FEEDBACK: a. Incorrect; this is a warning sign.
b. Correct, if authorized, changes are not a problem.
c. Incorrect; this is a warning sign.
d. Incorrect; this is a warning sign.
POINTS: 1
36. Computer-based queries of accounting and other data bases are utilized in which of the following investigation
methods?
a. theft
b. conversion
c. concealment
d. inquiry
ANSWER: c
FEEDBACK: a. Incorrect
b. Incorrect
c. Correct
d. Incorrect
POINTS: 1
38. Which of the following is NOT an action by the fraud perpetrators to hide/conceal their illegal act(s)?
a. manipulating documentary evidence
Cengage Learning Testing, Powered by Cognero Page 11
Chapter 08
b. modifying records in computer databases
c. photocopying fraud-related documents
d. deleting records in computer databases
ANSWER: c
FEEDBACK: a. Incorrect, this is an act of concealment.
b. Incorrect, this is an act of concealment.
c. Correct, this is not an act of concealment.
d. Incorrect, this is an act of concealment.
POINTS: 1
39. Which of the following is a FALSE statement regarding how the testimony of witnesses can be problematic?
a. Witnesses can forget important facts.
b. Witnesses can be confused by opposing attorneys.
c. Witnesses can commit perjury.
d. Witnesses may depend on their written summary of the facts.
ANSWER: d
FEEDBACK: a. Incorrect, this is a true statement.
b. Incorrect, this is a true statement.
c. Incorrect, this is a true statement.
d. Correct, this is a false statement.
POINTS: 1
40. The FBI's Document Conversion Lab does NOT do which of the following?
a. It saves an incredible amount of time searching documents.
b. It increases search capabilities regarding relevant documents.
c. It increases the amount of documentation evidence available.
d. It enables the sharing of document information.
ANSWER: c
FEEDBACK: a. Incorrect, this is a function of DocLab.
b. Incorrect, this is a function of DocLab.
c. Correct, this is NOT true regarding DocLab.
d. Incorrect, this is a function of DocLab.
POINTS: 1
42. Which amendment provides the right of the people against unreasonable searches and seizures?
a. First
b. Second
c. Third
d. Fourth
ANSWER: d
FEEDBACK: a. Incorrect
b. Incorrect
c. Incorrect
d. Correct
POINTS: 1